White Paper Hyper-Mobility meets Security in the corporate environment



Similar documents
How To Protect Your Smartphone From Attack From A Hacker (For Business)


Feature List for Kaspersky Security for Mobile

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

Kaspersky Security for Mobile

Kaspersky Security 10 for Mobile Implementation Guide

SECURING TODAY S MOBILE WORKFORCE

Symantec Mobile Management 7.1

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Internet Malware Threats for School and Students

Symantec Mobile Management 7.1

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Symantec Mobile Management 7.2

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

Symantec Mobile Management for Configuration Manager 7.2

Guideline on Safe BYOD Management

Mobile Operating Systems & Security

BEST PRACTICE GUIDE TO ENCRYPTION.

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List

World-class security solutions for your business. Business Products. C a t a l o g u e

Kaspersky Security for Mobile Administrator's Guide

Kaspersky Endpoint Security 8 for Smartphone for Android OS

Symantec Mobile Management 7.2

What Do You Mean My Cloud Data Isn t Secure?

Proven LANDesk Solutions

Mobile Security: Controlling Growing Threats with Mobile Device Management

Symantec Mobile Management Suite

10 Quick Tips to Mobile Security

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY

Securing mobile devices in the business environment

BOYD- Empowering Users, Not Weakening Security

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

BENEFITS OF MOBILE DEVICE MANAGEMENT

Certified Secure Computer User

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

A guide to enterprise mobile device management.

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

SecuRity technologies for mobile and Byod.

10 best practice suggestions for common smartphone threats

Codeproof Mobile Security & SaaS MDM Platform

Athena Mobile Device Management from Symantec

My CEO wants an ipad now what? Mobile Security for the Enterprise

Endpoint protection for physical and virtual desktops

Why AVG? Reasons to choose AVG. The AVG Difference: People who know security recommend AVG

Addressing Security Issues The ecopy solution for document imaging

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Kaspersky Security for Business

KASPERSKY SECURITY FOR BUSINESS

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

for businesses with more than 25 seats

people-powered protection

Cybersecurity Tips for Startups and Small Businesses

VIRTUALIZATION SECURITY IS NOT AN OXYMORON. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Emerging Trends in Malware - Antivirus and Beyond

Securing end-user mobile devices in the enterprise

Why you need. McAfee. Multi Acess PARTNER SERVICES

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Symantec Mobile Security

always on meet the it department PROPHET managed services ebook Business Group Meet the Always On IT Department

End-user Security Analytics Strengthens Protection with ArcSight

Internet threats: steps to security for your small business

7 Simple Smartphone Privacy Tips:

Top tips for improved network security

Enterprise Mobility as a Service

Perception and knowledge of IT threats: the consumer s point of view

MAXIMUM PROTECTION, MINIMUM DOWNTIME

Computer Security at Columbia College. Barak Zahavy April 2010

Sybase Afaria. Comprehensive Management and Security for the Mobile Enterprise PRODUCT BROCHURE.

How to Use Windows Firewall With User Account Control (UAC)

EndUser Protection. Peter Skondro. Sophos

What you need to know to keep your computer safe on the Internet

Securing your Mobile Environment. Mark Villinski Kaspersky Lab Jeremy Clough Gorham Savings Bank

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

SECURE SHARING AND COMMUNICATION. Protection for servers, and collaboration

The User is Evolving. July 12, 2011

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity

For Businesses with more than 25 seats.

BEST PRACTICES. Encryption.

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT -BASED THREATS

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

BitDefender Client Security Workstation Security and Management

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

October Is National Cyber Security Awareness Month!

Endpoint protection for physical and virtual desktops

Certified Secure Computer User

Introduction (Contd )

Five Trends to Track in E-Commerce Fraud

security technologies For MobiLe AnD byod global security IntellIgence

3 Marketing Security Risks. How to combat the threats to the security of your Marketing Database

AVeS Cloud Security powered by SYMANTEC TM

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e

Transcription:

White Paper Hyper-Mobility meets Security in the corporate environment www.kaspersky.com

