BYOD and Your Business



Similar documents
NAC FOR BYOD WHITEPAPER

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Mobile Device Strategy

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

End-user Security Analytics Strengthens Protection with ArcSight

Delivering Control with Context Across the Extended Network

Introduction Jim Rowland, Senior System Architect and Project Manager Daly

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Use Bring-Your-Own-Device Programs Securely

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

How to Secure Your Environment

Endpoint protection for physical and virtual desktops

Modular Network Security. Tyler Carter, McAfee Network Security

PCI DSS Compliance White Paper

Security Management. Keeping the IT Security Administrator Busy

Mobility Challenges & Trends The Financial Services Point Of View

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

The Cloud App Visibility Blindspot

Network Security. Intertech Associates, Inc.

Survey: Endpoint Security Concerns 2014 The issues keeping IT admins awake into the New Year

Network Security Survey of Small Businesses

If you can't beat them - secure them

The Security Scenario 2005: The Future of Information Security

BLACK BOX. Do you know who s on your network? Network Access Control. Get the facts. Then get the protection you can t live without.

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Securing OS Legacy Systems Alexander Rau

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Symantec Endpoint Protection

Cisco Advanced Malware Protection

10 Smart Ideas for. Keeping Data Safe. From Hackers

Exactly the Same, but Different

The Cloud App Visibility Blind Spot

Readiness Assessments: Vital to Secure Mobility

Data Center security trends

SECURING YOUR REMOTE DESKTOP CONNECTION

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Protecting Corporate Data from Mobile Threats. And the emerging role for microsd-based security Art Swift CEO, CUPP Computing

Bringing Continuous Security to the Global Enterprise

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Chris Boykin VP of Professional Services

Strategic Road Map for Network Access Control

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

INCIDENT RESPONSE CHECKLIST

The Leading Provider of Endpoint Security Solutions

Guideline on Safe BYOD Management

Beyond Mobile Device Security: Why Comprehensive Endpoint Security and Management is a Must-Have for Small and Medium Enterprises

Student Tech Security Training. ITS Security Office

Integrated Protection for Systems. João Batista Territory Manager

Payment Card Industry Data Security Standard

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

My CEO wants an ipad now what? Mobile Security for the Enterprise

Detecting Cyber Attacks in a Mobile and BYOD Organization

8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014

Desktop Security. Overview and Technology Guidance. Michael Ramsey Network Specialist, NC DPI

Defending Against Data Beaches: Internal Controls for Cybersecurity

Whitepaper. SaaS Isn t Just For Productivity Anymore Innovative endpoint encryption & security managed through the Cloud.

Discover Security That s Highly Intelligent.

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Proven LANDesk Solutions

How to Practice Safely in an era of Cybercrime and Privacy Fears

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

WHITE PAPER: INFORMATION-CENTRIC SECURITY

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

HSyE HIPAA Training. Summer 2015

4 Steps to Effective Mobile Application Security

What Do You Mean My Cloud Data Isn t Secure?

Best Practices for Secure Remote Access. Aventail Technical White Paper

ForeScout CounterACT. Continuous Monitoring and Mitigation

How are we keeping Hackers away from our UCD networks and computer systems?

Five keys to a more secure data environment

BYOD: Focus on User Experience, Not the Device

Embracing Complete BYOD Security with MDM and NAC

Security Information & Event Management (SIEM)

A Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By:

INSERT COMPANY LOGO HERE

The ForeScout Difference

White Paper. Identifying Network Security and Compliance Challenges in Healthcare Organizations

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services

Penetration Testing //Vulnerability Assessment //Remedy

ControlFabric Interop Demo Guide

Vulnerability. Management

Security Analytics The Beginning of the End(Point)

AVeS Cloud Security powered by SYMANTEC TM

Windows XP End-of-Life Handbook for Upgrade Latecomers

Cisco & Big Data Security

MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director

Preparing your network for the mobile onslaught

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

How To Secure Your Store Data With Fortinet

Average annual cost of security incidents

Increase insight. Reduce risk. Feel confident.

Things To Do After You ve Been Hacked

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Transcription:

BYOD and Your Business Learn about the BYOD trend, the risks associated with this trend, and how to successfully adopt BYOD while securing your network.

