BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective



Similar documents
How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

AirWatch Solution Overview

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy

Optimizing the Mobile Cloud Era Through Agility and Automation

Mobile Security: The good, the bad, the way forward

How To Protect Your Mobile Device From Attack

Introducing AirWatch by VMware: Enterprise Mobility Simplified. Menny Tsarfaty EUC Business Specialist MEDI

Securing Health Data in a BYOD World

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

What We Do: Simplify Enterprise Mobility

Readiness Assessments: Vital to Secure Mobility

Dell Bring Your Own Device

Total Enterprise Mobility

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Netzwerkvirtualisierung? Aber mit Sicherheit!

How To Secure Your Store Data With Fortinet

Cloud Security: The Grand Challenge

How To Build A Software Defined Data Center

The Identity Defined Security Alliance

McAfee Security Architectures for the Public Sector

Secure Your Mobile Device Access with Cisco BYOD Solutions

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Data Security in a Mobile, Cloud-Based World

Solve BYOD with! Workspace as a Service!

Security and Privacy

RFI Template for Enterprise MDM Solutions

Datawire Secure Transport Value Proposition

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

End-user Security Analytics Strengthens Protection with ArcSight

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Unified Threat Management, Managed Security, and the Cloud Services Model

INFORMATION PROTECTED

BYOD: End-to-End Security

The Software-Defined Enterprise. Thriving in the Mobile-Cloud Era

IBM EXAM QUESTIONS & ANSWERS

ForeScout MDM Enterprise

Delivering Desktop Resources to Any Device As a Service

Securing Virtual Applications and Servers

Enterprise Mobility: A Market Perspective!!

Delivering Control with Context Across the Extended Network

Mobile Device Management for CFAES

Delivering Managed Services Using Next Generation Branch Architectures

The ForeScout Difference

5 Must-Haves for an Enterprise Mobility Management (EMM) Solution

Injazat s Managed Services Portfolio

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

Cloud, security and the mobile enterprise: An end-to-end manageability challenge

SecureAge SecureDs Data Breach Prevention Solution

Security and Privacy Considerations for BYOD

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

How To Secure Your Mobile Devices

GREEN HOUSE DATA. 4 Steps to Secure BYOD. Using Virtual Desktops To Increase Productivity Without Increasing Risk. Built right. Just for you.

Fundamentals of Secure Collaboration in the Mobile Workforce. Sinisha Patkovic

Beyond Mobile Device Security: Why Comprehensive Endpoint Security and Management is a Must-Have for Small and Medium Enterprises

The Next Generation Data Centers: SPECS and The 3 rd Platform.

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

Enabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce

Securing Mobile Apps in a BYOD World

Simplifying Security & Compliance Innovating IT Managed Services. Data Security Threat Landscape and IT General Controls

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

Security Solution Architecture for VDI

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

How To Protect Your Cloud From Attack

Clodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

Productive and Secure Enterprise Mobility with Cisco and Citrix

Ensuring the security of your mobile business intelligence

The State of Application Delivery in 2015

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

VMware Strategy: The Software-Defined Enterprise

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Mobile device and application management. Speaker Name Date

Endpoint protection for physical and virtual desktops

Moving to the Cloud: What Every CIO Should Know

Security Issues in Cloud Computing

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

SANS Top 20 Critical Controls for Effective Cyber Defense

New Risks in the New World of Emerging Technologies

The Internet of Things: Opportunities & Challenges

Security Overview Enterprise-Class Secure Mobile File Sharing

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Secure Cloud Computing

Chief Security Strategist Symantec Public Sector

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

VPN Lesson 2: VPN Implementation. Summary

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

AHLA. JJ. Keeping Your Cloud Services Provider from Raining on Your Parade. Jean Hess Manager HORNE LLP Ridgeland, MS

Securing the Database Stack

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Transcription:

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved.

VMware: Addressing the Market From Data Center to Device Desktop Laptop Tablet Phone End-User Computing Machine Desktop Mobile Content Workspace Services Software-Defined Data Center Center Management & Automation Compute Storage Networking Virtualized Infrastructure Hybrid Cloud Computing 2

What Do They Want? End-User Goal: Flexibility of devices, ability to switch between devices seamlessly without compromise. IT Admin Goal: Simplified and unified management across all devices 3

CITY HOSPITAL

5

6

7

8

9

10

CITY HOSPITAL CITY HOSPITAL UNIVERSITY HOSPITAL

CITY HOSPITAL UNIVERSITY HOSPITAL

13

14

CITY HOSPITAL UNIVERSITY HOSPITAL 3D medical imaging on any device All my apps in one place Patient data on the go HIPAA compliant content collaboration

Mobile Cloud Architecture Define Centrally, Implement Locally 16

Where We are Headed The Virtual Workspace Access Client & Launcher App Store App Catalog Management Application Management Content Management Device Management Common Services Identity, Authentication, Single Sign-on Access Point Social 17

Unsolved Problems with Mobility Security Context Internet of Things

A Picture of Diminishing Returns The Only Thing Outpacing Security Spend Is Security Losses IT Spend Security Spend Security Breaches 19

Access Gateway Many Aspects of Enterprise Mobility Security Unapproved Apps, Access Access OS Versions, Jailbroken Device Personal App Data Leakage, Malware, Virus Corporate App OS Malware, Phishing, MITM App-level VPN Traffic MITM, Poor / No Encryption MITM Internet Sites Malware, Intrusion, DDoS & other vulnerabilities Intrusion Access to all / parts of app Management Server Device Hardware Device VPN Traffic Enterprise Apps & Data Repositories Storage Card USB Backups, Poor / No Encryption Storage SaaS Apps Access to all / parts of app, Data Leakage 20