Mobile security in corporate environments Smartphone adoption is accelerating at a rapid rate, as today many companies need their hypermobile employees to be online not only in the offi ce but also on the move viola! The corporate smartphone comes to the rescue. A new trend shows many companies offering employees their choice of end device as an incentive. Calls, messaging, email, access to corporate network resources and the Internet smartphones provide complete pocket-sized connectivity. Huge amounts of valuable business-related information may be stored and processed on a mobile device, and this means that smartphones make attractive targets for criminals, leading to corporate data leakage, unauthorized access and malware infection. Sales of smartphones have even overtaken those of PCs, and the devices are becoming increasingly popular for both business and private use. So, even where the company may not have provided their staff with a smartphone it is more common for some employees to use their device for work. As a result, companies which don t necessarily require their staff to use smartphones are becoming obliged by their employees usage and personal experience of these practical devices to implement them for business purposes a trend known as Consumerization of IT. Smartphones are small and that makes them easy to lose or steal. After looking down the back of the sofa we realize we ve left our devices on tables in restaurants and cafes, in taxis and on aircraft, or they re stolen from busy places we visited. In the UK alone during 2010, 228 phones were reported stolen every hour [1]. Each of these devices may store sensitive corporate emails, customer contact details, fi nancial reports and analyses, as well as personal data like mobile banking details. Also, because of our work/life balance, most of these devices also contain login information to our social media accounts like Facebook. Mobile devices are often not protected from mobile malware as this threat is not as well publicized as PC malware, and is thus frequently ignored. This can be dangerous as malware exists for every major smartphone platform. It can easily infect a user s device and start secretly sending SMSs to premium rate numbers, thus stealing money from the user s mobile account, while other programs are designed to secretly collect user details for the purposes of fraud. 2

The dynamic smartphone market Anyone looking closely at the smartphone market will notice that there is currently no operating system which predominates to the extent that Windows does for computers. Instead, as Canalys latest market analysis [2] shows, several providers are well-positioned and are helping themselves to respectable pieces of the smartphone pie. Thanks to a wide range of devices which span the price spectrum, the Android platform has profi ted most from the recent market growth. With 33.3 million Android smartphones sold, Google has secured itself a market share of 32.9 percent, making it the market leader. Second place is, however, not occupied by Apple and its ubiquitous iphone. Instead, Symbian s market share of 30.6 percent (31 million devices) puts it right behind Google and clearly ahead of Apple. Only then does the iphone operating system ios enter the fi eld, with 16.2 million devices and a market share of just 16 percent. Next are the BlackBerry devices so popular with business users, at 14.4 percent. Bringing up the rear is Microsoft with its current Windows operating system and a total market share of 3.1 percent. As a current survey carried out by Forbes Insights [3] shows the proliferation of these devices in business. 87 percent of management in US companies use laptops, and 82 percent also own smartphones. 28 percent are dual-device owners who, in addition to a BlackBerry the classic corporate mail machine also own an Android-based mobile device or an iphone. The smartphone is the communication device of choice for more than half of those surveyed. That s quite a feat for a device that didn t even exist as we know it until 2000. Windows Mobile 3.1% RIM (BlackBerry) 14.4% ios 16.0% Android 32.9% Symbian 30.6% 3

Smartphone protection is mandatory A December 2010 Threatpost study revealed that 69% of companies did not require security software on their smartphone, even though 60% of the companies surveyed had already experienced an attack or threat [4]. This is a recipe for disaster. Why should companies incorporate smartphones into their security strategies? The simple answer is that smartphones have many uses, making it important to protect these mobile platforms. In companies, smartphones are most commonly used to access communications networks primarily phone and email systems, but also (and increasingly) other messaging systems, including scheduling management systems. They are also used to gain comprehensive access to contact databases and order-entry systems. In such cases, the confi dentiality of sensitive company data must be ensured. Third parties should not be permitted access to business emails, nor of course should they be able to access customer or vendor information. Calls E-Mail Messaging Systems Contact Databases Scheduling VPN Access Social Media Services ERP Systems Employees usually use a VPN connection to log onto the corporate network and access fi les and business applications like ERP systems (Enterprise Resource Planning). It is important that companies take action here to prevent unauthorized users from accessing internal company information, siphoning off data, or manipulating existing applications. For years, it has been common practice for companies to have protective strategies in place to cover their servers, workstations and other IT components. Protecting smartphones used for business purposes is, unfortunately, not yet a fi xed component of corporate security policies. Given the various smartphone uses listed above, protecting your company s smartphones is critical. 4

