SlideShare a Scribd company logo
1 of 13
Download to read offline
White
Paper
A Business-Driven Approach to Mobile
Enterprise Security
By Jon Oltsik, Senior Principal Analyst
May 2012
This ESG White Paper was commissioned by Juniper Networks
and is distributed under license from ESG.
© 2012, Enterprise Strategy Group, Inc. All Rights Reserved
White Paper: A Business-Driven Approach to Mobile Enterprise Security 2
© 2012, Enterprise Strategy Group, Inc. All Rights Reserved.
Contents
Executive Summary ......................................................................................................................................3
Just What Is The Mobile Enterprise?............................................................................................................3
Mobile Enterprise Momentum Is Driven by Business Needs................................................................................... 5
The Mobile Enterprise Presents Numerous IT Security Challenges.............................................................5
A Business-Driven Approach to Mobile Enterprise Security ........................................................................6
Mobile Enterprise Policy Creation............................................................................................................................ 7
Mobile Enterprise Management, Network, and Security Infrastructure................................................................. 9
Mobile Enterprise Security Monitoring..................................................................................................................10
The Juniper Networks Mobile Enterprise Strategy ....................................................................................10
The Bigger Truth .........................................................................................................................................12
All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The
Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are
subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of
this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the
express consent of the Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if
applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at 508.482.0188.
White Paper: A Business-Driven Approach to Mobile Enterprise Security 3
© 2012, Enterprise Strategy Group, Inc. All Rights Reserved.
Executive Summary
IT consumerization and the massive influx of mobile devices is affecting many large organizations. CEOs want
immediate network access on Monday after buying the latest iPad version over the weekend. Young employees
think nothing of using work PCs for updating their Facebook status or using Dropbox to move documents to their
home computers. Sales managers are demanding that the global sales force be provided with access to cloud-
based CRM applications on their smart phones so they can access and update records from the road.
How should enterprises handle IT consumerization? While some Chief Information Security Officers (CISOs) would
prefer to simply prohibit and block these activities, industry research indicates that only about one-third of
organizations take this type of extreme position. Why? Because mobile devices and cloud services may lead to
new types of business process productivity gains and even revenue opportunities. Before organizations implement
Bring Your Own Device (BYOD) policies or let employees access social networking sites from the corporate network,
however, they must prepare the business and IT infrastructure to support these decisions, enable operational
benefits, and address added risk.
This white paper concludes:
• The mobile enterprise is a cooperative venture. Few companies have the right oversight or security
controls in place to handle a multitude of new security policies and enforcement rules for the mobile
enterprise. Business, IT, and security managers must think in granular terms: Who needs access to cloud-
based applications and services and how to integrate that with single sign-on enablement? Which users in
which roles should be allowed to use mobile devices to access the network and which applications should
they be allowed to access? What should and shouldn’t these users be allowed to do? What device types
and OS versions should be allowed? How will managers measure mobile enterprise activities to gauge their
success? Should a security policy do double duty, by not only customizing access to the user’s role,
location, and type of device….but also adjusting policy dynamically when needed, to isolate users under
attack and prevent the attack from spreading? To get ahead of the mobile enterprise, smart business, IT,
and security managers will take the time to answer these questions.
• Existing security controls are no match for mobile enterprise demands. Answers to the questions posed
above turn into security policies and these policies need to be monitored and enforced. Unfortunately,
today’s assortment of tactical security tools and network access controls aren’t designed for mobile
enterprise security requirements like central policy management, coordinated distributed enforcement, or
end-to-end monitoring.
• Large organizations need a tailored mobile enterprise strategy. The mobile enterprise changes a number
of requirements for campus networks, including network access controls, security controls, and
monitoring/reporting. What’s needed here is a new type of integrated network/security architecture built
specifically for central command-and-control, distributed security enforcement, comprehensive monitoring
capabilities, and real-time automation to support critical business processes or block attacks in progress.
Businesses need to consider the scale and resiliency of the network as a core requirement, since the mobile
enterprise is moving to enable business-critical functions on mobile devices.
Just What Is The Mobile Enterprise?
In ancient times (i.e., 10 to 15 years ago), corporate IT was tightly controlled. User devices were typically limited to
Windows PCs. Business applications were controlled by IT and either run locally on endpoints or on physical servers
in data centers. Network security was based upon clearly defined perimeters that separated trusted internal
networks from the untrusted Internet.
Fast forward to today and you’ll see massive changes in each of these assumptions. Now, corporate networks must
accommodate:
White Paper: A Business-Driven Approach to Mobile Enterprise Security 4
© 2012, Enterprise Strategy Group, Inc. All Rights Reserved.
• A growing array of new devices. According to ESG research, 55% of enterprise organizations are
experiencing significant growth in employee use of alternative endpoint computing devices like Apple
Macintosh PCs, tablet PCs, and smartphones (see Figure 1)1
. In many cases, employees are allowed to use a
combination of endpoint devices as part of their day-to-day activities.
Figure 1. Organizations are Experiencing Growing Use of Alternative Endpoint Devices
Source: Enterprise Strategy Group, 2012.
• Cloud-based applications. Applications no longer run solely on physical servers in corporate data centers.
Quite the opposite, applications can run anywhere—on traditional physical servers, mobile virtual servers,
or in the cloud as Infrastructure as a Service (IAAS), Platform as a Service (PaaS), or Software as a Service
