Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P: 222.333.4444



Similar documents
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Remote MasterMind for Mobility. Mobile Device Management Software

Remote MasterMind for Mobility 2.5. Mobile Device Management Software

Remote MasterMind 3.0. Mobile Device & Bar Code Scanner Management Solution

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

BYOD: BRING YOUR OWN DEVICE.

Security Architecture Whitepaper

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

Zenprise Device Manager 6.1.5

Remote MasterMind 4.0

Samsung Mobile Security

SOTI Inc. Presents. Andrew Aldis - Presale and professional service engineer jayp@soti.net.

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Get Tough with Mobile Device Management

Securing Corporate on Personal Mobile Devices

Enterprise Mobility as a Service

Enterprise Mobile Device Management

Managing Mobile Devices Over Cellular Data Networks

ONE Mail Direct for Mobile Devices

Mobile Device Management for CFAES

FileCloud Security FAQ

Ensuring the security of your mobile business intelligence

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

The Encryption Anywhere Data Protection Platform

Resco Mobile CRM Security

BYOD Guidance: BlackBerry Secure Work Space

Chris Boykin VP of Professional Services

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Vs Encryption Suites

BENEFITS OF MOBILE DEVICE MANAGEMENT

iphone in Business Security Overview

Enova X-Wall LX Frequently Asked Questions

Symantec Mobile Management for Configuration Manager 7.2

System Configuration and Deployment Guide

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

EMC DATA DOMAIN ENCRYPTION A Detailed Review

EasiShare Whitepaper - Empowering Your Mobile Workforce

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

ipad in Business Security

Supplier Information Security Addendum for GE Restricted Data

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Cloud Services MDM. Management Admin Guide

SecureD Technical Overview

1 Mobile Device Management

We Manage Mobility. Manage Secure Support Monitor Track. Balhar Dosangh Director, Strategic Alliances

SENSE Security overview 2014

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

Deploying iphone and ipad Security Overview

Navigating Endpoint Encryption Technologies

Feature List for Kaspersky Security for Mobile

SOOKASA WHITEPAPER SECURITY SOOKASA.COM

Feature and Technical

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

PRIME IDENTITY MANAGEMENT CORE

Innovative Secure Boot System (SBS) with a smartcard.

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

Windows Phone 8.1 Mobile Device Management Overview

Enterprise Mobility Management

SimplySecure TM Architecture & Security

Cloud Services MDM. ios User Guide

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

ACER ProShield. Table of Contents

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

Service Overview CloudCare Online Backup

Kaspersky Security for Mobile Administrator's Guide

How To Protect Your Mobile Devices From Security Threats

RFI Template for Enterprise MDM Solutions

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Hands on, field experiences with BYOD. BYOD Seminar

MaaS360 Mobile Enterprise Gateway

Best Practice Document Hints and Tips

How To Manage A Mobile Device Management (Mdm) Solution

Salesforce1 Mobile Security Guide

Cortado Corporate Server

TouchDown for Android

Kaspersky Security for Mobile

BYOD BEST PRACTICES GUIDE

Kony Mobile Application Management (MAM)

Implementation of Operator Authentication Processes on an Enterprise Level. Mark Heard Eastman Chemical Company

Transcription:

Working Together Managing and Securing Enterprise Mobility WHITE PAPER Larry Klimczyk Digital Defence P: 222.333.4444

Contents Executive Summary... 3 Introduction... 4 Security Requirements... 5 Authentication... 5 Encryption... 7 Encryption Type... 8 Encryption Speed Tests... 9 Write Speed Test... 10 Read Speed Test... 10 Enhanced Encryption with Secure Mobile... 10 Secure Mobile Encryption Features... 11 Application Lock-Down... 12 User Interface Lock-Down... 13 Authentication... 13 Encryption... 14 Application Lockdown... 15 External Communications Protection... 15 Secure Mobile Feature Summary Table... 16 Page 2

