Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com

Similar documents
Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

Mobile Device Management ios Policies

Guidance End User Devices Security Guidance: Apple ios 7

How to wipe personal data and from a lost or stolen mobile device

company policies are adhered to and all parties (traders,

ipad Set Up Guide: Staff! 1 of! 20

Deploying iphone and ipad Security Overview

ios How to Back Up from icloud

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0

End User Devices Security Guidance: Apple ios 8

Introduction...3. Creating an Apple ID...3. Setting Up Your ipad...4. Connecting to Genesis...4. Setting Up Your ipad...5. ipad Name Change...

Reviewer Guide Core Functionality

Apple Deployment Programs Apple ID for Students: Parent Guide

...Some people / organizations will be a target REGARDLESS of what they do, but most will be a target / victim BECAUSE of what they do

Mobile Configuration Profiles for ios Devices Technical Note

ENTERPRISE SECURITY. ios Security Lecture 5 COMPSCI 702

1. Set a longer (and stronger) six-digit passcode. 2. Prevent apps from uploading your data

Mobile Iron User Guide

Apple Configurator MDM Site - Review

Securing your credit *

iphone in Business Security Overview

Enterprise Security with mobilecho

ipad in Business Security

Systems Manager Cloud Based Mobile Device Management

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback -

FINAL DRAFT. APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE. Version 1, Release 0.1.

itunes: About ios backups

MDM Mobile Device Management

Why you need. McAfee. Multi Acess PARTNER SERVICES

Minimum Requirements for Web Based Applications

Lotus Notes Traveler User and Troubleshooting Guide for ios Devices. Manage the Settings for your Mail, Calendar, and Contacts Apps

PROFESSIONAL DIGITAL TWO-WAY RADIO MOTOTRBO ANYWHERE. for ios USER GUIDE

Access Your Cisco Smart Storage Remotely Via WebDAV

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Managing Mobility. 10 top tips for Enterprise Mobility Management

Salesforce1 Mobile Security Guide

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

EZ RMC Remote HMI App Application Guide for ios

Introduction to AirWatch and Configurator

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Comprehensive Enterprise Mobile Management for ios 8

Dacorum U3A Apple Mac Users Group Agenda TUESDAY 7th July 2015 Time Machine Backups for your MAC & ipad?

AkrutoSync 4.0 User Guide

When enterprise mobility strategies are discussed, security is usually one of the first topics

Deploying iphone and ipad Apple Configurator

Research Information Security Guideline

How to find the MAC address of your computer

Country Club Bank- Intro to Mobile Banking- Android & iphone Apps

TALLAN INC. MDM STRATEGY GUIDE 4/10/2014 WE BUILD SOFTWARE THAT HELPS OUR CLIENTS GROW DOCUMENT CREATED BY: Matt Kruczek Mobile Practice Lead

VPN: Virtual Private Network Setup Instructions

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Cloud Computing for Education Workshop

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide

ANIRA/AVTS Managed VPN Capability for ios Devices (ipad, iphone, ipod touch )

Mac in the Enterprise

iphone in Business How-To Setup Guide for Users

Systems Manager Cloud-Based Enterprise Mobility Management

App Distribution Guide

Deploying iphone and ipad Mobile Device Management

INTRODUCTION OF IPAD USE AT UT. Introduction of ipad use at the University of Twente Content Introduction... 2

GPC JagTalk Secure Wireless Network. Connection Instructions

Students Mobile Messaging Registration & Configuration

Using the Jive for ios App

Creating an Apple ID on an iphone, ipad, or ipod touch with a Credit / Debit Card

End User Devices Security Guidance: Apple OS X 10.10

Wireless Presentation Gateway. User Guide

How To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device

Access the TCNJ Palo Alto Networks VPN using the GlobalProtect VPN client

ipad in Business The Top Considerations

Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network

Flexible Identity Federation

How to Access Coast Wi-Fi

Phone: Fax: Box: 230

Android vs. Apple ios Security Showdown Tom Eston

mobilecho: 5-Step Deployment Plan for Mobile File Management

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

ios Enterprise Deployment Overview

Campus Mobile App User Guide

ios 8 Security and Privacy Changes

AirWatch for Android Devices

Client Training Manual

Guidance End User Devices Security Guidance: Apple OS X 10.9

ManageEngine Desktop Central. Mobile Device Management User Guide

Workday Mobile Security FAQ

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

1. You will have knowledge of all the features of Yosemite and ios 8 that allow employees and business owners to collaborate on their work.

ipad Deployment Guide

Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.