Agenda The rise of BYOD Security risks associated with BYOD A BYOD strategy NetClarity s Internal Security Solution

The Rise of BYOD Gartner projects a 9-40% savings using employee PCs 1 in 10 use personal computers for primary work device today 50% use personal computers for work at some time 43% of companies have a written policy, with specific rules

BYOD: A fast-growing Dilemma The challenge: seamless and secure management of ALL devices Personal AND Professional Wired AND Wireless ANY operating system By 2016 at least 50% of enterprise email users will rely primarily on a browser, tablet or mobile client instead of a desktop client. Gartner - AND - Today, 80% of attacks occur inside the network - SANS

The Security dilemma of BYOD 1. People 2. Processes 3. Policy 4. Technology 5

Breach Statistics 174 million compromised records last year and their firewall didn t stop them! Verizon 2012 Data Breach Investigations Report

And you thought a firewall was all you needed?

BYOD: How is security breached? 1. Accidentally download malware onto your device. 2. Bring that device into work and bypass the firewall. 3. A Trojan gets onto the network. 4. Data gets transferred to a hacker without you even knowing it! Data

What s the real internal security problem? All Networks and IP Devices have Holes that are known as: Common Vulnerabilities and Exposures (CVE) https://nvd.nist.gov/

BYOD Risk: New Malware Outbreaks Your favorite anti-virus program catches no more than 70-90% of malware! What s running on everyone s personal device? Who knows?

BYOD Risk: New Malware Outbreaks Here's a video of my Droid cell phone that was hacked after I loaded the new "Mobile Skype" program. It's as if the phone has been possessed. Had to get a new cell. http://www.youtube.com/watch?v=mpzgw5db2ok Noticed this crazy messaging happening on my ipad2 earlier this evening. You can see that there are messages being sent (blue background) and the keypad is not being used at the time. Secondly, I don't have a Romanian number or contact. Thirdly, I don't speak Romanian. Weird I tells ye! and it's still messaging back and forth as I type here. http://www.youtube.com/watch?v=wa9h-8q1fea

BYOD Risk: CVEs (iphone sample ) The current value of credit cards on the black market Look, you can even buy in bulk! See: http://nvd.nist.gov

BYOD Risk: Lost or Stolen? More than a third of consumers have had cell phones lost or stolen

BYOD Risks: Control and Compliance Behind every firewall, you need to manage BYOD. The businesses in each of these vertical markets are all very different, but they are all faced with similar challenges: Ensuring Business Continuity. Controlling Network Access. Ensuring Regulatory Compliance.

BYOD Strategy People Awareness, training, culture Process Assessments, real-time monitoring, onboarding/departing employees, quarantining devices Policy Acceptable use, email security, access control, password policy, patch mgmt., incident response, business continuity Technology NAC, MDM, firewalls, A/V, IPS/WIPS, etc.

Multi-faceted Internal Security End Point Protection IPS/IDS Firewall Asset Management and Access Control. Vulnerability management, compliance reporting and Auditing Zero-Day Defense Internal Security

Internal UTM: Critical technology Remember, while firewalls protect networks from the outside-in, over 80% of successful attacks come from the inside. There is a major need for internal UTM to secure networks from the inside-out.

Inside-Out Network Security Appliances Scalable from 25 devices to thousands Immediately control access by any and all types of devices if you don t want them on the network, they don t get on the network. Identify network holes (CVE s) on the inside of your network and guide proactive remediation process Defend against malware through automated detection and blocking

How NetClarity stops a breach 1. Accidentally download malware onto your device. 2. Bring that device into work and bypass the firewall. 3. A Trojan gets onto the network. 4. NetClarity quarantines the device that has a Trojan installs 5. NetClarity stops the hacker from receiving the data he was hoping to obtain! Data

The BYOD NACwall Appliance Awards NetClarity Picks Up Where Firewalls, Anti-virus, Intrusion Detection Systems and Intrusion Prevention Systems Leave Off John Gallant, President, Network World The only Next Gen. NAC solution to be integrated with RSA envision for enterprise-wide internal risk management Apurva More, RSA Secured Program Manager The Most Innovative NAC Vendor in the World Network Products Guide, Hot Companies, 2009, 2010, 2011

Next Generation NAC, Manages BYOD! When evaluating NAC solutions, look for vendors that understand the consumerization trend and support, or have plans to support, policies for managing the non-microsoft endpoints that will inevitably attempt to connect to your network. Convenient to install Universal in application All devices, OS, wired/wireless Gartner NAC Report, 12/2010

In Summary: Managing BYOD 1. Personal devices are pervasive but the BYOD trend isn t going anywhere. 2. They add a new level of risk management to the organization. 3. There are technologies to mitigate the risk, like NetClarity s NACwalls!

Questions? www.netclarity.net Contact Calleva Networks to request a demo or evaluation on +44 118 902 6622 or email sales@callevanetworks.com