(SaaS). As if this wasn’t enough, end-users can now take advantage of a wide variety of cloud-based
applications and IT services for personal and professional use. Facebook can be used for an employee’s
personal profiles or as a component of a corporate marketing campaign. Employees depend upon Skype to
speak with friends abroad or for legitimate business video conferencing. Dropbox can be used to distribute
documents between corporate and personal devices for mobility and user productivity.
• De-perimeterization. Given new device proliferation, application mobility, and cloud-based consumer and
corporate services, the notion of a static network perimeter is all but gone. Now there are a multitude of
network perimeters around devices, applications, users, and data. These perimeters have also become
quite dynamic as they must adapt to various environmental conditions such as user role, device type, server
virtualization mobility, network location, and time-of-day.
All of these factors have transformed traditional enterprise IT into a new model called the mobile enterprise. To be
clear, however, the ramifications associated with mobile enterprises aren’t limited to internal issues like BYOD,
iPads, and cloud computing for employees. Rather, the mobile enterprise must also address external business
1
Source: ESG Research Brief, Corporate Endpoint Device Type Trends, May 2011.
We are experiencing
significant growth in
our employees’ use of
alternative endpoint
computing devices,
55%
We are experiencing
moderate growth in
our employees’ use of
alternative endpoint
computing devices,
29%
We are experiencing
some growth in our
employees’ use of
alternative endpoint
computing devices,
12%
We are experiencing
little or no growth in
our employees’ use of
alternative endpoint
computing devices,
5%
Which of the following statements best describes the changes your organization is
experiencing with respect to alternative endpoint computing devices? (Percent of
respondents, N=221)
White Paper: A Business-Driven Approach to Mobile Enterprise Security 5
© 2012, Enterprise Strategy Group, Inc. All Rights Reserved.
realities like providing guests, third-party contractors, and business partners network access using various devices
from a multitude of locations. To accomplish this, the mobile enterprise must be flexible, adaptable, resilient,
scalable, and always on.
Mobile Enterprise Momentum Is Driven by Business Needs
The mobile enterprise transition has another unique aspect. In the past, business managers were fairly impartial to
IT technology and infrastructure decisions but this is no longer the case. Forward-thinking technology executives
were at the forefront of pushing IT to provide network access for iPhones when they first appeared in 2007. The
same thing happened with the iPad introduction in 2010. CEOs are not alone. HR managers champion mobile
device support to CIOs as a means to recruit techno-savvy employees. Sales executives want to provide CRM access
to the sales team from any location and any device. This business-centric push is on the rise. According to
Datamation, iPads had penetrated 50% of Fortune 100 companies within 90 days of its first release. Previously
conducted ESG research indicates that, far from technology toys, most organizations consider mobile devices either
critical or very important for their business processes and overall productivity (see Figure 2)2
.
Figure 2. Mobile Devices are Considered Critical or Important for Business Processes and Productivity
Source: Enterprise Strategy Group, 2012.
The Mobile Enterprise Presents Numerous IT Security Challenges
Given the business value of greater connectivity, productivity, and application flexibility, the mobile enterprise has
become an unstoppable force. Unfortunately however, the existing IT infrastructure was designed and built for a
more genteel style of business computing. This is leading to a growing gap between mobile enterprise
requirements and corporate IT capabilities as a whole but the discontinuity is most acute with regard to IT security.
Mobile enterprises present unique security challenges because:
2
Source: ESG Research Brief, Mobile Device Security: It’s All About the Data, April 2010.
Critical, 38%
Important, 48%
Somewhat
important, 11%
Not important
today but will
become more
important in the
future, 1%
Not important
today nor in the
future, 1%
Don’t know, 1%
How important would you say the use of mobile devices by
employees is to your organization’s business processes and
productivity? (Percent of respondents, N=174)
White Paper: A Business-Driven Approach to Mobile Enterprise Security 6
© 2012, Enterprise Strategy Group, Inc. All Rights Reserved.
• Mobile device security is a work-in-progress. Large organizations have been battling endpoint security
issues for years—antivirus signature distribution, vulnerability scanning, patch management, etc. As bad as
this situation is already, mobile device security makes current PC protection seem like child’s play. Why?
These devices come in many flavors so IT and security teams must learn the platform, software, and
security idiosyncrasies of multiple systems. Consumer-focused mobile device applications are notoriously
insecure and known to perform blatant security policy violations like harvesting user contacts for vendor
marketing campaigns. Mobile devices are often lost or stolen, in some cases while containing sensitive or
regulated data. Finally, mobile device malware is on the rise, especially for the open source Android
operating system. Enterprises are quickly learning that managing and securing these devices is bound to
test their existing IT capabilities.
• Network access isn’t black and white. Obviously, mobile devices are portable which means they can
access the network from any WiFi access point or insecure Internet hotspot. Yes, this may bolster
convenience and productivity but it can also violate corporate governance or regulatory compliance
policies. Security best practices suggest a granular approach, where mobile device network access policies
are enforced according to who wants access, the type of device they are using, where they are located, and
what they want to do. In other words, network access privileges for mobile devices are based on a set of
decision criteria. This type of access control structure should be consistent and able to support, for
instance, employees with mobile devices or contractors using PCs from the corporate network. While
granular and contextual access controls can support business and security requirements, many existing
network and security point tools lack the integration or network coverage to provide this type of tailored
security policy enforcement across the enterprise.
• Web-based applications open new threat vectors. As described above, business applications have also
become highly mobile with the proliferation of cloud-based applications. Combined with laptops, tablets,
and smartphones, however, cloud-based applications represent a potentially toxic security mix. New
endpoint applications can open easily exploitable system vulnerabilities. Social networking sites like
Facebook can act as malware distribution vectors. Online file sharing programs like Dropbox could easily
become vehicles for accidental or malicious data leakage. Since most organizations are unwilling to block
all cloud-based application traffic, CISOs are forced to try to monitor and manage cloud-based application
