BYOD Security Challenges in Education: Protect the Network, Information, and Students



Similar documents
Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Readiness Assessments: Vital to Secure Mobility

Cisco SecureX Product Brochure

Mobile Collaboration in the Public Sector: Work Your Way, on Any Device

PCI Compliance: Improve Payment Security

Cisco Mobile Collaboration Management Service

Secure Your Mobile Device Access with Cisco BYOD Solutions

To Cloud or Not to Cloud? Which Communications Deployment Option is Best for Your Business?

The Connected Agency: Enhancing Collaboration in the Insurance Industry

Cisco Secure BYOD Solution

New Learning Modes: Break Through Classroom Walls

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Cisco Solutions: Meeting Today s Challenges in Scaling Educator Professional Development

Cisco Advanced Services for Network Security

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Cisco Actualtests Exam Questions & Answers

Use Bring-Your-Own-Device Programs Securely

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Cisco Smart Business Communications Systems. Cisco Small Business Unified Communications 300 Series

Bring Your Own Device

Extending Collaboration to BYOD Devices

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Cisco Smart Business Communications Systems. Cisco Small Business Unified Communications 300 Series

How-to Guide: Top Ways to Improve Contact Center Performance

Cisco TrustSec Solution Overview

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis

Alternative Device Integration For Enhanced Security

Cisco Security Intelligence Operations

Meraki: Introduction to Cloud Networking

How To Secure Your Store Data With Fortinet

Payment Card Industry Data Security Standard

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

The Cisco Smart Business Communications System

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis

What Is Cisco Mobile Workspace Solution?

Secure Network Access for Personal Mobile Devices

Content Security: Protect Your Network with Five Must-Haves

Cisco s BYOD / Mobility

Cisco Data Center Virtualization Assessment Service

Securing Corporate on Personal Mobile Devices

Cisco Virtual Desktop Infrastructure Strategy Service

Cisco Wireless Portfolio

Cisco Unified Computing. Optimization Service

Cisco Nexus Planning and Design Service

Is Your Network Ready for the ipad?

Delivering Control with Context Across the Extended Network

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Best practices for WiFi in K-12 schools

Six Essential Steps for Unleashing the Power of Enterprise Mobility

Preparing your network for the mobile onslaught

Zone Labs Integrity Smarter Enterprise Security

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

The Holistic Guide to BYOD in Your Business Jazib Frahim

2014 Cisco and/or its affiliates. All rights reserved.

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

Meru MobileFLEX Architecture

Cisco Cloud Web Security Datasheet

Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X

Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Cisco Web Security: Protection, Control, and Value

Cisco Cybersecurity Pocket Guide 2015

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

Cisco Wireless Control System (WCS)

Three Best Practices to Help Enterprises Overcome BYOD Challenges

Cisco Cloud Web Security

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

The ForeScout Difference

CISCO WIRELESS CONTROL SYSTEM (WCS)

Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD

Systems Manager Cloud Based Mobile Device Management

Top 10 Reasons Enterprises are Moving Security to the Cloud

Telepresence in an IPv6 World. Simplify the Transition

Executive Brief on Enterprise Next-Generation Firewalls

Cisco Meraki solution overview Cisco and/or its affiliates. All rights reserved.

How To Protect Your Network From Attack From A Network Security Threat

Kaspersky Security for Mobile

ForeScout CounterACT. Continuous Monitoring and Mitigation

Why Migrate to the Cisco Unified Wireless Network?

Cisco & Big Data Security

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Midsize Organizations Talk About Cisco Cloud Collaboration. Copyright 2014 Cisco Systems, Inc. All Rights Reserved.

Meru MobileFLEX Architecture

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Guideline on Safe BYOD Management

The Oracle Mobile Security Suite: Secure Adoption of BYOD

Mobile Device Strategy

Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group

Advanced Security for Account Managers-ASAM

Securing the mobile enterprise with IBM Security solutions

Bring Your Own Device:

Best Practices for Outdoor Wireless Security

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Transcription:

BYOD Security Challenges in Education:

