Enterprise Mobility Management



Similar documents
How To Use An Android Phone With A Microsoft Powerbook 2.5 (Ios) And A Microsatellite (Xen Mobile) Device (For A Free Download) For A Business

Mobile Application Management with XenMobile and the Worx App SDK

Citrix Enterprise Mobility more than just device management (MDM)

Enabling a Mobile Enterprise. Mark Holobach Senior Systems Engineer Citrix Mobility

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Citrix Enterprise Mobility Management Solutions

Total Enterprise Mobility

Mobile app containers with Citrix MDX

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

BYOD Guidance: BlackBerry Secure Work Space

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Secure, Centralized, Simple

Citrix Enterprise Mobility more than just device management (MDM)

10 Essential Elements for a Secure Enterprise Mobility Strategy

CHOOSING AN MDM PLATFORM

[BRING YOUR OWN DEVICE POLICY]

Embracing Complete BYOD Security with MDM and NAC

Guideline on Safe BYOD Management

BYOD: End-to-End Security

Managing and Securing the Mobile Device Invasion IBM Corporation

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Oracle Mobile Security

Kony Mobile Application Management (MAM)

Secure mobility with Citrix & Cisco

Salesforce1 Mobile Security Guide

Comprehensive Enterprise Mobile Management for ios 8

MDM and beyond: Rethinking mobile security in a BYOD world

Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts

Mobile Application Management

White Paper. Data Security. journeyapps.com

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Choosing an MDM Platform

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Enterprise Mobility as a Service

Systems Manager Cloud-Based Enterprise Mobility Management

Key Requirements of Enterprise Mobility Management Solutions

What We Do: Simplify Enterprise Mobility

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Corporate-level device management for BlackBerry, ios and Android

Copyright 2013, 3CX Ltd.

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Android for Work powered by SOTI

White Paper. The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise. citrix.com

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Cisco Mobile Collaboration Management Service

Codeproof Mobile Security & SaaS MDM Platform

Ben Hall Technical Pre-Sales Manager

Symantec Mobile Management Suite

XenMobile Client Update

User Manual for Version Mobile Device Management (MDM) User Manual

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

The Future of Mobile Computing

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

AirWatch for Android Devices

BYOD Policy for [AGENCY]

The increasing popularity of mobile devices is rapidly changing how and where we

Tom Schauer TrustCC cell

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

Enterprise Mobility Services

Hands on, field experiences with BYOD. BYOD Seminar

Mobile Device Management Version 8. Last updated:

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

The flexible workplace: Unlocking value in the bring your own device era

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

White Paper. Securing Mobile Applications and Data with Citrix XenMobile EMM. citrix.com

IT Self Service and BYOD Markku A Suistola

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

Mobile Device Security Is there an app for that?

Transcription:

Enterprise Mobility Management Security Without Compromising User Experience SESSION ID: SPO2-R03 Brian Robison Principal Technology Evangelist, XenMobile Citrix Systems, Inc.

Providing the freedom to access and use enterprise corporate data While ensuring security and management of enterprise corporate assets and adhering to local regulations

More than half of large businesses report mobile security incidents have amounted to more than $500,000 in the past year. ** One analyst firm found over 59% of Android devices had mobile malware.* In June, Facebook disclosed an estimated 6 million Facebook users had e-mail addresses or telephone numbers shared with others due to a software bug in the Download Your Information. Source:* http://www.zdnet.com/five-simple-ways-to-avoid-android-malware-7000017463 ** http://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report2013.pdf

Security measure comparison of legacy PC s, Android, ios and Windows* models Security measure PC Android ios Windows* Device control Add-on Add-on Add-on Add-on Local anti-malware Add-on Add-on Unavailable Native Data encryption Add-on Configuration Config/Add-on Configuration Data isolation/segregation Add-on Add-on Native Native Managed operating environment No No Yes Yes Application patching User-managed User-managed Native Native Access to modify system files Requires administrator Requires rooting Requires rooting Requires administrator * = Refers to Windows tablets and smartphones based on Microsoft Windows Phone, RT and Surface