activities without alienating employees or violating corporate security policies. Given the limitations of
existing network and security controls, this is extremely difficult to do.
• Security credential provisioning. Mobile devices are notoriously hard to handle with regard to the
credential provisioning to truly enable secure connections on the wireless network. Some verticals such as
education and hospitality prefer a non-intrusive clientless approach to credential provisioning while the
enterprise lends itself to a managed security provisioning approach.
These challenges are not trivial IT details as they represent a potential increase in risk to the business. Mobile
enterprise benefits must be aligned with proper management and security or it is fairly easy to lose visibility and
control of valuable IT assets and sensitive data. Lacking the right network infrastructure and security controls, CIOs
and CISOs face a losing battle here.
A Business-Driven Approach to Mobile Enterprise Security
Large organizations must make policy changes and security technology investments to adequately manage and
monitor new risks posed by the mobile enterprise. That said, ESG sees too many firms addressing mobile
enterprise security issues haphazardly by implementing standalone security policies, investing in tactical security
controls, or relying on incomplete monitoring. This may be reactionary. CISOs feel like they need to do something,
but incomplete measures provide marginal results, leaving organizations exposed.
ESG recommends a more strategic, comprehensive, and business-driven approach to mobile enterprise security
composed of three related activities:
White Paper: A Business-Driven Approach to Mobile Enterprise Security 7
© 2012, Enterprise Strategy Group, Inc. All Rights Reserved.
1. Create mobile enterprise security policies as a collaborative effort between business and IT.
2. Build the right network, security, and management infrastructure for the mobile enterprise policy support and
enforcement.
3. Monitor and measure mobile enterprise security for IT audits, policy and controls effectiveness, and constant
improvement
These three processes complement each other, creating a mobile enterprise security lifecycle that can be modified
as business, IT, and security requirements change (see Figure 3).
Figure 3. Cooperative Cycle for Mobile Enterprise Policy Creation, Management, and Security
Source: Enterprise Strategy Group, 2012.
Mobile Enterprise Policy Creation
ESG sees several common mistakes with current policy implementations in the marketplace. First, security
managers often create policies without input from their business peers. This tends to lead to guidelines that are
either overly liberal, adding risk, or excessively draconian, which disaffects users. It is imperative for organizations
to bridge this gap by crafting mobile enterprise security policies as a collaborative effort between business, IT, and
security. Business managers should come prepared with a list of objectives in terms of desired user behavior and
success metrics while IT and security executives should be equipped to point out risks and any technical limitations.
Both groups should also fully understand and adhere to the organization’s governance statutes and compliance
obligations.
White Paper: A Business-Driven Approach to Mobile Enterprise Security 8
© 2012, Enterprise Strategy Group, Inc. All Rights Reserved.
Detail-orientation is very important with regard to all security policies, so it behooves business and IT executives to
do their homework and craft mobile enterprise policies that include:
• Device and configuration support. BYOD cannot become an “open door” to any device from any user.
Business managers should be ready to make a case for popular consumer devices like Macintosh PCs,
iPhones/iPads, and Androids, and clearly propose why supporting these devices could benefit the business.
Some firms may also need support for Blackberries and Windows Mobile, but since support equates to
investment, each device type must have a clear and measurable business justification.
Once devices are selected, it is important to define what “support” means. As part of security best
practices, IT managers should be able to inspect each device before allowing network access. IT will want
to establish configuration guidelines for operating systems and applications. For example, “rooted” or “jail-
broken” devices are not permitted on the network, and mobile devices cannot store corporate contacts on
local storage. As part of configuration management, IT should ensure that all devices are PIN protected
with a 4-digit password as a minimum standard and those passwords are changed at least 4 times per year.
IT will also likely want to install management and/or security software such as digital certificates, VPN
clients, anti-malware protection, and remote wiping capabilities on each device in case they are lost or
stolen. In verticals that don’t lend themselves to installing IT-managed software on the mobile device, a
clientless self provisioning approach to device on-boarding should be offered. Business managers will want
to get a commitment from IT, defining what type of support users can expect when they call the help desk
or show up in the IT lab with a brand new iPhone S5 smartphone.
• User access privileges and restrictions. This is the true nexus between the business, IT, and security, so it
needs careful attention. The fundamental question to answer here is: Which mobile enterprise services do
users need and through which type of devices do they need to access them? These questions seem
straightforward but are often difficult to answer in practice because they really require a thorough review
of job descriptions and business processes. Some of these appraisals are easy—remote salespeople can be
more productive if they can access Salesforce using smartphones, while iPad access to health care records
makes sense for physicians visiting patients at hospitals. Others aren’t as clear cut: Should all or just some
employees have access to social networking sites? Are there social networking functions like gaming or
video upload that should be blocked in all cases? What about device type and network location—should
access decisions be based upon considerations like these? Where should corporate governance or
regulatory compliance concerns dictate mobile enterprise policies?
To work through this complex series of decisions, ESG recommends a matrix approach that aligns
organizational groups (or subgroups) with mobile enterprise activities in order to craft specific policies and
provide the IT security team with an enforcement template (see Table 1).
Table 1. Sample Matrix for Mobile Enterprise Policies
Organization Group/Role
Endpoint
Device
Location Activity Permit/Deny/Limit
Marketing
Marketing
Communications
PC, tablet,
smartphone
Corporate network Access Facebook
Permit access; block
gaming, video upload,
and content posting;
monitor activity
HR Recruiter
PC, tablet,
smartphone
Corporate network,
public network
Access LinkedIn
Permit access; block
posting; monitor
activity
Finance Accounting
PC, tablet,
smartphone
Corporate network,
public network
Access general
ledger
Permit on all devices
from corporate
network; monitor
activity; deny access
from public network
White Paper: A Business-Driven Approach to Mobile Enterprise Security 9
© 2012, Enterprise Strategy Group, Inc. All Rights Reserved.