What You Will Learn The influx of personal smartphones and tablets on campus, and the resulting data deluge, imposes a new set of security challenges. This white paper, intended for IT and network security specialists in schools and higher education, explains the security precautions needed on bring-your-own-device (BYOD) campuses: Protecting the network from malware and intrusion Controlling access to private information such as grades, tests, or payroll records Preventing illegal music and video sharing In K 12, complying with regulations such as the Children s Internet Protection Act (CIPA) Accomplishing all of this without adding to the IT team s workload Cisco provides a comprehensive security architecture for campuses, helping schools take advantage of the mobile learning trend and BYOD to let students learn your way. Controlling Security When You Don t Own the Device The boom in personal smartphones, tablets, and laptops on campus complicates cybersecurity. When schools owned all laptops and PCs connecting to the campus network, the IT team could install security software, such as antivirus clients, on the devices themselves. Access control, too, was relatively simple, because the IT team could provide access to the appropriate resources depending on whether the schoolowned device was used by students, teachers, administrators, researchers, and so on. But this device-centric approach to security comes up short in a BYOD world, where campus users expect to connect from anywhere, using any device. Keeping security software up-to-date on students and employees personal devices is not feasible, even if smartphones battery life were not an issue. The more effective approach to mobile security is enforcing security policy in the network. Network-based enforcement makes the device and connection method (wired, wireless, or VPN) irrelevant. In BYOD environments, the network needs the intelligence to: Automate enforcement of access policy, based on the context, including who is making the request, when, how they are accessing the network (wired, wireless, or VPN), and with what device. An elementary school s access policy might state that teachers, but not students, can access content sites such as YouTube. A university s access policy might give researchers access to certain applications or files from campus but not from home. Automatically detect and mitigate web-based threats, which can lead to security breaches or degrade wireless network performance. Make sure that private information, such as grades, tests, and salary information, is not compromised if a personal device is lost or stolen. Minimize management overhead by unifying policy definition on all networks, and providing ready visibility into the activity of all devices currently connected to the campus network. Protect the IT infrastructure, whether it s physical, virtualized or in the cloud. Page 2 of 14

Cisco Security Solutions for BYOD in Schools and Higher Education Schools, colleges, and universities can address these BYOD security challenges by implementing the Cisco BYOD Smart Solution, Cisco Virtualization Experience Infrastructure (Cisco VXI ) Smart Solution, or both. Cisco BYOD Smart Solution The Cisco BYOD Smart Solution is a holistic approach to effectively managing and controlling access while providing a consistently good experience for campus users. The solution includes Cisco validated designs, professional services, and the capabilities described in the following paragraphs. Automated Enforcement of Access Policy Knowing the identity of the person and the device accessing the network is the foundation for a BYOD security strategy. Until recently, campuses needed one solution for authentication, another for assessing the security posture of schoolowned devices, and yet another for policy enforcement. The Cisco Identity Services Engine (ISE) addresses all of these requirements in a single platform. It continually gathers real-time information from the network and devices, including ios and Android smartphones and tablets, PCs, Macs, printers, fax machines, gaming platforms, wireless IP phones, and more. Then it uses the information to control access based on campus policy. For example, a policy might stipulate that only high school students can use ipads, or that faculty can access certain services only from campus. The flexibility of the Cisco ISE is especially valuable in BYOD environments because the IT team can easily refine policy as the program matures. Some districts begin with BYOD for the higher grades, later allowing it for younger students. Some start by providing web access only, later adding learning applications. You can even create policies for specific individuals. For example, a school IT team might restrict or block access to all services for a student who tries to hack into school databases or repeatedly attempts to access blocked sites on the school network as well as the Internet. Schools can offer access to web-based testing during a two-hour window. Or, a university might selectively grant access to certain systems to individual faculty members, researchers, and administrators, allowing them to work from anywhere. Cisco ISE also minimizes the IT effort required to provide guest wireless access for visitors, such as parents, board members, guest lecturers, and so on. Many educational institutions want to limit guest access to browsing and checking email, and to keep guests off the network used for student information systems and other internal systems. Cisco ISE can automatically register guests, restricting traffic to a guest VLAN that provides Internet access only. This relieves the campus IT team from having to issue passwords. Bowdoin College Upgrades Wireless Network to Support Influx of Personal Devices Located near Portland, Maine, Bowdoin College enrolls 1730 students. Students, faculty, and staff have enjoyed wireless connectivity since 2004. The IT team expected students to return from winter break in January 2012 with double the number of devices. In anticipation, the college upgraded its Cisco wireless network to expand coverage across the 95-building campus, support a wider variety of devices, increase security, and improve the experience by mitigating sources of interference. To increase performance as well as capacity, Bowdoin College implemented Cisco Aironet 3600 Series Access Points, which provide up to 30 percent faster performance than other access points. Built-in Cisco CleanAir technology scans the entire Wi-Fi spectrum for interference and security threats. Cisco Identity Services Engine (ISE) authenticates campus guests and grants them temporary wireless access. And Cisco Prime products minimize management overhead because the college IT staff can manage the wired and wireless networks from a single interface. Page 3 of 14

