Enterprise Mobility Management for Financial Sector



Similar documents
MDM Mobile Device Management

EFFECTIVE BYOD. A presentation by: Tzachy Givaty, CommuniTake

AirWatch Solution Overview

Guideline on Safe BYOD Management

Feature List for Kaspersky Security for Mobile

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Sophos Mobile Control

Embracing Complete BYOD Security with MDM and NAC

Total Enterprise Mobility

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

BYOD: End-to-End Security

What We Do: Simplify Enterprise Mobility

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Bell Mobile Device Management (MDM)

Chris Boykin VP of Professional Services

ForeScout MDM Enterprise

Secure, Centralized, Simple

Total Enterprise Mobility. Norbert Elek

Cyber Security. John Leek Chief Strategist

Athena Mobile Device Management from Symantec

A guide to enterprise mobile device management.

Symantec Mobile Management 7.1

Mobile device and application management. Speaker Name Date

Managing Mobility in the BYOD Era:

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

How To Manage A Mobile Device Management (Mdm) Solution

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Healthcare Buyers Guide: Mobile Device Management

Mobile Security and Management Opportunities for Telcos and Service Providers

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

The ForeScout Difference

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

BYOD Guidance: BlackBerry Secure Work Space

Mobility Challenges & Trends The Financial Services Point Of View

The User is Evolving. July 12, 2011

IT Enterprise Services

Meraki: Introduction to Cloud Networking

Symantec Mobile Management Suite

Symantec Mobile Management 7.1

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

Symantec Mobile Management for Configuration Manager 7.2

BENEFITS OF MOBILE DEVICE MANAGEMENT

Mobile Application Security

Hands on, field experiences with BYOD. BYOD Seminar

6 Things To Think About Before Implementing BYOD

Systems Manager Cloud-Based Enterprise Mobility Management

RFI Template for Enterprise MDM Solutions

MAM - Mobile Application Management

Mobile Security Mobile Device Management Mobile Application Management

Microsoft Windows Intune: Cloud-based solution

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

BlackBerry 10.3 Work and Personal Corporate

Tom Schauer TrustCC cell

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

Kaspersky Security for Mobile

Mobile Device Security Is there an app for that?

Cisco Mobile Collaboration Management Service

Systems Manager Cloud Based Mobile Device Management

ITSM & Enterprise Mobility Management

Ensuring the security of your mobile business intelligence

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

CHOOSING AN MDM PLATFORM

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Symantec Mobile Management 7.2

Workplace-as-a-Service BYOD Management

Mobile Security Mobile Device Management Mobile Application Management

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

IT Resource Management vs. User Empowerment

Mobile Security Mobile Device Management Mobile Application Management

The Security of MDM systems. Hack In Paris 2013 Sebastien Andrivet

Choosing an MDM Platform

Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

How To Protect Your Mobile Device From Attack

ADDING STRONGER AUTHENTICATION for VPN Access Control

Mobility Management with FAMOC. Solution Whitepaper

Enterprise- Grade MDM

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment

How to Successfully Roll Out an Android BYOD Program

An Intelligent Solution for the Mobile Enterprise

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

Mobile App Containers: Product Or Feature?

Transcription:

Enterprise Mobility Management for Financial Sector Conferința Ziarul Financiar: Scurgeri de informații, furt de date confidențiale, hackeri. Pot fi o realitate? Principalele riscuri de securitate și strategii de gestionare a lor. Bogdan-Mihai Zamfir, CISM, C CISO, COBIT-F, Head of ICT Security & Compliance, UniCredit Tiriac Bank bogdan.zamfir@unicredit.ro Bucharest, 18 September 2014

ABOUT UNICREDIT TIRIAC BANK UniCredit Tiriac Bank is part of UniCredit, leading European financial group with the largest CEE presence. In Romania, UniCredit Tiriac Bank is one of the main financial institutions, offering high quality services and products for 580.000 clients. The bank strives to have a client centric policy, to be an easy to deal with partner and also an active part of the communities in which it operates. UniCredit Group is also present in Romania through UniCredit Consumer Financing (UCFIN), UniCredit Leasing Corporation (UCLC), UniCredit Insurance Broker, UniCredit Leasing Fleet Management, UniCredit Leasing Romania, Allib ROM, Debo Leasing, UCTAM, Pioneer Asset Management and UniCredit Business Integrated Solutions (UBIS). UniCredit Tiriac Bank is a pioneer in implementing latest security technologies, a leader on the local market from this perspective. 2

