DoD Mobility Kim Rice



Similar documents
DoD Mobility Overview

DoD s Strategic Mobility Vision: Needs & Challenges

Cyber Situational Awareness - Big Data Solution

DISA and the Evolving DoD Enterprise

DISA Testing Services for the Enterprise. Luanne Overstreet

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Unified Capabilities (UC)

How To Improve The Defense Communications System

A Combat Support Agency

UNCLASSIFIED. Trademark Information

Building Robust Security Solutions Using Layering And Independence

Commercial Solutions for Classified (CSfC)

BlackBerry 10.3 Work and Personal Corporate

Infrastructure Development Forecast to Industry

Cyber Security Metrics Dashboards & Analytics

DISA Acquisition Opportunities

Mobile Device Management for CFAES

Mobile First Government

GOVERNMENT USE OF MOBILE TECHNOLOGY

Forecast to Industry 2015

Unified Capabilities (UC)

L-3 Guardian SME PED Frequently Asked Questions

Securing Office 365 with MobileIron

Department of Defense PKI Use Case/Experiences

Mobile Device Management A Functional Overview

How To Make Your Computer System More Secure And Secure

Mission Partner Environment DISA Multinational Information Sharing

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

PULSE SECURE FOR GOOGLE ANDROID

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Payment Card Industry Data Security Standard

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Space and Naval Warfare Systems Center Atlantic

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Mobile Access Software Blade

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

The Convergence of IT Security and Physical Access Control

Mobile App Containers: Product Or Feature?

The ForeScout Difference

RFI Template for Enterprise MDM Solutions

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

DEPARTMENTOFDEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

Total Enterprise Mobility

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Joint Information Environment Single Security Architecture (JIE SSA)

Symantec Mobile Management for Configuration Manager 7.2

White Paper: An Overview of the Samsung KNOX TM 2.0 Platform

Samsung SDS. Enterprise Mobility Management

Verizon Applications and Cloud

Symantec Mobile Management 7.2

This Conference brought to you by

Symantec Mobile Management Suite

A guide to enterprise mobile device management.

BYOD - Provisioning an Android Phone

An Intelligent Solution for the Mobile Enterprise

The Convergence of IT Security and Physical Access Control

Total Enterprise Mobility. Norbert Elek

Ensuring the security of your mobile business intelligence

IBM Endpoint Manager for Mobile Devices

Army Foundry Intelligence Training Program

How To Protect Your Mobile Devices From Security Threats

DoD Joint Information Enterprise

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Enterprise Mobility S.E.A.L / Galaxy S III

A Woman- Owned, Small Business. Capability Briefing. March 2014

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

Uncomplicated Communications

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

BlackBerry Mobile Voice System

Mobile Security and Management Opportunities for Telcos and Service Providers

Good for Enterprise Good Dynamics

Partnering with Small Business

Best Practices for a BYOD World

What We Do: Simplify Enterprise Mobility

Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure

ForeScout MDM Enterprise

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

Marine Corps. Commercial Mobile Device Strategy

Managed Security Services for Data

Securing Corporate on Personal Mobile Devices

Mobilizing Business Applications, Efficiently and Affordably

The User is Evolving. July 12, 2011

Transcription:

DoD Mobility Kim Rice Mobility PMO Contact: 301-225-5670 17 Jun 2015

DoD Mobility PMO Concept Vision: Secure, reliable and responsive infrastructure and services for the mobile users across the DoD. Mission: The DoD Mobility Program Management Office provides enterprise capabilities and services to enable global mobility capability to support operations for joint warfighters, National level leaders and coalition partners. Our mission is to extend enterprise services to mobile devices in order to deliver a fully operational secure Mobility Enterprise Service to DoD. Delivering mobile enterprise capabilities that securely operate and strengthen the defense of the cyber mission space 2