Executive Summary Enterprise and government organisations are empowering their people with mobile technology at an ever increasing rate of deployment. By itself, the sheer number of devices with access to company resources and valuable data presents a tremendous task for even the best equipped network administration department to contend with. To make the situation even more challenging and complicated are BYOD (Bring Your Own Device) initiatives finding their way into many organizations as a way to decrease overall hardware TCO (Total Cost of Ownership) the enterprise typically bears. Increasingly these organisations need to ensure that the tools used in the field are both effective and secure and can be centrally managed for applications and security. As the risk of loss or theft of the mobile devices is much higher than traditional desk top computers, the data contained in the deployment of mobile devices must be secured. This includes data on the devices themselves and data on any removable storage such as SD cards and USB memory sticks, which are even more likely to be lost or stolen. The two primary players in mobile security and device management are Digital Defence and SOTI. Digital Defence produces Secure Mobil, Secure PC, and Secure Access Control, while SOTI develops industry-leading Mobile Device Management (MDM), Mobile Content Management (MCM), Mobile Email Management (MEM), Mobile Application Management (MAM) and Mobile Security Management (MSM) solutions. The scope of this paper will focus on a collaboration of Digital Defence Secure Mobile and SOTI MobiControl. Secure Mobile is positioned in the global market for organizations that require mobile security solutions that work without interrupting the day to day mobility needs of the user. Furthermore, Secure Mobile uses a unique architecture that is invisible to the user and won t impede device performance. SOTI boasts over 80,000 customers worldwide using their award-winning MobiControl to enhance enterprise mobility and enable Bring Your Own Device (BYOD) initiatives. MobiControl manages the deployment of mobile devices and contains a set of tools to maintain the protection of data at rest and in transit. This document focuses on the protection of data at rest as this is the functionality provided by Secure Mobile, as well as the protection of Windows Mobile devices, as Page 3

this is the platform that is, today supported by Secure Mobile. In addition, this document aims to show how SOTI s MobiControl and Digital Defence s Secure Mobile work together to provide world class mobile device management and comprehensive FIPS approved encryption, authentication and access control. Each sub-section of the Security Requirements section will analyse a security requirement highlight the additional features when MobiControl is enhanced with Secure Mobile. Introduction Digital Defence s Secure Mobile and SOTI s MobiControl each offer a robust set of features as outlined below. However, there are critical areas where Secure Mobile helps improve the capabilities and features of MobiControl. These will be discussed in more detail later. SECURE MOBILE Enterprise Mobility Validated Security Solution from MOTOROLA Central Control of Black and White Listing of Applications and Wireless Connections. Invisible to User by Residing Under the OS. Transparent Technology Not Visible to User. Excellent Device Performance with Less Than 2% CPU cycles during Encrypting or Decrypting operations. Data Encrypted and Decrypted at Bit Level Without Device Interruption. Device authentication through LDAP Integration Allowing Connection to Remote User Credential Validation. First to Market with Fingerprint User Authentication. Back Office Control and Deployment of Security Policies through the Centralized Management Console. Single Sign-On allowing Automatic File Decryption. File and Folder Level Encryption. 100% Customer Support Customer Driven Feedback System that Drives Further Application Page 4

Development. Federal Information Processing Standard (FIPS) Accredited Enforceable User Authentication using Password Strength and LDAP Access Criteria. File Level Encryption using either a Simple or AES Algorithm. Mobile Device Application Blockage. Mobile Device Feature Blockage such as ActiveSync, Camera, Bluetooth, Phone, and Infrared. Phone Number Blockage for Incoming and Outgoing Calls. User Interface Lock Down to Customize the Look and Feel of a Mobile Device. Help Desk Remote Control Feature. Web Filter Policy Controls Location and Geofencing Services. Telcom Expense Management Tools. Certificate Management. Asset Management features for both mobile device hardware and software. Multi-Platform Administration including ios, Android, and Windows, Security Requirements In a brief review of both product offerings, it is clear that each has a robust set of features for mobile device deployment in the enterprise environment. However, there are four areas that deserve specific attention. Authentication To help ensure the right person has access to the right resources at the right time, authentication techniques are utilized for appropriate control. SOTI s MobiControl makes numerous provisions for User Authentication. Page 5

