Containerization approaches for mobile security



Similar documents
Securing mobile apps in the Enterprise

Managing enterprise in a mobile world

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Mobile device and application management. Speaker Name Date

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Enterprise Mobility Management

Mobile First Government

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Cisco Mobile Collaboration Management Service

Feature List for Kaspersky Security for Mobile

MAM - Mobile Application Management

When enterprise mobility strategies are discussed, security is usually one of the first topics

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

Systems Manager Cloud-Based Enterprise Mobility Management

Total Enterprise Mobility

BYOD: End-to-End Security

Mobile App Containers: Product Or Feature?

What We Do: Simplify Enterprise Mobility

Enterprise Security with mobilecho

In-Depth Look at Capabilities: Samsung KNOX and Android for Work

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Mobile Strategy and Development

Tom Schauer TrustCC cell

[BRING YOUR OWN DEVICE POLICY]

Securing Office 365 with MobileIron

MDM Mobile Device Management

Ensuring the security of your mobile business intelligence

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

The Risks and Rewards of Social Media and Mobile Devices

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Kaspersky Security for Mobile

How To Protect Your Mobile Devices From Security Threats

Security and Privacy Considerations for BYOD

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Mobile Security: Controlling Growing Threats with Mobile Device Management

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Security and Compliance challenges in Mobile environment

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Mobile Device. Management-

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

BYOD Enabling Technologies

McAfee Enterprise Mobility Management

Good for Enterprise Good Dynamics

BYOD Guidance: BlackBerry Secure Work Space

Stress-free mobility A mobile framework for the extended enterprise. April 29, 2015

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

LabTech Mobile Device Management Overview

Samsung SDS. Enterprise Mobility Management

SharePlus Enterprise: Security White Paper

Resco Mobile CRM Security

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

SysAid MDM User Guide for Android

Oracle Mobile Security

Enterprise mobile management a need or an option?

Security for mobile apps

Technical Whitepaper. Secure Docs

Technology Shifts. Mainframe Windows Desktop Internet

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

The BYOD Challenge. Noel A. Nazario Senior Manager, Ernst & Young. ISACA NCAC Emerging Technology Conference 20 November 2012

MAM + MDM = BMS. (Bada$$ Mobile Strategy)

Mobile Device as a Platform for Assured Identity for the Federal Workforce

Codeproof Mobile Security & SaaS MDM Platform

Cloud Services MDM. ios User Guide

Secure, Centralized, Simple

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management

WHITEPAPER. NAPPS: A Game-Changer for Mobile Single Sign-On (SSO)

BENEFITS OF MOBILE DEVICE MANAGEMENT

How To Write A Mobile Device Policy

MOBILE DEVICE SECURITY FOR ENTERPRISES

Workplace-as-a-Service BYOD Management

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence

Kony for SAP. Kony powers enterprise applications for mobile workers. The problem with mobilizing SAP

Global trends. Mobile solutions for effective cost and device management. thank you

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

Systems Manager Cloud Based Mobile Device Management

BYOD Policy. Handout

How To Secure Your Mobile Devices

Absolute Manage MDM. John Wu Systems Engineer

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

App Reputation Report February 2013 The Authority in App Security

EFFECTIVE BYOD. A presentation by: Tzachy Givaty, CommuniTake

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

White Paper. Secure Mobile Collaboration with Citrix XenMobile and ShareFile. citrix.com

AirWatch Solution Overview

How End User Experience Management Adds Value to Mobile Device Management. It s All in The Name!

POINT-TO-POINT vs. MEAP THE RIGHT APPROACH FOR AN INTEGRATED MOBILITY SOLUTION

Kony Mobile Application Management (MAM)

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

Transcription:

