Enabling Staff with Secure Mobile Technology in an Increasingly Risky World



Similar documents
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Mobile Device Security Is there an app for that?

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

10 best practice suggestions for common smartphone threats

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Mobile Security: The good, the bad, the way forward

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management.

SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility.

Guideline on Safe BYOD Management

Use Bring-Your-Own-Device Programs Securely

Chris Boykin VP of Professional Services

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Symantec Mobile Management 7.2

Bring Your Own Device (BYOD) and Mobile Device Management

Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability

Wireless (In)Security Trends in the Enterprise

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

How To Protect Your Mobile Devices From Security Threats

Extending Collaboration to BYOD Devices

Best Practices for Secure Mobile Access

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

Successful Mobile Deployments Require Robust Security

Enterprise Mobility as a Service

Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

Secure Your Mobile Device Access with Cisco BYOD Solutions

GAO INFORMATION SECURITY. Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Mobile Device Management for CFAES

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Adams County, Colorado

Addressing NIST and DOD Requirements for Mobile Device Management

Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities

Mobile First Government

Symantec Mobile Management 7.2

Supplier Information Security Addendum for GE Restricted Data

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

Meru MobileFLEX Architecture

Windows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network

MaaS360 Mobile Service

ForeScout CounterACT. Continuous Monitoring and Mitigation

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Dell Bring Your Own Device

IBM Endpoint Manager for Mobile Devices

BYOD: BRING YOUR OWN DEVICE.

SonicWALL Makes Wireless Networking Secure

Don t Let A Security Breach Put You Out of Business

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE.

WE THRIVE ON YOUR SUCCESS

Kaspersky Security for Mobile

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

BYOD. opos WHAT IS YOUR POLICY? SUMMARY

Symantec Mobile Management 7.1

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions

XX-XXX Wireless Local Area Network Guidelines. Date: August 13, 2003 Date Adopted by NITC: Other:

End-to-end data protection solutions

How To Secure Your Mobile Devices

Endpoint data protection solutions for Healthcare

POLICY ON WIRELESS SYSTEMS

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

The flexible workplace: Unlocking value in the bring your own device era

BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE

WHITE PAPER. Ensuring Compliance with DoD Wireless Policies

Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence.

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

BEST PRACTICES FOR SECURE REMOTE ACCESS A GUIDE TO THE FUTURE

Directives and Instructions Regarding Wireless LAN in Department of Defense (DoD) and other Federal Facilities

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Wi-Fi, Health Care, and HIPAA

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Enterprise Mobility Management

BYOD. Bring Your Own Device - Mobile Device Management.

How to Secure Your Environment

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

If you can't beat them - secure them

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

Athena Mobile Device Management from Symantec

How To Write A Mobile Device Policy

Mobile Device Security Risks and RemediaAon Approaches

Certified Wireless Security Professional (CWSP) Course Overview

Symantec Mobile Management 7.1

PCI v2.0 Compliance for Wireless LAN

Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines

Securing end-user mobile devices in the enterprise

Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks

Data Protection Act Bring your own device (BYOD)

End-to-End Data Protection Solutions for the Enterprise

3 Steps to Implementing an Effective BYOD Mobile Security Strategy

Mobility Challenges & Trends The Financial Services Point Of View

Transcription:

Enabling Staff with Secure Mobile Technology in an Increasingly Risky World Dan Campbell March 27, 2012 301-841-7400

Mobility = Mission Critical Mobility is no longer a luxury, it s a necessity Organizations encouraging telecommuting, hoteling, working remotely Individuals are used to being constantly connected Cultural shift towards smart phones, tablets, wireless Staff prefer to select and use personal devices over GFE Organizations can reduce hardware, support and service contract costs by permitting and promoting a BYOD culture Borderless networking and constant connectivity are vital Capabilities are tempered by the need to ensure data integrity and transaction security 2

Constant Connectivity Wireless Mobile Handhelds and Tablets Remote Access VPN Virtual Desktop Infrastructure How often do you work offline now? 3

Wireless Best Practices Risk-based approach Define requirements according to organizational risk tolerance Prioritize risks and map to available resources Deploy solutions that balance risk with capabilities Adhering to standards Review NIST, DoD, vendor and other industry sources Tailor guidelines according to the unique requirements and security posture of your organization There is no one size fits all. Risk is partially subjective and relative. Use your own judgment according to your environment. 4