ActiveSync Protection o Connecting a PC to the Mobile Device using ActiveSync does not require any authentication. Registry entries and files, including encrypted files, are accessible via a connected PC providing a back door approach to access sensitive data and files. o There is no option to ensure only specific PC s can connect to a mobile device. Password Expiration With Secure Mobile there is the additional option of requiring the password to be changed after a specific period. Password History Protection o There is no available method to force users to choose different passwords each time they change the password. Secure Mobile provides for protection of the mobile device password history information. User Inactivity Controls o Numerous mobile device applications, such as Sat-Nav applications, require time interval access that may not work user inactivity policies. Under these conditions, it would not be desirable for the mobile device to lock after a period of inactivity. Secure Mobile allows for the selection of specific applications that can override the user inactivity lockout setting. Grace Period Support o Secure Mobile provides the user with a grace period from the time a mobile device is turned off (standby mode) to the time the mobile device is turned back on. The grace period does not require user authentication. Full Screen, Large Button, Quick Input Customization o Due to the small size of mobile devices, it can be cumbersome to enter a password into a small on-screen keyboard. It is desirable for the full screen to be utilized in order to provide larger input buttons for faster password entry, of which Digital Defence provides for. Biometric Support o Due to the cumbersome nature of entering a password into a small screen, it is desirable to provide an alternative and faster method for user Page 6

authentication. Secure Mobile supports the use of biometric input devices such as a fingerprint reader. Encryption S e c u r i t y F e a t u r e s C o m p a r i s o n Password Fingerprint Cryptographic Card LDAP Integration Enforce Password Enforce Password Expiration Enforce Password History Custom Password Full-Screen Input Grace Period Auto-Off Lock Screen Auto-Off-Disabled during specific active applications ActiveSync Authentication Logging Wipe Device After Failed Attempts F = Future Feature Secure Mobile Encryption policies are used to enforce the encryption of files on a mobile device. Once a file is encrypted, it is decrypted in real-time. The Administrator Authentication and User Authentication must be enabled before this security feature can be enabled. The benefits of encryption include individual file management, access control enforcement, data protection using public domain Internet access points, and the prevention of unauthorized access. F F Page 7

Once the policy has been sent to a mobile device, the appropriate files are encrypted in the background. Access to the encrypted files is seamless to the user; the user password authenticates access to the encrypted files. An encrypted file contains extra header information at the start of the file. The original contents of the file are encrypted using encryption key information stored on the mobile device. The header details describe which segments of the file have been encrypted. This allows a partially encrypted file to be accessed by the user. The type of encryption can be setup within Digital Defence s Secure Mobile Configuration Profile. ENCRYPTION TYPE o Simple - used for quick encryption (WEAKEST) Page 8

o AES256 (Fixed Password) STRONG. Using this type generates a password that will be permanently used to protect the encryption key. This method does not require user intervention. o AES256 STRONGEST. A password is chosen and must be verified by the user of the mobile device. This method requires user intervention. A Configuration Profile can only be setup on a mobile device via barcode provisioning. This presents a potential operational issue. If the security policy of an organisation changes to require a new encryption algorithm, then all mobile devices need to be recalled. The most efficient method to install AES encryption on all mobile devices would be to clone one mobile device and send out the clone to the population of mobile devices. Encryption Speed Tests A very important aspect of any security policy is the enforcement of encryption on sensitive data. In order for an encryption policy to become effective, the encrypted data should be accessed in real-time and be seamless to the user. The efficiency of encryption can be assessed by executing read and write operations and comparing the access times to those achieved by a mobile device without any encryption. While a typical application will not read and write to storage continuously, this test gives an indication to the efficiency, and therefore usability, of the encryption. The encryption test forces each read and write to be completed to the physical storage (i.e. no caching of data). This ensures that the speed of encryption is fully examined. The following tables show the speed test results of SOTI s encryption compared to the default encryption provided by Windows Mobile and the encryption provided by Secure Mobile. The speed tests were completed on a Motorola ES400 device. The SOTI simple encryption algorithm was chosen for comparison to show the most simple, much weaker, encryption access speed. As can be seen by the tests, SOTI encryption has a very large impact on the usability of the mobile device. The general operation of encrypted SOTI files, however, does not appear to have a large impact on the performance of the mobile device. This indicates that SOTI uses caching Page 9

