Best Practices for a BYOD World



Similar documents
Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both!

Cybercrime Security Risks and Challenges Facing Business

Protecting the Infrastructure: Symantec Web Gateway

Cyber and Mobile Landscape, Challenges, & Best Practices

ORGANIZADOR: APOIANTE PRINCIPAL:

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

STATE OF THE DATA CENTER SURVEY GERMANY RESULTS

Avoiding The Hidden Costs. of the Cloud

How To Get A Cloud Service For A Small Business

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

IT Self Service and BYOD Markku A Suistola

Mobile App Management:

Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It

Risk and threats everywhere, all the time

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

#ITtrends #ITTRENDS SYMANTEC VISION

The Symantec Smartphone Honey Stick Project

Secure Your Mobile Workplace

Symantec Mobile Management Suite

Athena Mobile Device Management from Symantec

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

On and off premises technologies Which is best for you?

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Securing OS Legacy Systems Alexander Rau

Symantec Mobile Management for Configuration Manager 7.2

Symantec Endpoint Protection 12.1 Symantec Protection Center 2.0

Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO Annual 3rd party application Pen Tests.

Symantec Mobile Management 7.2

Symantec Mobile Management 7.1

Cisco Mobile Collaboration Management Service

Cisco Conference Connection

Symantec Mobile Management 7.1

Integrating MSS, SEP and NGFW to catch targeted APTs

Better Together: Microsoft Office 365 & Symantec Office 365

Managing SSL Certificates with Ease

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Governance, Risk and Compliance Assessment

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

How To Manage An Ip Telephony Service For A Business

ForeScout MDM Enterprise

Preemptive security solutions for healthcare

Websense Data Security Solutions

How To Protect Your Endpoints From Attack

The ForeScout Difference

Payment Card Industry Data Security Standard

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

Trend Micro Cloud Security for Citrix CloudPlatform

Voice Internet Phone Gateway

Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment

Technical Note. ForeScout MDM Data Security

Addressing Evolving Threats & Responses in a MITA 3.0 World Robert Myles, CISSP, CISM

Securing Corporate on Personal Mobile Devices

Asia-Pacific Secure Content Management Market 2012 Stable Growth is Anticipated in the and Web Security Segments

Business Attitudes Toward Cybersecurity 2014

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

United Kingdom Internet Security Threat Profile

Embracing Complete BYOD Security with MDM and NAC

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

How To Use An Ibm Cloud Server For Business

Optimizing the Mobile Cloud Era Through Agility and Automation

How To Support Bring Your Own Device (Byod)

Privilege Gone Wild: The State of Privileged Account Management in 2015

Quantum View SM Manage Administration Guide

The Oracle Mobile Security Suite: Secure Adoption of BYOD

E-Seminar. Financial Management Internet Business Solution Seminar

A number of factors contribute to the diminished regard for security:

Enterprise- Grade MDM

IP Trading Solutions

Teradata and Protegrity High-Value Protection for High-Value Data

INFORMATION PROTECTED

Contact Centre Integration Assessment

Kaspersky Security for Mobile

Four steps to improving cloud security and compliance

IBM Endpoint Manager for Mobile Devices

10 best practice suggestions for common smartphone threats

Websense Messaging Security Solutions. Websense Security Websense Hosted Security Websense Hybrid Security

IBM Security Privileged Identity Manager helps prevent insider threats

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

OVERVIEW. Enterprise Security Solutions

CaliberRM / LDAP Integration. CaliberRM

Transcription:

Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist

Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2

Mobile Threats Expose Organizations and Consumers 3

Symantec Global Intelligence Network Identifies more threats, takes action faster & prevents impact Calgary, Alberta Dublin, Ireland San Francisco, CA Mountain View, CA Culver City, CA Austin, TX Chengdu, China Taipei, Taiwan Tokyo, Japan Chennai, India Pune, India Worldwide Coverage Global Scope and Scale Rapid Detection 24x7 Event Logging Attack Activity 240,000 sensors 200+ countries and territories Malware Intelligence 180M client, server, gateways monitored Global coverage Vulnerabilities 50,000+ vulnerabilities 15,000+ vendors 105,000+ technologies Spam/Phishing 5M+ decoy accounts 8B+ email messages/day 1B+ web requests/day Preemptive Security Alerts Information Protection Threat Triggered Actions 4

Mobile Malware on the Rise This represents families of mobile malware There are 3,000-4,000 variants in the wild today and growing 5

Mobile Threats Focus Areas for Malware Authors Stealing information, spying and sending SMS messages Malware authors porting old threats and working on new ones Most popular way to make money - Sending premium SMS 6

A New Source of Data Breaches Mobile devices contain work and personal information Unlike a desktop computer they are easily stolen. And often lost 7

Project Honey Stick Los Angeles San Francisco Washington, D. C. New York Ottawa 8

9

10

It doesn t matter where the information is!!! EMAIL ADDRESS ACCOUNT INFO DATES OF BIRTH SOCIAL SECURITY NUMBERS USER IDS EMAIL CONTACTS PASSWORDS IP ADDRESSES NAMES DATA PURCHASES EMAIL ADDRESS ACCOUNT INFO DATES OF BIRTH SOCIAL SECURITY NUMBERS USER IDS EMAIL CONTACTS PASSWORDS IP ADDRESSES NAMES DATA PURCHASES 11