Secure VPN Access for Faculty and Staff Working Remotely Faculty and staff who want to work with their personal devices from off campus can download the Cisco AnyConnect Secure Mobility Client. The client software is available for different devices and operating systems, including ios and Android, and enforces campus security policy for voice, video, data, and applications. Simple, always-on connectivity simplifies the experience for faculty and staff, and the IT team only needs to support one client, minimizing management overhead. Web Security Many of today s threats spread when people visit websites. Therefore, campuses with a BYOD policy need a solution for URL filtering, malicious code detection and filtering, and application controls for popular web-based applications. Educational institutions can choose from several Cisco web security solutions that work at the network level to block access to malicious websites: Cisco ASA CX Context-Aware Firewall is best for educational institutions that want full firewall capabilities as well as controls for web, Skype, peer-to-peer, and voice traffic. Cisco S-Series Web Security Appliance [[IronPort has been removed from Cisco naming. Please verify whether S Series is a valid name.]] is best for schools that want a dedicated web-security gateway with the most comprehensive web content filtering, for Children s Internet Protection Act (CIPA) compliance. The Cisco Web Security Appliance also provides anti-malware protection and data loss prevention. Cisco Cloud Web Security service is best for institutions that do not want to purchase and support a web-security device, or that have many mobile users. You can use Cisco AnyConnect Secure Mobility Client in conjunction with Cisco Cloud Web Security to automatically assess the safe status of a device when the user logs in, and then block malicious sites during the session. Compared to other web security solutions, Cisco solutions have an advantage in blocking websites that are not yet reported as being malicious. One reason is that they all connect to the Cisco Security Intelligence Operations (SIO) service, which calculates a reputation score for websites by considering years of operation, ownership country, history of ownership, and more (see sidebar). Websites or webpage objects that receive negative scores are blocked. Other methods that Cisco solutions use to prevent web-based threats include blocking attempts by the site to install malware; warning campus users when they click a link to a website that looks suspicious; and enforcing common-sense policies such as blocking transfer of files over a certain size, often audio or video files. Protection from Even the Newest Malicious Websites Cisco Security Intelligence Operations (SIO) protects campus networks and keeps IT teams informed about emerging threats that could take down the network or enable hackers to retrieve confidential information. Educational institutions that implement Cisco web security solutions for their BYOD programs benefit from Cisco s US$100 million investment in the SIO, which funded: Cisco SensorBase: This threatmonitoring network captures threat telemetry from more than 700,000 Cisco sensors deployed globally, monitoring 35 percent of the world s email and web traffic. This live data is combined with a historical database of more than 40,000 vulnerabilities. Cisco Threat Operations Center: Five hundred security analysts conduct research on emerging threats 24 hours a day, every day, from offices throughout the United States as well as Australia, China, India, Israel, Ukraine, and United Kingdom. Dynamic updates: Updates are delivered to the school s Cisco security devices within a few minutes, often hours before other solutions, protecting the network against the latest threats. Page 4 of 14