Access Gateway Security Outside the Firewall Unapproved Apps, Access MAM Access OS Versions, Jailbroken Device Personal App Data Leakage, Malware, Virus Corporate App OS MCM Malware, Phishing, MITM App-level VPN Traffic MITM, Poor / No Encryption MITM Internet Sites Malware, Intrusion, DDoS & other vulnerabilities Intrusion Access to all / parts of app Management Server MDM Device Hardware Storage Card USB Device VPN Traffic Gateway Enterprise Apps & Data Repositories Backups, Poor / No Encryption Storage SaaS Apps Access to all / parts of app, Data Leakage 21

Open Problems with Security Outside the Firewall Are there other layers for enforcing app and data security? How can IT balance security with ease of use? Can we take risk-based approaches? 22

Access Gateway Security of the App: App Scanning/Behavior Analysis Unapproved Apps, Access Access OS Versions, Jailbroken Device Personal App Data Leakage, Malware, Virus Corporate App OS Malware, Phishing, MITM App-level VPN Traffic MITM, Poor / No Encryption MITM Internet Sites Malware, Intrusion, DDoS & other vulnerabilities Intrusion Access to all / parts of app Management Server Device Hardware Device VPN Traffic Enterprise Apps & Data Repositories Storage Card USB Backups, Poor / No Encryption Storage SaaS Apps Access to all / parts of app, Data Leakage 23

Open Problems with App Scanning What is the right way to characterize app behavior? How generic can these behavioral algorithms be? Is app scanning even the right approach? 24

Access Gateway Security Inside the Firewall Unapproved Apps, Access Access OS Versions, Jailbroken Device Personal App Data Leakage, Malware, Virus Corporate App OS Malware, Phishing, MITM App-level VPN Traffic MITM, Poor / No Encryption MITM Internet Sites Malware, Intrusion, DDoS & other vulnerabilities Intrusion Access to all / parts of app Management Server Device Hardware Storage End-user USB Card Context! Device VPN Traffic VPN Enterprise Apps & Data Repositories Network Virtualization Backups, Poor / No Encryption Storage SaaS Apps Access to all / parts of app, Data Leakage 25

Open Problems with Security Inside the Firewall How we can automate the creation of micro-tunnels to segment traffic? Can we detect suspicious activity based on behavior analysis? Can we transparently modify app behavior based on risk/threat? 26

Access Gateway Securing the Data Itself Unapproved Apps, Access Access OS Versions, Jailbroken Device Personal App Data Leakage, Malware, Virus Corporate App OS Malware, Phishing, MITM App-level VPN Traffic MITM, Poor / No Encryption MITM Internet Sites Malware, Intrusion, DDoS & other vulnerabilities Intrusion Access to all / parts of app Management Server Device Hardware Device VPN Traffic Enterprise Apps & Data Repositories Storage Card USB Backups, Poor / No Encryption Storage SaaS Apps Access to all / parts of app, Data Leakage 27

Open Problems with Securing the Data Itself How do we automatically identify important content that shouldn t be leaking? Is the container or encryption route the better choice? Is there a 3 rd option? Can we enable any app to open or edit an encrypted document? 28

Unsolved Problems with Mobility Security Context Internet of Things

IoT Growth Connected Things Exceeds, and Growing Much Faster Than, Number of People 2000 2010 2020 6.1 Billion people 6.8 Billion people 7.6 Billion people 200 Million connected devices 0.03 devices per person 12.5 Billion connected devices 1.8 devices per person 50 Billion connected devices 6.6 devices per person Source: Cisco IBSC 2011 30

IoT Bettering Lives Connect Apply Measure Transmit Receive GLUCOSE 63 SEND 63 Blood Glocose is NORMAL Remote Acquisition

IoT Use Cases Healthcare Patients with non-life-threatening conditions can be monitored remotely/from home by medical staff Smart Asset ID & Tracking used across drug supply chain to prevent drug counterfeiting Industrial & Manufacturing Intelligent commercial aircrafts accurately predict which parts need replacement and when, and optimize inventories & maintenance schedules across entire fleet Smart manufacturing process respond quicker to changing customer demand, with self-organized logistics automatically optimizing production rates and inventories Electricity Smart power generation & transmission grid analysis status updates and performance data for preemptive actions, reducing number and duration of outages Smart buildings and homes analyze real time arrival and usage data to turn on/off electric devices, reducing waste and impact of energy vampires Urban Infrastructure Smart traffic management uses city-wide visibility, smart signals, and traffic flow adjustments to help alleviate congestion and rapidly respond to incidents Smart grid aggregates data from metering devices CONFIDENTIAL 32

Biggest Challenge for IoT Lack of Standards Today Tomorrow

End-to-End Integration: Eliminate Silos End Points Gateway/Transmission Data Store Data Analytics Data Analytics Private Public Big Data GATEWAY 34

Open Problems with End-to-End Integration How can we achieve common standards, APIs, and definitions for each area? Is there a general approach, or does it need to be more specific, e.g. by industry vertical? How can we handle the privacy implications of this always-on big data collection and analysis? 35

M2M Integration: Connecting End Points Locally On a factory floor On a highway In a hospital 36

Open Problems with Local M2M Integration How can we achieve common standards, APIs, and definitions for these interactions? How do we establish trust between local devices? How do we ensure the protection of data as it moves between devices? 37

Shifting Landscape Mobile/cloud architecture driving new and compelling architecture Mobile Cloud Architecture Changing industries, and industries adapting rapidly Many unsolved challenges around security, context, and Internet of Things 38

How You Can Help Security innovation from many different angles Mobile Cloud Architecture New insights by analyzing all the data at our fingertips Driving IoT standards at all levels 39

Thank you!