Mobile enterprise policies should be thoroughly vetted by business and IT stakeholders before execution. Once
completed, employees should be required to read and sign off on the policy (along with their managers) before
submitting their devices to IT and gaining network access. After this step is completed, it is incumbent upon IT to
provide employees with the self-service tools they need for network access and policy enforcement henceforth.
Finally, it is important to recognize the sweeping impact mobile devices have on network access. Given their
mobility, laptops, tablets, and smartphone policy enforcement is subject to constant change. A legitimate network
session may be terminated suddenly when security tools detect the presence of unknown network protocols. A
CEO’s laptop that worked fine at the office may be blocked from network access due to a software vulnerability
alert that took place during her commute home. As a result of these dynamic conditions, it is crucial that business,
IT, and security leaders thoroughly assess the risks, craft policies to address these risks, and build the right controls
and metrics to gauge policy and controls effectiveness.
Mobile Enterprise Management, Network, and Security Infrastructure
Once again, many organizations approach mobile enterprise security in a piecemeal fashion by implementing
tactical controls arbitrarily in response to their most pressing issues. This leads to “islands of security” rather than
enterprise coverage.
ESG believes it is worthwhile to create a more strategic plan that encompasses the entire network and security
infrastructure. This strategy should include a comprehensive networking and security architecture designed
specifically for the mobile enterprise (see Figure 4).
Figure 4. Mobile Enterprise Architecture
Source: Enterprise Strategy Group, 2012.
Central command-and-control
•Policy management
•Configuration management
•Monitoring/reporting
Security Intelligence
•Situational awareness
•Threat management
•Log management
•Automated response
Access Controls
•By application
•By user, role, device and location
•Authentication
•Device inspection
•Wired/wireless
•Local and remote access
On-boarding and
Device management
•VPN
•Auto-provision access policies
•Remote device management
•Remote device security
•Remote wipe, backup, and restore
White Paper: A Business-Driven Approach to Mobile Enterprise Security 10
© 2012, Enterprise Strategy Group, Inc. All Rights Reserved.
This architecture includes:
• Central command and control. Network configuration and security controls must “report” to an
authoritative central command and control for all management functions. This includes policy
management, configuration management, and all reporting. The word “central” is somewhat relative here
as some organizations will want to delegate oversight to business units or departments. Of course, this
type of entrustment is fine but the architecture should support a management hierarchy where lines of
business have authority over their domains while “C-level” executives retain oversight over the entire
enterprise.
• End-to-end security controls. There are three goals here: 1) Layered defense, 2) Distributed policy
enforcement, and 3) Comprehensive visibility. As such, security controls must be present throughout the
enterprise: on endpoint devices, at the network access layer, in the network core, and even in the cloud.
These controls are far from static security signatures and filtering rules. Rather, they provide the muscle for
granular and flexible mobile device security enforcement like access policy, device configuration policy, and
application controls. Furthermore, enforcement controls should also take on the role of network sentry,
monitoring and reporting activities to central command and control in order to fine-tune risk management
strategies, detect security events, and respond to attacks as soon as possible to minimize damages.
• Automation. Mobile enterprise security must be designed to respond to real-time detection and
remediation. This means that central management and distributed controls must be instrumented for
security automation. When a new vulnerability is discovered, mobile enterprise security controls should be
able to assess which assets are vulnerable, monitor these systems for anomalous or suspicious behavior,
and create “virtual patching” enforcement rules as soon as possible. Furthermore, each component has
local and systemic responsibilities. Endpoint security software can protect mobile devices from a malware
attack and then communicate details of the attack to cloud resources to generate new rules to safeguard all
other devices. Application controls can open the network to social networking traffic but block suspicious
executables upon network ingress and then pass new rules to firewalls and IPSs. In this way, network
defenses are fine-tuned constantly to protect each individual user and all of IT.
In the mobile enterprise, historical organizational and technology boundaries between wired, wireless, and remote
network access disappear. This demands common management of wired and wireless network infrastructure and
wide-ranging security integration. This will not only require a mobile enterprise-friendly campus network but also
new network and security skills within the IT organization.
Mobile Enterprise Security Monitoring
As the old business saying goes, “you can’t manage what you can’t measure.” Since the mobile enterprise is
relatively new and includes a multitude of technology elements, it is essential that security policies and controls be
observed and reviewed constantly to assess their effectiveness. This will require a contextual view of all endpoint,
user, device, network and application activities. This seems logical but many monitoring tools are anchored in the
technology realm of IP addresses, MAC addresses, and network protocols. By taking this information to a more
user-friendly level, mobile enterprise monitoring can help in a multitude of ways. Security analysts can isolate
suspicious traffic to specific users and initiate investigations, looking for behavioral patterns that may indicate a
malicious insider attack. Network managers can study traffic patterns of individual groups to improve performance
and SLAs. Business managers can review employee mobile device use to improve business processes.
Mobile enterprise monitoring is anchored by information collection and sharing amongst all security enforcement
points as well as tight integration with SIEM systems. Armed with a contextual view, SIEM can provide added value
for analyzing behavior by user, location, device-type, application, or traffic patterns.
The Juniper Networks Mobile Enterprise Strategy
Mobile enterprises demand network and security designed for scale, resilience, intelligence, integration, and
enterprise-wide coverage. Juniper Networks is one of the few vendors with the combination of experience,
White Paper: A Business-Driven Approach to Mobile Enterprise Security 11
© 2012, Enterprise Strategy Group, Inc. All Rights Reserved.
architecture, and products to address these new requirements. Best known for high-performance in the network
core, Juniper has introduced networking and security products, acquired new technologies, and gained tremendous
enterprise experience over the past few years. Juniper can now combine these individual products to form a