ENTERPRISE DEVICE & PRODUCTIVITY O BJ TODAY Enterprise Email Text Messaging Calendar Contacts Approved COTS & PUMA Apps Mobile Application Development Platform Enterprise Back End Services DoD Mobility PMO Bring Your Own Device BYOD) OBJ) Government Furnished Equipment GFE) User Gateway Mobile Device Management / Mobile Application Store DoD Networks GFE Corporate Owned Personally Enabled COPE) OBJ) Commercial Mobile Devices End-to-End Vision Virtual Desktop Integration VDI) OBJ) Wireless Carriers Identity Management / PKI OBJECTIVE Robust Tools and Apps for Mobile User Experience Mobile Content supporting Unified Communications Seamless Authentication Cross Domain Enhanced Policies Hierarchal Policy Structure Dynamic Auditing & Threat Detection Personal Use Apps & Devices DoD Component Email Advanced Cyber Mobility Tools O BJ O BJ Access to data, apps and tools necessary for a mobile workforce DoD Component Back End Services 3

Mobility and Security MOBILITY COMPONENTS TODAY FUTURE Rooting Device Applications Infrastructure Networking Gateway Mobile Device ManagementMDM) Mobile Application Store MAS) Mobile Content Management MCM) Enterprise Back End Services Phishing / Whaling National Information Assurance Partnership NIAP) National Information Assurance Partnership NIAP) Certifications Manual App Vetting Policy THREATS Malware Zero Day Attacks Denial Service National Information Assurance Partnership NIAP) Certifications + Bring Your Own Device BYOD) + Corporate Owned Personally Enabled COPE) Derived Credentials / Public Key Infrastructure PKI) Computer Network Defense Automatic App Vetting Virtual Private Network VPN) Enhanced Policy Violations Cyber SA and CSAAC Analytics Insider Threats Hackers Grey: Objective 4

Mobility Portfolio Priorities PRIORITIES: MUST DO S 1. Sustain Deployed Mobility Components DMCC S 1.0 and DMCC 2.0 DMUC Mobile Device Manager MDM) DMUC Mobility gateways 2. DMCC S 2.0.5 3. DMUC CAC S/MIME replacement 4. DMCC TS 1.0 Pilot 5. User experience voice, e mail, chat, office, storage) 6. DMUC Mobile Content Management MCM) 7. Limited soft cert pilot support. 8. DoD deployment of Knox 2.0 capabilities 9. Mobile app development framework 10. Sensor analytics 11. Data at rest 12. MDM Follow on Contract 13. Ozone Mobile MOBILITY CUSTOMERS Delayed Priorities: 1. Automated PKI support for devices and apps 2. GOTS/COTS mobile vetting tools 3. DMCC S 3.0 4. Non DEE e mail support for DMUC users Air Force Air National Guard Air Force) Africa Command AFRICOM) Army Acquisition Support Center USAASC) Army Central Command ARCENT) Army Criminal Investigation Command CID) Army Cyber Command Army Europe Command USAREUR) Army Forces Command FORSCOM) Army Headquarters HQDA) Army Installation Management Command IMCOM) Army Intelligence & Security Command INSCOM) Army Materiel Command AMC) Army Medical Command MEDCOM) Army National Guard NG) Army Network Enterprise Technology Command NETCOM) Army North ARNORTH) Army Pacific Command USARPAC) Army Reserve Command USARC) Army South ARSOUTH) Army Space and Missile Command SMDC) Army Surface Deployment Distribution Command SDDC) Army Test and Evaluation Command ATEC) G6 Army Training and Doctrine Command TRADOC) Central Command CENTCOM) Defense Health Agency DHA) Europe Command EUCOM) J6 Joint Staff Navy Bureau of Medicine and Surgery BUMED) Northern Command NORTHCOM) Southern Command SOUTHCOM) HQ Strategic Command STRATCOM) Transportation Command TRANSCOM) United States Army Africa USARAF) Southern Europe Task Force SETF) Underlying priorities: program/processes/tools and enhanced ordering experience 5

