Executive Summary SyncDog Enterprise Mobility: The Big Data Answer for BYOD Mobile computing is adding another layer of complexity to big data, widening the infrastructure attack surface. Organizations unprepared to leverage big data for cyber-threat detection leave themselves to great risk!
Mobile devices have now become integral IT worksta ons connec ng users with company and client 24/7/365. The in macy and immediateness of mobile communica on can be the difference-maker between an employee losing or leaving their job and a company losing a valued client. Ready or not, mobility has already injected itself deep into your enterprise IT. The good news is if you know this and are prepared to manage it as you would any other IT asset, chances are you will be able to deliver the expected performance and availability of the IT asset and all the applica ons it serves to the end user. However, the very hybrid nature of a Bring-Your-Own Device (BYOD), part personal a aché - part office companion, means that your security and service delivery approach will have to be quite different than that of an enterprise laptop/desktop/server. Most all technologists agree that this discipline falls within Enterprise Mobility Management (EMM), however, the en rety of the endeavor cannot be completely contained within EMM. If we are going to manage the mobile IT asset as if it were another connected worksta on, the generally accepted EMM defini on does not contain enough checkpoints to use as a guide for best prac ce. How can this be, you might ask, and didn t EMM just arrive on the scene last year? The short answer is blame big data. Because of Informa on Security (InfoSec) and industry compliance concerns from BYOD, IT needs needs to collect user event log data, and mobile devices generate a lot of it. Es mates on data use vary, but on average smartphone users generate around 1GB per month. SyncDog es mates this number is low and represents more users outside of the BYOD ecosystem. The corporate BYOD user who streams personal audio and video, accesses client email with file a achments and connects to enterprise file stores, instant messaging and other business applica ons, this number is most likely much higher than 1GB per month. To illustrate at just 1GB per user per month, consider a company the size of St. Petersburg, Florida-based Raymond James Bank at 6,200 employees. If only half are mobile users consuming 1GB of data per month, the mid-sized bank is going to have a 3 terabyte-permonth bandwidth problem. Bandwidth however isn t the only mobile data problem the mid-sized bank will have to consider. For informa on security, compliance and audit purposes, IT managers are going to need to selec vely collect and archive individual device log data for every applica on launched, every file store accessed, and every email, every website accessed, every loca on tracked by GPS (where legally allowed or required). It is impera ve that IT managers only capture essen al data and that it be used proac vely for threat detec on. The list goes on and on and with audi ng requirements (some 10 years or longer), this data will con nue to test the capacity limits of storage. Industry analysts from think tanks like Gartner and Forrester Research agree that device and applica on
management through a container approach is the best prac ce for mobile data collec on and secure applica on deployment/management. Containeriza on is the process of segmen ng corporate and personal data on the device in containers that can be controlled with encryp on and authen ca on. The prac ce of pu ng data in containers is rela vely new and SyncDog Enterprise is one of only a handful of so ware vendors that is capable of addi onally segmen ng applica ons into containers. The caveat here with containerized applica ons is the flexibility your mobile so ware vendor possesses to handle different applica on frameworks or APIs. SyncDog Enterprise provides both client/server app container and client/server app container with a flexible SDK/API. This allows users to have their own device with their own apps, mul media and email on the same device where corporate data and apps are containerized. While EMM centers on managing the mobile asset and applica ons that the asset delivers, big data and real- me monitoring seem to be the forgo en redheaded mobile management stepchildren. A recent study found that the average employee uses three to five different devices to access a corporate datacenter. These devices are all genera ng applica on and event-log data at an alarming pace, as well as placing addi onal performance load on other components in the infrastructure. It is es mated that 90 percent of the world s data today has been produced in Global mobile data traffic will grow just the last 2 years. three times faster than fixed IP traffic from 2012 to 2017. Global mobile The asterisk to EMM* is Big Data data traffic was 2 percent of total IP Much has been wri en about MDM and its restric ve approach to BYOD and MDM s evolu on to EMM. TechTarget senior editor, Colin Steele, provides a good defini on of EMM as the all-encompassing approach to security enabling business workers use of smartphones and tablets. Most agree that EMM is the evolu on of enterprise mobile device administra on covering deployment and security (MDM) and traffic in 2012, and will be 9 percent of total IP traffic in 2017. - Cisco Visual Networking Index: Forecast and Methodology, 2012 2017 Whitepaper, May 2013