comprehensive mobile enterprise architecture that includes:
• Scalable and resilient wireless LAN and wired network. Juniper Networks offer a wireless LAN (WLAN)
solution that can profile the device types and apply device-type-aware policy. The wireless LAN solution is
designed for resilience and scale to meet the mission-critical needs of a growing mobile enterprise.
The Juniper EX Series switching product family addresses the access, aggregation, and core layer switching
requirements of micro branch, branch office, campus, and data center environments, providing a
foundation for the fast, secure, and reliable delivery of applications that support strategic business
processes in a mobile enterprise. The manageability and resiliency of the Juniper EX Virtual Chassis
technology, which allows multiple interconnected EX Series switches to operate as a single, logical device, is
an important element of a mobile enterprise.
• Simplified user on-boarding. One of the fundamental challenges of a mobile enterprise is the ability for IT
to scale, by letting users self provision and on-board their mobile devices to the wireless network. Juniper’s
SmartPass Guest management application and Junos Pulse solution, including secure remote access and on-
device mobile security, enable user self provisioning on to guest and secure networks.
• Mobile device management and security. When Juniper Networks acquired mobile device security and
management vendor SMobile in 2009, it greatly expanded its footprint in the mobile enterprise. Juniper
now combines this endpoint security, mobile device management software with a VPN and wireless config
provisioning client, as part of its Junos Pulse solution for secure connectivity, network acceleration, and on-
device mobile security and management.
• An integrated network access control layer. Juniper offers a number of other technologies to enforce
granular network access policies for the LAN. For example, Juniper’s Junos Pulse Access Control Service on
MAG Series solutions or the IC Series Unified Access Control (UAC) appliance can authenticate wired and
wireless devices using standard technologies like RADIUS, 802.1X, or MACauth. By integrating with Active
Directory or other LDAP repositories, UAC can also push role-based ACLs to wireless LAN controller, EX
Series Ethernet switches and SRX Series firewalls to enforce access policies for mobile devices and users
whether they reside on campus or connect through public networks via VPN. Juniper’s Junos Pulse Secure
Access and Access Control services also support single sign-on based on SAML, further extending the access
security to the cloud for the Mobile Enterprise. Finally, Juniper SRX Series secure services gateways offers
application controls to block or limit access to social networking sites like Facebook or online services like
Dropbox.
• Central management. Juniper mobile enterprise command-and-control comes together through its JUNOS
Space and Ringmaster network management platforms. This is where business, IT, and security teams can
create and deploy global network and security policies for enforcement across the enterprise.
• Security intelligence. In a Juniper-based network, security monitoring and reporting takes place in its
Security Threat Response Manager (STRM) product. STRM collects log and flow data for network security
and provides more granular knowledge of user/device identity and applications. STRM is designed to
detect suspicious behavior and security incidents and is integrated with other Juniper products like the SRX
Series and IDP for automated security remediation.
Juniper has also embraced the Interface for Metadata Access Points (IF-MAP) standard from the Trusted Computing
Group (TCG). IF-MAP servers act as a database repository for security information and objects. While somewhat
esoteric, ESG believes IF-MAP can be extremely helpful for providing granular data objects that can enhance
security monitoring, analysis, and forensic investigations for mobile enterprises. Juniper’s implementation of IF-
MAP for wireless LAN users helps tie the mobile device user policy with unified policy enforcement from Junos
Pulse Access Control/UAC service.
White Paper: A Business-Driven Approach to Mobile Enterprise Security 12
© 2012, Enterprise Strategy Group, Inc. All Rights Reserved.
Finally, the Juniper mobile enterprise architecture can be deployed as a layered solution over time. For example,
large organizations can start with Junos Pulse for mobile device security, UAC for network access policy
enforcement, and wireless LAN, switching, or SRX Series for policy enforcement. This can help enterprises protect
their existing investments as they transform static campus networks into a mobile enterprise architecture.
The Bigger Truth
It’s time that business managers, CIOs, and CISOs move beyond hyperbolic terminology like mobility, social
networking, and BYOD to truly understand how these consumer technologies impact their businesses. There is
little doubt that this will happen in most cases. Smart companies will get ahead of these technologies to assess
where they create opportunities and where they increase risk.
It is important to start with a thorough assessment of business goals. In other words, what are the objectives for
providing users (i.e., employees, contractors, business partners, etc.) with mobile enterprise technologies like
mobile devices and cloud-based services and how will success be measured? By performing this analysis up front,
managers can then transpose business enablement into granular policies for network access, application controls,
and security protection.
For IT professionals, the mobile enterprise is the next step in a progression that started years ago with the
introduction of laptop PCs, enterprise wireless access points (APs), and mobile storage devices. There are
important distinctions however. The growing use of consumer technologies and cloud-based services makes
mobile enterprise policy management and enforcement more granular and complex— few organizations are simply
willing to ban the use of iPads or block all employees from Facebook. As soon as these technologies are accepted,
decisions on who can use which technology at what time and for what purpose become more difficult to create and
enforce.
Ultimately, large organizations need to think of the mobile enterprise as a new model and act accordingly. This is
already happening in some industries. For example, hospitals use wireless technology and RFID tags to locate
mobile equipment and roaming physicians while private health care practices are eschewing in-house servers and
applications for cloud-based alternatives. At a high-level, mobile enterprise guidelines are fairly simple: create and
enforce policies to enable productive behavior and minimize risk. At the same time, constantly monitor activities to
measure success. Finally, use technology to automate fixes when possible.
While some vendors will take time to adjust to mobile enterprise requirements, Juniper Networks has already
developed a comprehensive architecture that enables automated granular policy creation and enforcement
spanning from mobile wired/wireless endpoints to the network core. As such, large organizations would be well
served to evaluate Juniper Networks as they develop mobile enterprise strategies.
20 Asylum Street | Milford, MA 01757 | Tel: 508.482.0188 Fax: 508.482.0218 | www.enterprisestrategygroup.com