AGENDA Introduction Cybercrime in the mobile world From MDM to EMM Getting the Enterprise Mobile: the Executive Checklist Common RFP model Core features of an EMM Particularities for the Financial Sector Final points to check Conclusion 3

4 INTRODUCTION

CYBERCRIME IN MOBILE WORLD Crimes that can use either computers or mobile devices to advance other ends include: Malware (ex.: addware, spyware, ransomware etc.) Cyberstalking (espionage) Fraud and identity theft Information leakage Phishing (smishing, vishing) Spam Device theft 5

THE JOURNEY MDM EMM 6

GARTNER PUTS FOCUS ON EMM New 2014 Magic Quadrant for Enterprise Mobility Management Suites defines that EMM are expected to include the following functions: Hardware and application inventory OS configurations management Mobile app deployment, updating and removal Mobile app configuration and policy management Remote view and control for troubleshooting Execute remote actions such as remote wipe Mobile content management: secure container, content push and content access 7

EMM IS MORE THAN MDM Consolidation and governance of all mobility initiatives under IT management Enforcement of mobile device policy and user access configuration and compliance Streamlining new user enrollment, software updates, Help Desk troubleshooting, and device decommissioning for lower support costs per user Automated alerting and controls, preventing excessive charges through real-time cost management Secure containerization for email, calendar and attachments Secure access to intranet sites, line-ofbusiness applications, internally published mobile apps, and internal document management systems Protection of critical business data, user authentication, and encryption for data at rest and data in motion. Source: NotifyCorp 8

GETTING THE ENTERPRISE MOBILE: THE EXECUTIVE CHECKLIST Consider: Device (freedom vs. consistency for type, company goals) User (enablement/eligibility, BYOD, no of. devices per user) App (allowed apps, securing apps, business opportunities) Data (prevent data leakage, facilitate collaboration, classification) Policy (minimum reqs., privacy considerations, stds. compliance) Security (data protection, device/user/app compliance, threat monitoring, decommissioning, SIEM integration) HA (uptime, scalability, redundancy and fault tolerance) Service (QoS, telecom expenses, remote support, self-service) 9

COMMON RFP MODEL Things to check: Vendor/company background Local resellers and vendor support (SLA) Customer base, references, case studies Deployment time-frame Product network architecture and fit in your environment On premise or in cloud solution and data traffic routing Platform support (ios, Android, Windows, BlackBerry) Core features 10

CORE FEATURES (I) Platform/device management (inventory, location, diagnostics etc.) Applications management (enterprise apps store, updates, white /blacklisting, web filtering etc.) Anti-malware, firewall, secure configuration profiles Wireless (WPA2) centrally manageable Control use of device if SIM is removed or disabled Media encryption User and device authentication, identity management Access restrictions/nac support Enterprise VPN support 11

CORE FEATURES (II) Manage personal and corporate data separately Enforced complex passwords, inactivity timeout, audit trail Encryption, secure lock, selective wipe, jailbreak detection etc. Hardening for backup, user credentials, keys, policies Remote provisioning (centralized management) including account instantiation and personal certificates, remote update, unlock etc. Active Directory integration User self-service administration (device lock, location support etc.) Low battery consumption of the resident mobile agent Multiple users support (for apps or virtual machine, dual boot etc.) 12

PARTICULARITIES FOR THE FINANCIAL SECTOR EMM financial applications: Mobile Banking app Mobile token (ex. RSA authentication) Other payment solutions (SMS Banking, NFC) Internal financial applications (BI, CRM, DWH etc.) access and availability Compliance: Customer data protection Other: Complex environment Voice encryption 13

FINAL POINTS TO CHECK: The EMM features that need to be closely checked: Integration across apps, if needed apps are available on all devices Data/information classification support for containerized email and office suite, DLP integration Easy customization to different business needs Secure access, esso Swiftly access to Intranet portals (with NTLM/Kerberos integration) Automatic, self packaging for secured (container) apps + internal Architecture mapping on a multiple tier network design Productivity, efficiency and easy administration of the solution 14

CONCLUSIONS Source: cdw.com 15

Enterprise Mobility Management for Financial Sector Conferința Ziarul Financiar: Scurgeri de informații, furt de date confidențiale, hackeri. Pot fi o realitate? Principalele riscuri de securitate și strategii de gestionare a lor. Bogdan-Mihai Zamfir, CISM, C CISO, COBIT-F, Head of ICT Security & Compliance, UniCredit Tiriac Bank bogdan.zamfir@unicredit.ro Bucharest, 18 September 2014