Key Threats associated with leaving smartphones unprotected There are three basic scenarios against which smartphones should be protected. The most common is loss or theft which could result in corporate data leakage. The next is unauthorized smartphone access which leads to corporate data misuse. The third is malware specifi cally designed for mobile devices. What makes this case different, however, is that the attackers do not have physical access to the device and this attack can initiate the other two scenarios remotely. Kaspersky Endpoint Security 8 for Smartphone is designed to fully close these loopholes. It can remotely connect to a device and protect it if it is lost or stolen, securing it against malicious and fraudulent software and encrypting the valuable data on it. Loss due to... Theft Stress Forgetfulness Leaving phone behind Unauthorised access by... Co-workers Third parties Family members Malware Viruses Text attacks Targeted data theft Remote Lock & Wipe GPS Find SIM Control Centralized Deployment and Management Anti-Virus + Firewall Encryption Anti-Spam for Calls & SMSs 5

Protecting yourself against loss and theft If your smartphone is lost or stolen, a third party gains physical access to your device. If the fi nder is dishonest, he or she now has all the time in the world to access the information stored on the smartphone. Not only is the data stored on the mobile device itself valuable, but login information for corporate networks or communications services is also of interest. If VPN or mail server passwords are stored in your phone, the thief only has to touch the appropriate application to gain access. Protective software like Kaspersky Endpoint Security 8 for Smartphone contains special anti-theft functions to prevent third parties from accessing information on missing devices. Lost smartphones can even be blocked remotely using special management software. Devices with GPS receivers a feature which is already built into most business smartphones can also be located. Alternatively, you could take more drastic measures and use a delete command to restore the device completely to its factory settings. While the lost device itself must still be replaced, the cost will be far less than that of a data breach. A professional thief will quickly take measures to avoid being detected. One of their fi rst acts will be to remove the SIM card. Here, too Kaspersky Endpoint Security 8 for Smartphones has a solution: the SIM Watch function enables management software to keep track of the device, even if the SIM card is removed. Even the new mobile number is automatically texted to the phone s rightful owner. But what if the smartphone can t be locked down in time? In such cases, encryption comes in handy. This tried and tested method has proven effective in protecting data on laptops for years. Files, folders and storage media can be irrecoverably encrypted using Kaspersky Endpoint Security, ensuring that only those with the correct password can access the data. The perfect protective software for mobile devices: Access blocks Encryption Privacy protection Over-the-air management Support for rules Multi-platform support 6

Avoid Minimizing Mobile Threats The problem of mobile malware is one which is often dismissed. After all, the numbers cannot possibly compare to the current Windows situation. While malware for diverse mobile platforms do exist such as DroidDream (rootkit) or Trojans which send texts to premium services in order to run up huge bills for the phone owners, for example there have only been a few major virus outbreaks to date. Caution is, however, advised, as the increasing popularity of smartphones and tablets is making them interesting targets for malware authors. It is also worth noting that not all virus attacks are necessarily aimed at causing media sensations. Security experts have been observing the malware scene s increasing professionalization for years now. Quality comes before quantity, and if someone is interested in the data on your fi eld sales team s smartphones, a targeted attack is a genuine risk. Our advice is to take precautions using mobile malware protection. Kaspersky Endpoint Security 8 for Smartphones protects mobile devices in real time and performs scheduled malware checks of entire devices. This can prevent data thieves gaining a head start, thus nipping major threats in the bud. In addition to a mobile protection solution, an anti-spam module is also important. Its functionality should not be limited to emails instead, it should also fi lter unsolicited texts and calls. Additional security measures While access blocks and encryption will help to conceal information, sophisticated protection software also has other useful tricks up its sleeve, including privacy protection features. Kaspersky Endpoint Security 8 for Smartphone, for example, enables users to hide individual contacts, call lists and texts. Simple smartphone security Smartphones can do a great many things, and the threats affecting them are diverse. Luckily, protecting these mobile all-rounders is very easy to do. When choosing appropriate protective software for smartphones, companies should take into account the following three points. 7