Technical Brief Containerization approaches for mobile security Digital containers for valuable assets Mobile devices now carry increasing amounts of corporate data in email, documents and apps. We are used to containing valuable physical items under lock and key, but what approaches can be used for containing digital valuables? Three approaches for containerization are described below: App level containerization A security layer is added to the app as part of Mobile Application Management, which provides an encrypted A security layer is added to the app as part of Mobile Application Management, which provides an encrypted storage area partitioned from the rest of the app memory. The security layer also enables a central server to implement security policies such as: Disabling cut-copy-paste Forcing communication only over secure https / secured Wi-Fi networks Geo-fencing to disable app usage outside corporate locations Time / date restrictions on usage of app Application timeout and data fading Logs user out after period of inactivity. If app is not launched for set period of time the data is automatically removed Disabling app install / launch on jailbroken or rooted devices which have higher risk of malware

A mobile compliance policy isn t useful unless it can be effectively enforced. Kony EMM Further, the app can be disabled if the device is deemed lost or in hands of a malicious owner, rendering its data locked forever. Most importantly, security policies can be set granularly for each app, thus giving fine control to administrators without affecting user s data in anyway. MAM Container DOWNLOADS LDAP Authentication MAM SERVER Enterprise App Store Policies Cut-copy-paste Geo-fencing More Reporting Policy Violation Actions Data Wipe Enterprise Apps USER Data / Apps LDAP SERVER MAM solutions also provide an enterprise app store with the ability to distribute public or private apps to employees based on their group / level access permissions based on corporate Active Directory (LDAP) integration. The app store can also be integrated with Apple s Volume Purchase Program allowing administrators to keep track of corporate licenses for paid applications. Some MAM solutions include single sign-on which makes secure app access easier for employees. Finally, reporting and rule-based actions on policy violations full control to administrators. Device level containerization The device itself can be wrapped in a management layer which lets a central administrator monitor and control the device. Common features of Mobile Device Management solutions include : Setting passcode requirements Pushing public and private apps to the device Updating device Wi-Fi / VPN profiles Page 2

Restricting access to corporate data if the device is jailbroken or rooted Restricting installation of listed apps on the device Tracking the device and wiping the business data off the device if it is lost or stolen Self-serve enrollment with corporate Active Directory / LDAP integration MDM solutions may or may not include secure email via a proprietary email app. Advanced MDM solutions also create a secure container for corporate data, providing the ability to selectively wipe only business data, thus leaving user data intact. This provides greater assurance to employees signing up for a BYOD program. The secure data container can also be used for providing a secure file-sharing mechanism with restrictions and policies for editing, forwarding or copying a particular document. Note that most MDM solutions don t provide the ability to manage app security at a fine-grained level, even if some of them do include a basic enterprise app store for app distribution. MAM Container DOWNLOADS LDAP Authentication MAM SERVER Enterprise App Store Policies Cut-copy-paste Geo-fencing More Reporting Policy Violation Actions Data Wipe Enterprise Apps USER Data / Apps LDAP SERVER OS level containerization In this upcoming approach, two OS instances run on the same device. One OS partition is used for business access and the other for personal use. While the business OS partition requires regular security protocols the main benefit is that user-space malware can t get into the business OS, and the personal / business data split is kept sacrosanct. The two OSes can run in parallel, or one can host the other in a virtual configuration. Page 3

As this requires considerably higher processing power and battery life than currently available this approach will take some more time to mature and become popular, but it s worth keeping an eye on. Conclusion Device management is the most popular containerization approach at present, but the finegrained control of app management is rapidly becoming the method of choice for enterprise mobility management. Look for solutions that integrate both MAM and MDM features to give you the best of both, such as Kony s Enterprise Mobility Manager. OS virtualization is yet to mature given its high-end hardware requirements but it bears watching over the next few years. Page 4

About Kony, Inc. Kony is the fastest growing cloud-based mobile application development platform (MADP) in the industry with over 600 live multi-channel apps, serving over 20 million end users across 45 countries, and generating over 1 billion sessions. The Kony Experience Platform is an integrated software development lifecycle (SDLC) platform to define, design, develop, test, deploy, and manage multi-channel applications from a single code base. With Kony, you can deliver stunning user-first experiences, get to market faster, and lower your application TCO. Kony also offers a suite of more than 33 ready-to-run B2E and B2C apps that enable customers to quickly extend their business. For more information, please visit www.kony.com and connect with Kony on Twitter, Facebook, and LinkedIn. 2013 Kony Solutions, Inc. All rights reserved.