Walled Garden approach to OS and app management Devices can be jailbroken for modification of OS OS updates can impact enterprise networks Apple maintains tight control over MDM APIs Android is open to rooting and unlocking OS upgrades are not always available check with carrier Browser-based active content security concerns Beware rogue app stores and overly permissive apps Support chain includes Google, device vendor and carrier Similar to a PC security model require a security suite

Data Share Sync Encrypt Manage Devices Configure Provision Secure Support Access Net Optimization Authentication Encryption Apps Contain Inter-app controls Provision-app store

Introducing EMM

An enterprise-grade complete mobility solution for managing and securing apps, data, and devicesacross the whole stack Enterprise-class MDM Multi-factor single-sign on Unified corporate app store Mobile app management Essential mobile productivity apps Productivity and Collaboration Data Management App Management Device Management

is the set of people, processes and technology focused on managing the increasing array of mobile devices, wireless networks, and related services to enable broad use of mobile computing in a business context. wikipedia

Mobile Device Management Mobile Application Management

BYOD Knowledge Worker Native email and access to work documents BYOD Board of Director Access to corporate data with restrictions on data storage Remote/Field Worker Company-issued device with controlled access to data and apps MDM: Control usage and prevent access if device is out of compliance. Prevent access if device is out of compliance Manage full device life cycle MAM: Doc collaboration. Enterprise file sync and share Deliver virtualized apps with no on-device data storage Push custom apps and updates to the device

Manage the device - whether corporate issued or BYO Manage the device throughout lifecycle

Device password Remote wipe, lock Lock camera, WIFI Encrypt email, calendar, contacts Detect jail broken/rooted devices access Prevent backup to cloud

Heavy-handed for BYOD All or nothing/device wide Intrusive Privacy concerns Data leakage issues

Manage and secure application whether offthe-shelf or internally developed Separate business from personal (containerization app wrapping, SDK, virtualization, dual persona) 1010 SSL1010101010110 SSL10 SSL1010101010110 People Network Apps & Data Corporate app store to deliver apps to BYO or company-issued device Content management

Application password Application encryption Prevent cut/copy/paste and open-in Geo-fencing Per app VPN SSO

Policy Framework Data Protection/Leakage App wrapping or SDK for ios /Android/Windows App level policies Encryption Data containment Inter App Intuitive app to app workflows Constrained Open-in Mailto and http intercepts Network Access Secure browse with micro-vpn SSO & Identity federation Micro-vpn for all apps

App Wrapping API Interception techniques mobile app Direct modification of app binary (replace symbol references) Runtime hook injection for system calls & native libraries Objective-C categories with method swizzling (ios) network files clipboard Policy aware network interception files functions clipboard mobile OS micro-vpn encrypted storage mobile services Security Framework code injected via dynamic library encrypted clipboard SDK based apps Symbols redirected at compile time Access to native services reduces need for hooks/swizzling Security Framework statically linked

Enterprise logon only (AD + 2 nd FA) Local logon only (pin/passcode) Enterprise & Local (based on connectivity) None Authentication No. of failed login attempts before lock Time-based Re-authentication period Max offline period Active poll period App update grace period Device status Block jailbroken/rooted devices Allow WiFi connected devices only Allow devices on Corp WiFi only

Data Containment Hardware blocking Encryption What happens in containerized apps stays in containerized apps.

Block cut/copy/paste Block/Constrain Open-in Define URL schemes (ios)/intents (Android) Scoping via security groups

File vaults Private by default, configurable by policy to shared within group Separate encryption of persistent app data Online only: Vault keys held in KMS, Key TTL configurable Offline: Vault keys maintained by app, user must authenticate with local password Potentially more secure than device level encryption

Best Practices

Fine tune policy settings as needed. Nothing set in stone. Create, publish, market and support rules and guidelines. Mobile Manage & Secure Plan Start here What s the goal of the plan? Timeline? Not all users need to be treated equally: define needs.

Establish formal policies: security, mobility, BYO And make users aware of policies and their importance! Monitor and secure sensitive data-don t allow if not secured Two words-authentication and encryption Follow local regulations, in regards to privacy and data movement Work with users segment security rules based on location, data, access

Work better. Live better. Come see our XenMobile Enterprise solution at our booth!