Wireless Best Practices Standards-based technology deployment FIPS approved hardware 802.11i, EAP, WPA2-Enterprise authentication, AES-CCMP encryption Machine and user authentication, certificates, NAC, SSO, 2FA Tune signal strength to reduce leakage and limit access Supplement wired network IDS/IPS with wireless IPS (WIPS) Security Develop policies on access control, authentication, acceptable use, dual-connected laptops, ad hoc networks, public wifi hotspots Perform continuous monitoring for security breaches, rogue APs, SSID spoofing, intrusion attempts, interference as DoS Update security awareness training, policies and procedures 5

Guidelines and Standards 800-48 Guide to Securing Legacy IEEE 802.11 Wireless Networks 800-53 Recommended Security Controls for Federal Information Systems and Organizations 800-94 Guide to Intrusion Detection and Prevention Systems 800-97 Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11ie 800-114 User s Guide to Securing External Devices for Telework and Remote Access 800-120 Recommendation for EAP Methods Used in Wireless Network Access Authentication DISA STIG - Wireless Security Technical Implementation Guide (v6r2), 23 April 2010 DISA STIG - Wireless LAN Security Framework (v1r0), Addendum to the Wireless Security Technical Implementation Guide, Draft, 10 February, 2005 Wireless Communication Standard, 2008 6

Mobile Handhelds and Secure Messaging Review industry standards and best practices, e.g., DISA STIGs Consider whether device is GFE / Corporate or personally-owned Policies will need to be balanced if personally-owned Develop requirements and policies Tailor guidelines to organization-specific risk tolerance Stay in the application sandbox to the extent possible Prevent copying data or storing documents outside the application Avoid mixing the enterprise and personal contact lists Enforce password policies, complexity, expiration, lockout Ensure remote wipe capability for lost devices 7

Mobile Handhelds and Secure Messaging Increase security awareness Smartphones are like computers - vulnerable to worms and viruses Staff must be cognizant that their personal device contains organizational data Develop procedures for lost devices, notification and remote wipe Staff may have to be flexible Abide by organization security requirements May limit some aspects of smart phone capabilities Prohibit the use rooted androids and jailbroken iphones Detect for rooted / jailbroken phones periodically and wipe data 8

Guidelines and Standards DISA STIG DISA STIG DISA STIG 800-101 800-121 800-124 Good Windows Phone Hardening Guide Good Android Hardening Guide Good ios Hardening Guide Guidelines on Cell Phone Forensics Guide to Bluetooth Security Guidelines on Cell Phone and PDA Security Sandbox philosophy may need to be flexible as staff increasingly use tablets with local applications to balance security and capabilities. 9

Remote Access VPN Previously was for occasional use Off hours or weekends to check email or do timesheet Now a primary means of connecting to enterprise resources Telecommuting, travel, hoteling Access beyond email to most if not all enterprise applications Staff access enterprise resources anywhere Home, hotels, coffee shops and other public hotspots Staff expectation is for there to be little if any difference in network experience, performance and capabilities Remote access is an extension of the enterprise network 10

Virtual Desktop Infrastructure VDI is emerging as a popular means for endpoint deployment Replacing laptops and traditional desktop computers Reduce hardware, licensing and support cost Ease operation - images, troubleshooting, policy changes Improve security by reducing endpoint intelligence Constant connectivity is required for a successful VDI deployment Off-net capabilities limited Network access to enterprise resources is now critical just for basic device functionality Network performance is even more vital 11

Takeaways Mobility = Mission Critical Staff require flexibility Being offline is rare - constant connectivity is vital Mobile solutions are virtual extensions of physical networks Deploy mobile solutions using a risk-based approach No one size fits all guideline for risk assessment Define solutions according to organizationally-specific criteria Security and capabilities must coexist and find balance 12

Action Items Review wireless security policies and risk mitigation strategies Compare your deployment with industry best practices from a variety of sources Review training plans and increase security awareness to ensure staff are cognizant of risks Perform continuous monitoring and constantly look to improve service and security through tools and procedures Conduct periodic reviews of policies, procedures and designs against changes to standards, technology or threats Never sit still. Stay mobile! 13

Realize Tomorrow. Today.