SOMITS is located in the 1648 Pierce Drive School of Medicine Building, Suite AB51.

Discovering Computers

Ensuring the security of your mobile business intelligence

Manual for Android 1.5

Mobile Device Management (MDM) Policies. Best Practices Guide.

How to Remotely Track Any Lost Smartphone, Tablet, or PC

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

ios Mobile: Setup Guide for Umbrella ios Mobile Devices

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

User-ID Configuration

Transcription:

We secure your information world www.

Mobile Security Features What are the new security features in Android KitKat 4.4 and IOS 7?.

IOS Feature 1 Single Sign-on Previously available for multiple apps developed by same developer (e.g. Google Apps) Now available for all Apps Some constraints: Kerberos enabled platform and application Still have to provision the device and send profile http://www.youtube.com/watch?v=e3mec7hj2so

IOS Feature 2 Restricting opening of attachments Restrict attachments to open within approved apps (e.g. you can open an attachment in corporate email vs. personal email) Restricts data leakage Prevents users to take a picture of confidential information and post it on Facebook

IOS Feature 3 Default Data Protection When a passcode is configured, Apple used to protect the data using hardware encryption, but it was left for developers to protect application data (choice of encryption) Now, by default everything is encrypted

IOS Feature 4 Per App VPN Instead of a VPN for the IP address, now the VPN is per App. Different Apps can connect to different VPNs Not fully tested yet, but I think we would be able to VPN to a payroll provider for payroll app and a bank for a banking application and both apps could be used interchangeably

IOS Feature 5 Activation Lock Currently, the Find My iphone feature allows you to locate and secure your lost ios device using the Find My iphone app on another iphone, ipad or ipod touch, or by visiting icloud.com on your computer. Unfortunately, it has a major drawback. The thief can turn off your ios device and restore it to prevent you from using the Find My iphone features. ios 7 includes a new feature called Activation Lock. In ios 7, turning off Find My iphone or erasing your device requires Apple ID and password. It will also continue to display the custom message displaying your contact number, even after your device is erased. This should make it a major deterrent for thieves and make the Find My iphone feature fool proof.

IOS Feature 6 icloud Key Chain In ios 7, Safari s AutoFill feature has been extended to remember account names, passwords, and credit card numbers. Safari will automatically enter them when you visit a site to sign in or shop online. The keychain will also be synced via icloud to all your ios devices running ios 7 and Macs running OS X Mavericks. Apple says the information will be stored using 256-bit AES encryption. Safari will also be able to generate a unique, hard-to-guess password like password management apps like 1Password. Unfortunately, this feature will be extremely useful only for users who use Safari on their computers and ios devices. If you prefer using Chrome, then this feature is useless

Other IOS Security Features Private Browsing Easy to set private browsing on Safari Fingerprinting Two factor Authentication Still issues with it Hackers Ease of use Recent news of SIRI bug unlocking the phone Recent news about Kill Switch available on all phone by 2015 http://www.cnn.com/2014/04/16/tech/mobile/ctia-phone-killswitch/index.html

Android Feature 1 Multi-user profiles. Android 4.2 introduced multi-user Different members of an organization can have their own profile, complete with app, home screen, and setting independence. Granular control over the other user accounts on the device

Android Feature 2 VPN Security On multi-user devices, VPNs are now applied per user. Allow a user to route all network traffic through a VPN without affecting other users on the device. Always-on VPN - VPN can be configured so that applications will not have access to the network until a VPN connection is established.

Android Feature 3 Application permissions & verification App permissions display on installation have been improved in version 4.2+. Permissions have been organized into groups that are more easily understood by users. Verify Apps feature that will screen apps by an application verifier, before installation. App verification should alert the user if the app could be harmful.

Android Feature 4 Key Chain and encryption Android 4.0 supports full file system on-device data encryption(introduced in Android 3.0 only for tablets) Android 4.0 introduced the Key Chain which allows applications to use the system credential storage for private keys and certificate chains. Improved cryptographic algorithms

Other Android Security Features Wi-Fi support for WPA2-Enterprise networks Android sandbox reinforced with SELinux: Improved support for secure NFC-based transactions Android now supports FORTIFY_SOURCE level 2, and all code is compiled with those protections. Android 4.4 also includes fixes for various Android-specific vulnerabilities Recent news about Kill Switch available on all phone by 2015