Management functions Confi guring one smartphone manually is easy. Confi guring fi ve or more can be a nuisance, and confi guring more than ten is uneconomical without a centralized management interface which allows access to mobile devices for maintenance purposes. This is precisely what Kaspersky Endpoint Security 8 for Smartphone provides. As administration can also be performed remotely, the IT team retains total control of the devices at all times. This enables updates and new programs to be installed easily and in a targeted manner. When choosing a mobile security suite, you should also bear in mind that, as well as being managed through the Kaspersky Administration Kit, Kaspersky Endpoint Security can also be integrated seamlessly into existing management environments for mobile devices such as Microsoft s mobile device manager or Sybase Afaria. Rules Who can do what on your network? Policies have become indispensible for companies and not just for compliance reasons. Instead, they are also a must for seamless, secure smartphone integration. Kaspersky Endpoint Security enables rules to be assigned to various user groups over-the-air, of course. This enables administrators to conveniently adjust the smartphones anti-virus settings and to defi ne which fi le types should be scanned for malware and which should not. Phone rules can enable users to hide individual contacts, call lists and texts. And, of course, the anti-theft function can be confi gured to a very detailed level. Do you want to delete the contents of stolen smartphones remotely? You can defi ne rules which enable you to do this. When it comes to encryption, too, IT holds all the cards. Rules are used to defi ne which folders must be encrypted. Another advantage is that employees don t need to do anything their smartphones will automatically be confi gured. The bottom line is that administrators save tremendous amounts of time and, therefore, money. After all, using remotely-set rules eliminates the need for smartphones to be collected, docked with a PC, or continuously connected to the corporate network in order to have their security settings adjusted. Protection for all platforms You certainly don t want a different protection vendor for each brand of smartphone you deploy. The protective software you choose must support all the mobile platforms your company currently uses. Kaspersky Endpoint Security 8 for Smartphone currently supports Android, Symbian, Blackberry and Windows Mobile devices all from the same, single console used to monitor your entire network s Kaspersky deployment. As Kaspersky Lab s protective solutions require very little in the way of resources, there will be no negative effects on your mobile devices performance. 8

About Kaspersky Lab Kaspersky Lab is the world s largest privately-owned Internet security company. Our products provide complete protection for home users, mobile users, small-to-medium sized businesses and large enterprises against all forms of IT threats such as viruses, spyware, hacking and spam. We believe that everyone should be free to get the most from technology without intrusion or other security worries. Our team of specialists gives you the freedom to live your digital life without worrying about your personal information and assets. For 13 years, we have worked on exposing, analyzing and neutralizing IT threats. Along the way, we have amassed a tremendous amount of experience and knowledge about malware and how to deal with it. Today, Kaspersky Lab is fi rmly positioned as one of the world s top four leading IT security software vendors for endpoint users. Kaspersky Lab is an international company that employs over 2,200 highly-qualifi ed specialists. With central offi ces in Moscow, we actively market in over 100 countries across the globe and have territory offi ces in 27 countries. Our products and technologies provide protection for almost 400 million users worldwide. Our corporate client-base exceeds 200,000 companies, ranging from small and mediumsized businesses right up to large governmental and commercial organizations. Each and every day, 500,000 new users fall under Kaspersky s umbrella of protection. As a testament to the our rock-solid technology, approximately 135 of the industry s leading IT, networking, communications and applications vendors choose to incorporate Kaspersky in the products they bring to market. It s likely you have Kaspersky technology running in your data center today and not even realize it. Kaspersky Lowers Your Total Cost of Protection Now that you re aware of the growing malware battle on the mobile front and the importance of proper protection, you re faced with the daunting challenge of fi nding the right anti-malware suite. And, of course everyone wants the best possible protection at the lowest price. To aid the IT manager, Kaspersky has developed a model for evaluating anti-malware software. The idea is to assist the manager in considering all the components of deployment during the RFP development stage and during the evaluation process. This model is called the Total Cost of Protection. The Total Cost of Protection is the consideration of all hard and soft costs associated with an antimalware deployment. Poor detection rates, a negative impact on system or network performance, complex administration, and poorly outsourced vendor support can increase costs and put data at risk. Most networks have diverse and heterogeneous environments which are diffi cult and expensive to protect across the multiple platforms present. Even Free software can impact costs. A prudent manager evaluates not only the street-price of a solution, but also the effect on existing infrastructure and the level of protection they require. Using the Total Cost of Protection framework can provide you with the proof that street price of antimalware isn t the best determinant for mitigating the risk to the network. 9