of data to improve the speed of the mobile device. This opens up the vulnerability of sensitive data being held in the mobile device s memory in plain unencrypted form. WRITE SPEED TEST File Size 16KB 128KB 1MB 8MB 128MB Performance Hit No 0.09 0.21 0.80 4.01 64.48 x1.00 Encryption WM AES 0.07 0.34 1.43 11.85 191.13 x2.96 SOTI Simple 0.58 2.96 24.68 202.97 3495.83 x52.82 Secure Mobile 0.17 0.60 1.96 13.22 230.48 x3.57 READ SPEED TEST File Size 16KB 128KB 1MB 8MB 128MB Performance Hit No 0.02 0.06 0.18 1.27 20.38 x1.00 Encryption WM AES 0.03 0.08 0.46 3.63 56.78 x2.79 SOTI Simple 0.36 2.40 19.12 169.12 2681.88 x131.60 Secure Mobile 0.06 0.12 0.58 4.21 66.34 x3.26 Enhanced Encryption with Secure Mobile Digital Defence s Secure Mobile offers these market leading features: File types. Encryption happened on any.exe,.dll, or.bin files. o No matter what the contents are, these file types are encrypted by Secure Mobile. The data inside these file types may simply be executable content, however the data may also be sensitive. Particularly in the case of.bin files. Even an executable file can become sensitive, as in the case of proprietary software. o Keeping these file types secure will help achieve a high level security certification. Page 10

o Filename encryption. Secure Mobile encrypts the file s contents and the filename. A filename in many cases contains information relating to the content. Simply knowing a filename could lead to targeted decryption attempts. Keeping the filename secure will help achieve a high level security certification. Authentication. Secure mobile enforces User Authentication on the mobile device and also enforces a PC connection (to the mobile device) to require User Authentication. This prevents an attacker from connecting a mobile device to a PC and simply accessing all the encrypted files as if they are plain un-encrypted ones. Encryption Key Duplication. Secure Mobile creates a different encryption key for every file that is encrypted on the device. If one file can be decrypted, which is highly unlikely, only the data contained in that individual file will be accessed. With Secure Mobile, each file has to be separately decrypted using the a unique algorithm and key value. Application White / Black Listing. Secure Mobile sets rules around what applications can be either White Listed (allowed to access encrypted data) or Black Listed (never allowed to access encrypted data). Secure Mobile is agnostic to what applications are on the device, it simply controls what applications can access encrypted data. SECURE MOBILE ENCRYPTION FEATURES Security Feature Secure Mobile Filename Unique Encryption Key.exe encryption.bin encryption.dll encryption ActiveSync authentication Application authentication Guaranteed encryption Benchmark Speed (Write) x3.5 Benchmark Speed (Read) X3.25 Encryption Algorithm AES 128 and 256 bit FIPS 197 Approved Real-time encryption Encryption Support Tools Page 11

Device Authentication enforcement Memory Card Encryption Onboard Persistent Storage Encryption Application Lock-Down An Application on a Windows Mobile device is capable of performing many tasks and operations potentially harmful to the mobile device and its connected network. Therefore, it is desirable to disable unnecessary applications from being executed. It may also be desirable to disable applications from accessing encrypted data. Black List. A list of applications that are not allowed to be executed on the mobile device. White List. A list of applications that are allowed to be executed on the mobile device. This is a potentially dangerous list to include on controlled mobile device, as critical platform applications can be disabled from use. Security Feature Secure Mobile Application White List Application Black List Encryption Blocking Block Bluetooth White List Bluetooth Block Wi-Fi (WLAN) White List Wi-Fi Block Cellular Data (WWAN) White List Cellular Data F Block PC Connection (ActiveSync) Block USB White List USB Block Camera Page 12

Block Phone Numbers White List Phone Numbers * - Wi-Fi and Cellular Data Networks can be selectively allowed or completely blocked by setting up a Configuration Profile and locking down the User Interface. - ActriveSynccan be blocked by disabling the appropriate application, or selectively blocking the appropriate USB connection type. F Future feature. User Interface Lock-Down A Windows Mobile device is a generic device capable of performing many diverse tasks. This opens up the device to the threat of many types of security attacks. In an operational sense, there is also the possibility that the workforce is not using a mobile device to its full efficiency (i.e. workers using the device for personal related activities). SOTI MobiControl provides the capability to lock down the interface available to the user. This ensures a mobile device is used for its workforce application only, and also prevents the user from introducing security vulnerabilities. This capability is provided by the Lockdown Policy. Authentication Secure Mobile offers large input buttons for fast input and provides fingerprint integration. Secure Mobile enforces device authentication before an ActiveSync connection is being made. Retrieving any encrypted data from the mobile device is not possible via ActiveSync, including encrypted data. Secure Mobile has the feature of forcing user passwords to expire after a period to enforce the use of rolling passwords, adding an additional level of security. Page 13