applica on delivery (MAM). But Big Data responsibility in a typical IT enterprise seems to be stuck somewhere between storage administra on, informa on security and applica on delivery. Clearly the asterisk to EMM is Big Data and SyncDog Enterprise has provisions for managing Big Data for mobile administra on, real- me monitoring alerts and informa on security and applica on delivery. SyncDog Enterprise takes a modular a la carte approach to solu on delivery and can be deployed as a fully-integrated solu on or in synchrony with an exis ng BYOD implementa on. The new big 3 we focus on when deploying EMM are Big Data, MDM and MAM. SyncDog Enterprise Big Data focus: SyncDog has a message filtering facility that allows the client to add only event logs that are relevant to IT security and monitoring. This provides clients the ability to collect only the log files needed to correlate events for cyber threat detec on and minimizes the need to collect all log (Big) data. SyncDog delivers performance and availability monitoring through a centralized web-based console, providing live proac ve no fica ons for devices that are genera ng data, including status (on/off), internal and external resource u liza on, and correla on alerts for user logs indica ve of cyber threat. SyncDog Enterprise Mobile Device Management considerations SyncDog Enterprise provides AES 256-bit encryp on on a so ware-based data pla orm. SyncDog Enterprise uses Federal Informa on Processing Standards (FIPS) encryp on for securing email, a achments, calendar items, tasks, and contacts. For data on the go, SyncDog Enterprise provides a par oned applica on in an encrypted loca on of the mobile device that does not restrict normal use of the device For mobile iden ty management, SyncDog Enterprise delivers a hardware-separated and encrypted token device
that requires mul -factor authen ca on for access. Without knowing both device ID and user ID, no access is granted to the device nor can it access the network. While authen cated, the device operates as normal with no disrup on from the token. SyncDog Enterprise provides cross-pla orm MDM for mobile inventory and asset management with Android, ios, BES and Good Server monitoring, and provides integra on for Ac ve Directory and LDAP. SyncDog Enterprise u lizes an industry-leading event log correla on engine for defending cyber breaches and can no fy a security admin of poten al internal or external threat before the breach occurs. SyncDog Enterprise MDM reduces mobile risk and ensures audit compliance by snapsho ng the known trusted state of the device and no fies security admins if there are any changes to the secure configura on state. The device is con nuously scanned for any changes with detailed event log records accessible from a centralized admin dashboard available through any web browser. An easy-to-use admin dashboard provides simple search for device status and audit history with the capability to perform instant over-the-air lock or wipe. SyncDog Enterprise provides the ability to bulk provision users at onboarding thru end of life. SyncDog Enterprise s peer monitoring system is a locked-down device app, not accessible to the device user SyncDog Enterprise has been deployed worldwide and is currently monitoring more than 400,000 smartphones. SyncDog Enterprise Mobile Application Management focus SyncDog delivers cloud-based MAM to enterprises with both mobile workforces and end-user consumers.
SyncDog provides cross-pla orm MAM for mobile with:» Custom applica on store» Applica on tes ng & crash analysis, plus» Applica on performance monitoring with analy cs SyncDog MAM can manage app transac ons through both internal (IT department deployment) and external (Apple or Android) exchanges. SyncDog MAM leverages 128-bit encrypted SSL Since applica ons vary by market segment, MAM deployments are industry-specific. SyncDog has provided MAM to the following segments:» Healthcare Government Media Retail Transporta on U li es Financial SyncDog Enterprise Deployment GOOD NOC Good Technologies Devices GMM/GMC Active Directory PUSH NOTIFICATION SERVICE ios Sentinel DMZ Relay Sentinel Mobile Connector Sentinel Management Server Admin Console Android GCM Big Data/SQL BlackBerry BLACKBERRY NOC BAS/BES Ledger Public Internet DMZ Enterprise Data Center Sentinel Mobile Agent ios / Android / BlackBerry Mobile Device Data Capture Sentinel Server Sentinel Data Push to Mobile Device Sentinel Server Agent About SyncDog SyncDog, Inc. 1818 Library Street, Suite 500 Reston, VA USA 20190 Call: (703) 430-6040 Fax: (703) 997-8667 sales@syncdog.com www.syncdog.com To overcome BYOD challenges, IT administrators need real-time visibility into the service status of every device on the network, regardless of ownership. Mobile professionals are the new norm and downtime is a productivity killer. Mobile Enterprise Security Correlation made simple!