More Related Content

What's hot

5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take offTom Mellish
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersEric Wong
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...IJERA Editor
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD HandbookBarcoding, Inc.
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT SolutionsDMIMarketing
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter WorkplaceChris Pepin
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
Webinar: Internal Communications: Inspiring Employee Engagement
Webinar: Internal Communications: Inspiring Employee EngagementWebinar: Internal Communications: Inspiring Employee Engagement
Webinar: Internal Communications: Inspiring Employee EngagementCoreDigitalWorks
 
Right size enterprise disaster recovery plans
Right size enterprise disaster recovery plansRight size enterprise disaster recovery plans
Right size enterprise disaster recovery plansInfo-Tech Research Group
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
BYOD: A Global Perspective
BYOD: A Global PerspectiveBYOD: A Global Perspective
BYOD: A Global PerspectiveJoseph M Bradley
 

What's hot (20)

Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile Workers
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
 
Enterprise 2.0 General
Enterprise 2.0 GeneralEnterprise 2.0 General
Enterprise 2.0 General
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT Solutions
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Set the style
Set the styleSet the style
Set the style
 
Overcome barriers to good req mgmt
Overcome barriers to good req mgmtOvercome barriers to good req mgmt
Overcome barriers to good req mgmt
 
Webinar: Internal Communications: Inspiring Employee Engagement
Webinar: Internal Communications: Inspiring Employee EngagementWebinar: Internal Communications: Inspiring Employee Engagement
Webinar: Internal Communications: Inspiring Employee Engagement
 
Right size enterprise disaster recovery plans
Right size enterprise disaster recovery plansRight size enterprise disaster recovery plans
Right size enterprise disaster recovery plans
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
BYOD: A Global Perspective
BYOD: A Global PerspectiveBYOD: A Global Perspective
BYOD: A Global Perspective
 

Viewers also liked

Top 10 Criteria for Choosing an ECM System
Top 10 Criteria for Choosing an ECM SystemTop 10 Criteria for Choosing an ECM System
Top 10 Criteria for Choosing an ECM SystemSilviu Stanculet
 
weekend news
weekend newsweekend news
weekend newsneha
 
ProcureCon 2010 Brochure-Managing A Volatile Market Recovery - Manufacturing ...
ProcureCon 2010 Brochure-Managing A Volatile Market Recovery - Manufacturing ...ProcureCon 2010 Brochure-Managing A Volatile Market Recovery - Manufacturing ...
ProcureCon 2010 Brochure-Managing A Volatile Market Recovery - Manufacturing ...Amanda Aslan
 
The importance and the need for drug addiction treatment in Québec
The importance and the need for drug addiction treatment in QuébecThe importance and the need for drug addiction treatment in Québec
The importance and the need for drug addiction treatment in QuébecPortage
 
How do you monitor your Basel III compliance?
How do you monitor your Basel III compliance? How do you monitor your Basel III compliance?
How do you monitor your Basel III compliance? Pactera_US
 

Viewers also liked (6)

Top 10 Criteria for Choosing an ECM System
Top 10 Criteria for Choosing an ECM SystemTop 10 Criteria for Choosing an ECM System
Top 10 Criteria for Choosing an ECM System
 
weekend news
weekend newsweekend news
weekend news
 
ProcureCon 2010 Brochure-Managing A Volatile Market Recovery - Manufacturing ...
ProcureCon 2010 Brochure-Managing A Volatile Market Recovery - Manufacturing ...ProcureCon 2010 Brochure-Managing A Volatile Market Recovery - Manufacturing ...
ProcureCon 2010 Brochure-Managing A Volatile Market Recovery - Manufacturing ...
 
The importance and the need for drug addiction treatment in Québec
The importance and the need for drug addiction treatment in QuébecThe importance and the need for drug addiction treatment in Québec
The importance and the need for drug addiction treatment in Québec
 
CIO Logistics Provider Profile
CIO Logistics Provider ProfileCIO Logistics Provider Profile
CIO Logistics Provider Profile
 
How do you monitor your Basel III compliance?
How do you monitor your Basel III compliance? How do you monitor your Basel III compliance?
How do you monitor your Basel III compliance?
 

Similar to A Business-Driven Approach to Mobile Enterprise Security

Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"NEORIS
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxsreevidyaopenteq
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityJuniper Networks
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...Altimeter, a Prophet Company
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...EMC
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e bookPablo Junco
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programsIBM Software India
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013 Regalix
 

Similar to A Business-Driven Approach to Mobile Enterprise Security (20)

Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
Enterprise mobility
Enterprise mobilityEnterprise mobility
Enterprise mobility
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013
 
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
 

More from Транслируем.бел

Руководство по видео, трансляциям и премьерам (Youtube 2020)
Руководство по видео, трансляциям и премьерам (Youtube 2020)Руководство по видео, трансляциям и премьерам (Youtube 2020)
Руководство по видео, трансляциям и премьерам (Youtube 2020)Транслируем.бел
 
Корпоративный новый год онлайн
Корпоративный новый год онлайнКорпоративный новый год онлайн
Корпоративный новый год онлайнТранслируем.бел
 
Руководство для малого и среднего бизнеса по использованию цифровых решений
Руководство для малого и среднего бизнеса по использованию цифровых решенийРуководство для малого и среднего бизнеса по использованию цифровых решений
Руководство для малого и среднего бизнеса по использованию цифровых решенийТранслируем.бел
 
Онлайн-трансляции в соцсетях
Онлайн-трансляции в соцсетяхОнлайн-трансляции в соцсетях
Онлайн-трансляции в соцсетяхТранслируем.бел
 
Как организовать трансляцию в Facebook
Как организовать трансляцию в FacebookКак организовать трансляцию в Facebook
Как организовать трансляцию в FacebookТранслируем.бел
 
Что сделать, чтобы сто раз все не переделывать
Что сделать, чтобы сто раз все не переделыватьЧто сделать, чтобы сто раз все не переделывать
Что сделать, чтобы сто раз все не переделыватьТранслируем.бел
 
Когда сказать нет. Арсений Кравченко
Когда сказать нет. Арсений КравченкоКогда сказать нет. Арсений Кравченко
Когда сказать нет. Арсений КравченкоТранслируем.бел
 
SMM учебник. Как продвигать банк в социальных сетях. Наглядное пособие
SMM учебник. Как продвигать банк в социальных сетях. Наглядное пособиеSMM учебник. Как продвигать банк в социальных сетях. Наглядное пособие
SMM учебник. Как продвигать банк в социальных сетях. Наглядное пособиеТранслируем.бел
 
методы монетизации интернет проектов
методы монетизации интернет проектовметоды монетизации интернет проектов
методы монетизации интернет проектовТранслируем.бел
 

More from Транслируем.бел (20)