Cisco Secure Wireless Infrastructure The basis of a successful BYOD program is providing an excellent user experience while minimizing risk for the educational institution. Cisco Aironet 3600 Series Access Points enable students, teacher, and staff to connect from any device, even those with weak wireless signals, at a greater distance from the access point and with up to 30 percent faster performance than any other access point. Cisco Prime Network Control System (NCS) and Cisco identity Services Engine (ISE) support Cisco Aironet 3600 Series Access Points. Unified policy and access control in Cisco ISE and converged wired and wireless management in Cisco Prime Network Control System (NCS), together with Cisco wireless LAN infrastructure, simplify and help secure the mobile experience. Cisco provides a suite of integrated tools that schools, colleges and universities can use to manage and enforce wireless security policies (Table 1). Table 1 Cisco Solutions for Enforcing Wireless Security Policies Security Capability User authentication, encryption, and access control Detection and containment of unauthorized wireless access points that well-meaning teachers or students have set up, most of which do not provide adequate security controls Monitoring and detection of wireless network anomalies, unauthorized access, and radio-frequency (RF) attacks Automated wireless security vulnerability assessment Cisco Solution Cisco Identity Services Engine (ISE) Cisco CleanAir technology, embedded in Cisco Aironet wireless access points Cisco Adaptive Wireless Intrusion Prevention System Cisco Wireless Control System (WCS) Enhanced CIPA Compliance for K-12 While Google, Bing, YouTube, Flickr, and other search popular search engines and content-sharing sites provide a safe-search option to block adult content from results, savvy students can easily turn off the option on personal devices. Schools can transfer control of the safe-search option from students to administrators by selecting the safe-search option on Cisco web security solutions. Low Management Overhead Campus IT staff can centrally manage all wireless infrastructure, including Cisco wireless LAN controllers and Cisco Aironet wireless access points, using Cisco Prime NCS. Having a single management interface minimizes management overhead, simplifies troubleshooting, and accelerates awareness of security issues. Page 5 of 14

Cisco VXI Smart Solution, Protecting Data Even If a Device Is Lost To lower desktop TCO while also increasing data security, some educational institutions are replacing some or all physical desktops with virtual desktops that campus users can access over the network from any device, including personal tablets or laptops. Files are physically stored not on the device, but in the campus data center. This means a lost device does not lead to exposure of sensitive information such as student records or research results. The Cisco VXI Smart Solution is an end-to-end solution for desktop virtualization and collaboration. Its unique advantage in BYOD environments is the ability to deliver not just virtual desktops, but a unified education workspace that also provides access to campus voice and video services on mobile devices. Why Cisco? Schools, colleges, and university s that use Cisco security solutions in their BYOD program gain the advantages of working with a leader in wireless as well as security technologies: In Gartner s Magic Quadrant for wired and wireless LAN access infrastructure, Cisco ranks first both for completeness of vision and ability to execute. 1 Validated designs and comprehensive services for planning, design, implementation, and optimization help educational institutions quickly introduce or scale their BYOD programs. More than 300 trained and certified channel partners are available worldwide. Cisco security architecture takes advantage of existing Cisco switches and routers. For example, if a student attempts to browse from a tablet, the Cisco ISE can detect whether the device is school-owned or personal, and communicate this information to switches and routers so that they can enforce the appropriate access policy. Cisco VXI Smart Solution in Action Volunteer State Community College, Gallatin, Tennessee At Volunteer State Community College, in Gallatin, Tennessee, students previously had to come to campus to work with lab applications. Now the college hosts lab applications on Cisco VXI, and students can access the applications on personal devices. This is helping us make sure that online students get the same learning experience as onsite learners. Utica City School District, Utica City, New York Utica City School District implemented Cisco VXI to push lesson plans and online classroom materials to any mobile device connected to the district network. Students in the district can use several hundred netbooks to date for secure wireless access to learning materials. In one elementary school, students can use netbooks to connect to their virtual workspace during class. Americas Headquarters Cisco Systems, Inc. San Jose, CA For More Information Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. To learn more about Cisco security solutions for schools, visit: Cisco www.cisco.com/web/strategy/education/safesecure_riskschools.html and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply To a partnership learn more relationship about Cisco between solutions Cisco and for any education, other company. visit (1110R) www.cisco.com/go/education. To read the full case study on Bowdoin College, visit: www.cisco.com/en/us/prod/collateral/wireless/c36_702836_00_bowdoin_college_cs_v1a.pdf To read the case study on Utica City School District, visit: www.cisco.com/en/us/solutions/collateral/ns340/ns517/ns224/utica_cs.pdf To read the case study on Volunteer State Community College, visit: www.cisco.com/en/us/prod/collateral/voicesw/ps6788/vcallcon/ps556/case_study_c36-717074.pdf 1 Gartner, Magic Quadrant for the Wired and Wireless LAN Infrastructure, June 12, 2012, http://www.gartner.com/technology/reprints.do?id=1-1ax7yjq&ct=120614&st=sb Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)