Encryption MobiControl provides the capability to encrypt files on a mobile device. Once the files have been encrypted, they are accessed by any application in real-time without any extra steps required from the application or the user. The requirement for User Authentication ensures that only an authorised user can access any encrypted data; of course it s still possible to connect a PC to the mobile device, via ActiveSync, without any requirement for user authentication.. This vulnerability can be mitigated by disabling the use of ActiveSync. Although MobiControl can enforce the use of encrypted files in any folder of the mobile device, it does not encrypt.exe,.dll, or.bin file extensions. These file types become vulnerable to attack; it s still possible for sensitive data to be contained inside these file types. MobiControl encrypts files in the background, so it is not known when all files are encrypted at a given point in time. When there is a read or write of encrypted data to physical storage, there is a huge impact on system performance. Although the contents of the files are encrypted, the filenames are not; exposing the filename can result in access to sensitive information contained in the filename. MobiControl does not provide a mechanism to prevent specific applications from accessing encrypted data. Summarised MobiControl s Encryption provides good protection for specific files. It does not provide full protection of all data, which is required for many certifications. If does not provide a complete suite of tools to assist the management of encryption. Physical access of encryption is slow; hence much work is done in the background leading to sensitive data held in memory unencrypted. Page 14

Application Lockdown MobiControl provides the capability to block applications from being executed; it also provides the capability to setup a list of applications, of which only they can be executed. This provides a method to ensure the users of the mobile devices are only using the devices for work related activities and also prevents rogue applications from being executed. MobiControl does not provide a mechanism to protect encrypted data from unknown applications. Summarised MobiControl effectively locks out applications from being accessed by a user, however if does not provide the same capability to lockout applications from accessing encrypted data. EXTERNAL COMMUNICATIONS PROTECTION MobiControl provides the capability to disable features of a mobile device relating to external data communications. This capability protects security vulnerabilities emanating from external sources. MobiControl does not provide any method for blocking the connection of USB devices, except for the prevention of using ActiveSync. USB devices are capable of sending and receiving data, therefore presenting a security risk. MobiControl does not provide a method for generally or selectively blocking Wi-Fi, Bluetooth, or Cellular Data. MobiControl can lock down the User Interface, thereby blocking any chance for the user to setup any external connections. Pre-defined external connection settings can be setup using a Configuration Profile. This combination is the only way of creating a White List of external connections. Page 15

Summarised MobiControl provides the capability to disable some external communications from being used, however it does not provide full disablement nor does it provide customisation for specific external communication channels to be used. It does, however, allow the User Interface to be locked out from the user; thereby effectively providing the customisation of external communication channels (via a Configuration Profile). Secure Mobile Feature Summary Table The following table summarizes the features provided by Digital Defence Secure Mobile. Security Feature Authentication Password Fingerprint Cryptographic Card LDAP Integration Enforce Password Strength Enforce Password expiration Enforce Password History Grace Period Custom Password Full-Screen Input Screen Auto-Off Lock Screen Auto-Off Disabled during specific active applications ActiveSync authentication Logging Wipe Device after x failed attempts Secure Mobile F F Page 16

Encryption Filename Unique Encryption Key.exe encryption.bin encryption.dll encryption ActiveSync authentication Application authentication Guaranteed encryption Benchmark Speed (Write) X3.5 Benchmark Speed (Read) X3.25 Encryption Algorithm AES 128bit Real-time encryption Encryption Support Tools Device Authentication enforcement Memory Card Encryption Onboard Persistent Storage Encryption Application Lockdown Application White List Application Black List Encryption Blocking Communications Lockdown Block Bluetooth White List Bluetooth Block Wi-Fi (WLAN) White List Wi-Fi Block Cellular Data (WWAN) White List Cellular Data F Block PC Connection (ActiveSync) Block USB Page 17

White List USB Block Camera Block Phone Numbers White List Phone Numbers - ActiveSync can be blocked by disabling the appropriate application, or selectively blocking the appropriate USB connection type. F -Future feature. Page 18