Secure Mobile Infrastructure End-to-end architecture secures mobile device access to DoD enterprise services Mobile device, operating system, applications MDM enforced security policies Access only to applications vetted through DISA app vetting process PKI Authentication DoD PKI certificates authenticate users to enterprise services user certificates, CAC cards) Mobility Gateways Secure access to DODIN through VPNs and private carrier networks Integrated at the Internet Access Points IAPs) to leverage enterprise Computer Network Defense System View ArcSight DODIN Landing Server ACROPOLIS BIG DATA ANALYTICS DMCC S / DMUC) Big Data Analytics Custom based alerting developed specifically for mobile devices Logs collected from disparate systems and sensors are aggregated and correlated to detect and alert to anomalous mobile device activity Operating system security, strong authentication, secure remote access, and continuous monitoring are the keys to successful mobile security CSAAC 6

DMCC-S R2.0 DEVICE BASICS Samsung Galaxy Commercial Smartphone Quality super AMOLED screen 5 inch, 1080 pixel display Extensive memory storage Strong battery life and processor Approved and integrated components with National Information Assurance Partnership NIAP) ADVANTAGES Delivered in partnership with the National Security Agency NSA) Compliant with NSA s Commercial Solutions for Classified CSfC) process Secure voice and web browsing Outlook Web Application OWA) capability for SIPR access Mobile Device Management MDM) and policy enforcement Supporting service desk Constantly evolving capabilities to meet user requirement CAPABILITIES Provides SECRET DMCC S) mobile access to select DoD voice and data networks capabilities. Replaces the Secure Mobile Environment Portable Electronic Device SME PED) and DMCC S 1.0 supported mobile devices. Provides enhanced graphics and email experience through the new Integrated Commercial Solution ICS) device. SECURITY OVERVIEW Phone calls securely placed through Cellcrypt Embedded FIPS IPSec Virtual Private Network VPN) accessible through native Samsung VPN client Pre loaded items managed through Quark Security Shield for streamlined, user friendly interface Data in transit protection Device wipe capability 7

DMCC-S R2.0.5 May 2015 Full Deployment View Continuous Monitoring Spin 2 Failover COOP 2 Mobility Gateways Secures device before features utilized Internet Ingress Point OWA Email for DEE and Non DEE DoD Enterprise Capabilities Secure Phone Calls to DMCC, DRSN, ECVoIP, VoSIP, SCIP Devices Mobile Device Management Replacement of Nanny App with SE Android & Enterprise MDM capability NSA Approved Smartphones) Integrated Commercial Solution ICS) Device Legacy Smartphone Support Motorola RAZR MAXX Mobility Networking Plan to EOL six months > Rel. v3.0 TBD) MDM N/A Grey: Delivered in DMCC S 2.0.5 Wireless Carrier Secure CONUS Access over Verizon APN Order Entry via DISA Portal NSA Approved Mobile HotSpots International roaming capability Components under NIAP Assessment: Samsung Galaxy Device complete) Apriva/Authentec VPN concentrator partial) MobileIron MDM CellCrypt VoIP client 8

DMCC-TS R.1.0 Pilot Capabilities Objective State: Deliver initial pilot voice capability and posture for SCI in future releases Mobility Gateway Secures device before features utilized Internet Ingress Point Continuous Monitoring DoD Enterprise Capabilities Secure Phone Calls Over IP Mobile Device Management Instances of DMCC S MDM established at primary and COOP sites on SIPRNet ICS Device Configured for TS Mobility Networking Wireless Carrier Secure CONUS Access over Verizon APN NDA Approved Mobile HotSpots International Roaming Capability Order Entry via DISA Portal 11 June 2015 9

Pace of Mobility What is the best way to deliver for mobile? How should we engage and utilize vendor expertise? What should the driving policies new STIGs/SRGs, etc.) be for mobility? How do we integrate commercial time to market with DoD processes? Rapidly evolving technology - Reacting to release of new HW/SW - New cyber threats - Integration across vendor technology Developing mobile policies & business processes Meeting wide range of DoD mission requirements PMO re-looking the way mobility is being delivered what & how) How does DoD leverage commercial mobile best practices and technology? 10

United in Service to Our Nation 11