Медицинские трансляции
Медицинские трансляцииМедицинские трансляции
Медицинские трансляции
 
Vinteo
VinteoVinteo
Vinteo
 
Руководство по видео, трансляциям и премьерам (Youtube 2020)
Руководство по видео, трансляциям и премьерам (Youtube 2020)Руководство по видео, трансляциям и премьерам (Youtube 2020)
Руководство по видео, трансляциям и премьерам (Youtube 2020)
 
Корпоративный новый год онлайн
Корпоративный новый год онлайнКорпоративный новый год онлайн
Корпоративный новый год онлайн
 
Unofficial guide to vmix by streamgeeks
Unofficial guide to vmix by streamgeeksUnofficial guide to vmix by streamgeeks
Unofficial guide to vmix by streamgeeks
 
Руководство для малого и среднего бизнеса по использованию цифровых решений
Руководство для малого и среднего бизнеса по использованию цифровых решенийРуководство для малого и среднего бизнеса по использованию цифровых решений
Руководство для малого и среднего бизнеса по использованию цифровых решений
 
Sennheiser ew100 g2
Sennheiser ew100 g2Sennheiser ew100 g2
Sennheiser ew100 g2
 
Sony mcs 8m
Sony mcs 8mSony mcs 8m
Sony mcs 8m
 
Сравнение поколений Y и Z
Сравнение поколений Y и ZСравнение поколений Y и Z
Сравнение поколений Y и Z
 
Онлайн-трансляции в соцсетях
Онлайн-трансляции в соцсетяхОнлайн-трансляции в соцсетях
Онлайн-трансляции в соцсетях
 
Как организовать трансляцию в Facebook
Как организовать трансляцию в FacebookКак организовать трансляцию в Facebook
Как организовать трансляцию в Facebook
 
The ultimate guide to facebook live for your event
The ultimate guide to facebook live for your eventThe ultimate guide to facebook live for your event
The ultimate guide to facebook live for your event
 
Guide to facebook live
Guide to facebook liveGuide to facebook live
Guide to facebook live
 
Comdi player
Comdi playerComdi player
Comdi player
 
Что сделать, чтобы сто раз все не переделывать
Что сделать, чтобы сто раз все не переделыватьЧто сделать, чтобы сто раз все не переделывать
Что сделать, чтобы сто раз все не переделывать
 
Когда сказать нет. Арсений Кравченко
Когда сказать нет. Арсений КравченкоКогда сказать нет. Арсений Кравченко
Когда сказать нет. Арсений Кравченко
 
Marketing Essentials for Startup Teams
Marketing Essentials for Startup TeamsMarketing Essentials for Startup Teams
Marketing Essentials for Startup Teams
 
SMM учебник. Как продвигать банк в социальных сетях. Наглядное пособие
SMM учебник. Как продвигать банк в социальных сетях. Наглядное пособиеSMM учебник. Как продвигать банк в социальных сетях. Наглядное пособие
SMM учебник. Как продвигать банк в социальных сетях. Наглядное пособие
 
методы монетизации интернет проектов
методы монетизации интернет проектовметоды монетизации интернет проектов
методы монетизации интернет проектов
 
Belarus internet users discovery
Belarus internet users discoveryBelarus internet users discovery
Belarus internet users discovery
 

Recently uploaded

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 

Recently uploaded (20)