Changes In Working Style 80% 1 65% 2 52% 3 New apps deployed in the cloud Enterprises allow mobile access to their network Workers use three or more devices Sources: 1. IDC Predictions 2012: Competing for 2020, Frank Gens, IDC, December 2011 2. The Impact of Mobile Devices on Information Security: A Survey of IT Professionals, Check Point, January 2012 3. Info Workers Using Mobile And Personal Devices For Work Will Transform Personal Tech Markets, Frank E. Gillett, Forrester Research, February 22, 2012 12

No Conventional Control 13

2013 Symantec State of Mobility Canada 14

Methodology ReRez surveyed 3,236 global organizations across 29 countries North America (2 countries) United States Canada Latin America (9 countries) Mexico Brazil OLAM EMEA (5 countries) United Kingdom Germany France Italy South Africa APJ (13 countries) China Japan Australia/New Zealand India Singapore South Korea Hong Kong Malaysia Taiwan Thailand Philippines Indonesia 15

Innovators vs. Traditionals Innovator Organizations Welcome change View change as opportunity Early adopters of new technology Proactive (create change) Innovative (change to create opportunity) Traditional Organizations Only change after studying the issue View change as risk Late adopters of new technology Reactive (react to change if necessary) Employ time-honoured practices 16

Key Findings 1. Innovators have different attitudes about mobility 2. Mobility is more prevalent in Innovators 3. Mobility policy and management more evolved in Innovators 4. Innovators experience more mobility costs 5. Innovators experience more mobility benefits 17

Innovators Attitudes are Different Innovators motivated to pursue mobility by business drivers 84% of Innovators consider important (higher than any other driver) 52% for Canada Traditionals motivated by end user demand 51% of Traditionals consider important (higher than any other driver) 50% for Canada Innovators say mobility risk worth the opportunity (Traditionals don t agree) 37% for Canada 18

Mobility More Prevalent in Innovators Significantly more employees using smartphones 55% of Innovators vs. 44% of Traditionals employee phones purchased by company 56% for Canada More likely to use business apps on mobile devices 83% of Innovators discussing private app store for business-related mobility apps, vs. 55% of Traditionals 52% for Canada 19

Mobility Management More Evolved in Innovators More likely to have a mobility policy More likely to extend management to employee-owned devices More aggressive in enforcing policy (use technology instead of manual) 60% Innovators vs. 33% Traditionals 36% for Canada More likely to adopt mobility information protection measures More likely to adopt mobility management measures 20

Innovators Experience More Mobility Costs 21

Innovators Experiencing Larger Mobility Benefits 22

Best Practices for BYOD 23

Recommendations 1. Being cautious about mobility is okay. Being resistant is not. Start embracing it. 2. Start with the apps with greatest productivity benefits for employees. 3. Learn from the innovators get the benefits while minimizing the risks. 24

Managed Unmanaged Evolving Endpoint Adoption Map Evolving Focus Company Owned But Unmanaged Company Controls Relevant Apps & Data Only Traditional Focus Company Controls Standard Device Company Controls Personal Device Company-owned Personally-owned 25

Comprehensive Device Management Configure Devices Self-service enrollment Configure Email, VPN, Wi-Fi Identity Certificates Distribute Apps In-house apps or public-store apps Docs, videos any active content Group based management Manage Assets Centralized visibility and control Automated workflows Scalable to 20,000+ devices Apply Policies Passwords, App restrictions Compliance with Jailbreak Selective wipe and Full wipe 26

Secure Access Wi-Fi VPN CA Network Access 27

Protect Apps and Data Clear Separation of Information Personal apps Personal data Corporate apps Per-app policies Pinpoint revocation 28

Bring Your Own Device (BYOD) Success = Mastering BYOD Control Points Devices Apps Data without disrupting user experience 29

Mitigating Mobile Threats Device Management Device Security Remotely wipe devices in case of theft or loss Update devices with applications as needed without physical access Get visibility and control of devices, users and applications Guard mobile device against malware and spam Prevent the device from becoming a vulnerability Enforce compliance across organization, including security standards & passwords Content Security Identify confidential data on mobile devices and use technologies to prevent future exposure Protect data from moving between applications Encrypt mobile devices to prevent lost devices from turning into lost confidential data Identity and Access Provide strong authentication and authorization for access to enterprise applications and resources Ensure safe access to enterprise resources from right devices with right postures 30

Best Practices for BYOD Assess Data Classification Assess threats, conduct a risk analysis, run a policy audit and an apps audit, evaluate architectural planning and security. Determine what sensitive information exists in your organization Categorize it appropriately and protect it according to its classification level Encryption Create and enforce security policies so all confidential information is encrypted Data Loss Prevention Discover data spills of confidential information. Detect and prevent exfiltration of confidential information Security Awareness Training Ensure employees become the first line of defense against socially engineered attacks, such as phishing, spear phishing, and other types of attacks 31

Thank you! Copyright 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 32