Kaspersky Endpoint Security for Smartphone Kaspersky Endpoint Security 8 for Smartphone protects confi dential data on corporate mobile devices from loss, theft, unauthorized access and mobile malware. It is an application from a product family based on a uniform set of world-class anti-malware and other core technologies. It offers easy-to-use, easy-to-manage security to protect confi dential data on corporate mobile devices from loss, theft, unauthorized access and malware, wherever your employees travel. Advantages Award-winning anti-theft, encryption and antivirus protection Easy over-the-air deployment using native or third party mobile device management systems Advanced settings and restrictions management via Kaspersky Administration Kit, Sybase Afaria or Microsoft System Center Mobile Device Manager Most popular smartphones are supported Nokia, Android, Blackberry and Windows Mobile devices Highlights Ensure robust data protection: Anti-Theft. Remote smartphone lock, wipe and GPS tracking in the event that the device is lost or stolen SIM-Watch. Even if the thief changes the SIM card all the remote functionality remains intact and the new phone number is sent to the real owner Encryption. Files, folders and memory cards can be encrypted and access to them can be password protected Anti-Virus. Real-time protection, on-demand and scheduled scans, automatic over-the-air antivirus database updates Anti-Spam for calls & SMSs. Unwanted calls and messages can easily be fi ltered out Privacy Protection. For hiding communication histories with particular contacts, including contact book entries, call logs and SMSs Deploy with ease Kaspersky Endpoint Security 8 for Smartphone can be smoothly rolled out to multiple devices remotely and over-the-air. Installation is 100% seamless, without user involvement or disturbance. 10

Advantages Award-winning anti-theft, encryption and antivirus protection Easy over-the-air deployment using native or third party mobile device management systems Advanced settings and restrictions management via Kaspersky Administration Kit, Sybase Afaria or Microsoft System Center Mobile Device Manager Most popular smartphones are supported Nokia, Android, Blackberry and Windows Mobile devices Highlights Ensure robust data protection: Anti-Theft. Remote smartphone lock, wipe and GPS tracking in the event that the device is lost or stolen SIM-Watch. Even if the thief changes the SIM card all the remote functionality remains intact and the new phone number is sent to the real owner Encryption. Files, folders and memory cards can be encrypted and access to them can be password protected Anti-Virus. Real-time protection, on-demand and scheduled scans, automatic over-the-air antivirus database updates Anti-Spam for calls & SMSs. Unwanted calls and messages can easily be fi ltered out Privacy Protection. For hiding communication histories with particular contacts, including contact book entries, call logs and SMSs Deploy with ease Kaspersky Endpoint Security 8 for Smartphone can be smoothly rolled out to multiple devices remotely and over-the-air. Installation is 100% seamless, without user involvement or disturbance. Manage effectively With Kaspersky Endpoint Security 8 for Smartphone, IT departments have full control over remote product installation. IT staff can defi ne which features are enabled or disabled, which settings end-users may confi gure and which they may not, set the download schedule for antivirus updates, etc. Different policies can be applied to different groups of users. Policies are seamlessly synchronized over-the-air. 11

System requirements Management Platforms: Kaspersky Administration Kit (Version 8.0.2121 or higher) Microsoft System Center Mobile Device Manager 2008 SP1 Sybase Afaria 6.5 Smartphones Supported Android 1.5 2.3 Symbian S60 9.1-9.4, Symbian ^3 (Nokia) BlackBerry 4.5-6.0 Windows Mobile 5.0-6.5 Kaspersky Endpoint Security 8 for Smartphone can be purchased as part of the Kaspersky Open Space Security product line. To help you choose the most suitable product we recommend that you consult a Sales Manager with one of Kaspersky Lab s partners. The list of Kaspersky Lab partners is available at: www.kaspersky.com/buyoffl ine To learn more visit: www.kaspersky.com www.kaspersky.com/business For security news and analysis: www.threatpost.com [1] http://news.bbc.co.uk/2/hi/technology/8509299.stm [2] www.canalys.com/pr/2011/r2011013.html [3] http://images.forbes.com/forbesinsights/studypdfs/the_untethered_executive.pdf [4] Threatpost.com Enterprise Mobile Security Study, December 2010 12

The Kaspersky Challenge When it comes to malware, Kaspersky believes it s time to get serious. We know you take it seriously, too and don t want techno-mediocrity (at any price) for your data security. We invite you to take the Kaspersky Challenge today! Try Kaspersky on your network or test lab for 30 days. If 30 days goes by and your incumbent software is keeping up with Kaspersky, then you can feel validated that you re adequately protected. But you should also test Kaspersky s management, automated tools, reporting and dashboard for fl exibility and ease of use. Experiment with Kaspersky on several platforms including your smartphones and other mobile devices. Does Kaspersky adapt to your complex network better? Are you able to use less staff resources to manage the Kaspersky deployment? You re encouraged to discuss your options with your solution provider, or contact us via email smbsales@kaspersky.com or phone (866) 477-0347. For a free 30 day trail and a chance to take the Kaspersky Challenge visit our website at http://usa.kaspersky.com. 500 Unicorn Park Woburn, MA 01801 866.563.3099 smbsales@kaspersky.com www.kaspersky.com www.threatpost.com 2voa