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 

A Business-Driven Approach to Mobile Enterprise Security

  • 1. White Paper A Business-Driven Approach to Mobile Enterprise Security By Jon Oltsik, Senior Principal Analyst May 2012 This ESG White Paper was commissioned by Juniper Networks and is distributed under license from ESG. © 2012, Enterprise Strategy Group, Inc. All Rights Reserved
  • 2. White Paper: A Business-Driven Approach to Mobile Enterprise Security 2 © 2012, Enterprise Strategy Group, Inc. All Rights Reserved. Contents Executive Summary ......................................................................................................................................3 Just What Is The Mobile Enterprise?............................................................................................................3 Mobile Enterprise Momentum Is Driven by Business Needs................................................................................... 5 The Mobile Enterprise Presents Numerous IT Security Challenges.............................................................5 A Business-Driven Approach to Mobile Enterprise Security ........................................................................6 Mobile Enterprise Policy Creation............................................................................................................................ 7 Mobile Enterprise Management, Network, and Security Infrastructure................................................................. 9 Mobile Enterprise Security Monitoring..................................................................................................................10 The Juniper Networks Mobile Enterprise Strategy ....................................................................................10 The Bigger Truth .........................................................................................................................................12 All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of the Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at 508.482.0188.
  • 3. White Paper: A Business-Driven Approach to Mobile Enterprise Security 3 © 2012, Enterprise Strategy Group, Inc. All Rights Reserved. Executive Summary IT consumerization and the massive influx of mobile devices is affecting many large organizations. CEOs want immediate network access on Monday after buying the latest iPad version over the weekend. Young employees think nothing of using work PCs for updating their Facebook status or using Dropbox to move documents to their home computers. Sales managers are demanding that the global sales force be provided with access to cloud- based CRM applications on their smart phones so they can access and update records from the road. How should enterprises handle IT consumerization? While some Chief Information Security Officers (CISOs) would prefer to simply prohibit and block these activities, industry research indicates that only about one-third of organizations take this type of extreme position. Why? Because mobile devices and cloud services may lead to new types of business process productivity gains and even revenue opportunities. Before organizations implement Bring Your Own Device (BYOD) policies or let employees access social networking sites from the corporate network, however, they must prepare the business and IT infrastructure to support these decisions, enable operational benefits, and address added risk. This white paper concludes: • The mobile enterprise is a cooperative venture. Few companies have the right oversight or security controls in place to handle a multitude of new security policies and enforcement rules for the mobile enterprise. Business, IT, and security managers must think in granular terms: Who needs access to cloud- based applications and services and how to integrate that with single sign-on enablement? Which users in which roles should be allowed to use mobile devices to access the network and which applications should they be allowed to access? What should and shouldn’t these users be allowed to do? What device types and OS versions should be allowed? How will managers measure mobile enterprise activities to gauge their success? Should a security policy do double duty, by not only customizing access to the user’s role, location, and type of device….but also adjusting policy dynamically when needed, to isolate users under attack and prevent the attack from spreading? To get ahead of the mobile enterprise, smart business, IT, and security managers will take the time to answer these questions. • Existing security controls are no match for mobile enterprise demands. Answers to the questions posed above turn into security policies and these policies need to be monitored and enforced. Unfortunately, today’s assortment of tactical security tools and network access controls aren’t designed for mobile enterprise security requirements like central policy management, coordinated distributed enforcement, or end-to-end monitoring. • Large organizations need a tailored mobile enterprise strategy. The mobile enterprise changes a number of requirements for campus networks, including network access controls, security controls, and monitoring/reporting. What’s needed here is a new type of integrated network/security architecture built specifically for central command-and-control, distributed security enforcement, comprehensive monitoring capabilities, and real-time automation to support critical business processes or block attacks in progress. Businesses need to consider the scale and resiliency of the network as a core requirement, since the mobile enterprise is moving to enable business-critical functions on mobile devices. Just What Is The Mobile Enterprise? In ancient times (i.e., 10 to 15 years ago), corporate IT was tightly controlled. User devices were typically limited to Windows PCs. Business applications were controlled by IT and either run locally on endpoints or on physical servers in data centers. Network security was based upon clearly defined perimeters that separated trusted internal networks from the untrusted Internet. Fast forward to today and you’ll see massive changes in each of these assumptions. Now, corporate networks must accommodate:
  • 4. White Paper: A Business-Driven Approach to Mobile Enterprise Security 4 © 2012, Enterprise Strategy Group, Inc. All Rights Reserved. • A growing array of new devices. According to ESG research, 55% of enterprise organizations are experiencing significant growth in employee use of alternative endpoint computing devices like Apple Macintosh PCs, tablet PCs, and smartphones (see Figure 1)1 . In many cases, employees are allowed to use a combination of endpoint devices as part of their day-to-day activities. Figure 1. Organizations are Experiencing Growing Use of Alternative Endpoint Devices Source: Enterprise Strategy Group, 2012. • Cloud-based applications. Applications no longer run solely on physical servers in corporate data centers. Quite the opposite, applications can run anywhere—on traditional physical servers, mobile virtual servers, or in the cloud as Infrastructure as a Service (IAAS), Platform as a Service (PaaS), or Software as a Service (SaaS). As if this wasn’t enough, end-users can now take advantage of a wide variety of cloud-based applications and IT services for personal and professional use. Facebook can be used for an employee’s personal profiles or as a component of a corporate marketing campaign. Employees depend upon Skype to speak with friends abroad or for legitimate business video conferencing. Dropbox can be used to distribute documents between corporate and personal devices for mobility and user productivity. • De-perimeterization. Given new device proliferation, application mobility, and cloud-based consumer and corporate services, the notion of a static network perimeter is all but gone. Now there are a multitude of network perimeters around devices, applications, users, and data. These perimeters have also become quite dynamic as they must adapt to various environmental conditions such as user role, device type, server virtualization mobility, network location, and time-of-day. All of these factors have transformed traditional enterprise IT into a new model called the mobile enterprise. To be clear, however, the ramifications associated with mobile enterprises aren’t limited to internal issues like BYOD, iPads, and cloud computing for employees. Rather, the mobile enterprise must also address external business 1 Source: ESG Research Brief, Corporate Endpoint Device Type Trends, May 2011. We are experiencing significant growth in our employees’ use of alternative endpoint computing devices, 55% We are experiencing moderate growth in our employees’ use of alternative endpoint computing devices, 29% We are experiencing some growth in our employees’ use of alternative endpoint computing devices, 12% We are experiencing little or no growth in our employees’ use of alternative endpoint computing devices, 5% Which of the following statements best describes the changes your organization is experiencing with respect to alternative endpoint computing devices? (Percent of respondents, N=221)
  • 5. White Paper: A Business-Driven Approach to Mobile Enterprise Security 5 © 2012, Enterprise Strategy Group, Inc. All Rights Reserved. realities like providing guests, third-party contractors, and business partners network access using various devices from a multitude of locations. To accomplish this, the mobile enterprise must be flexible, adaptable, resilient, scalable, and always on. Mobile Enterprise Momentum Is Driven by Business Needs The mobile enterprise transition has another unique aspect. In the past, business managers were fairly impartial to IT technology and infrastructure decisions but this is no longer the case. Forward-thinking technology executives were at the forefront of pushing IT to provide network access for iPhones when they first appeared in 2007. The same thing happened with the iPad introduction in 2010. CEOs are not alone. HR managers champion mobile device support to CIOs as a means to recruit techno-savvy employees. Sales executives want to provide CRM access to the sales team from any location and any device. This business-centric push is on the rise. According to Datamation, iPads had penetrated 50% of Fortune 100 companies within 90 days of its first release. Previously conducted ESG research indicates that, far from technology toys, most organizations consider mobile devices either critical or very important for their business processes and overall productivity (see Figure 2)2 . Figure 2. Mobile Devices are Considered Critical or Important for Business Processes and Productivity Source: Enterprise Strategy Group, 2012. The Mobile Enterprise Presents Numerous IT Security Challenges Given the business value of greater connectivity, productivity, and application flexibility, the mobile enterprise has become an unstoppable force. Unfortunately however, the existing IT infrastructure was designed and built for a more genteel style of business computing. This is leading to a growing gap between mobile enterprise requirements and corporate IT capabilities as a whole but the discontinuity is most acute with regard to IT security. Mobile enterprises present unique security challenges because: 2 Source: ESG Research Brief, Mobile Device Security: It’s All About the Data, April 2010. Critical, 38% Important, 48% Somewhat important, 11% Not important today but will become more important in the future, 1% Not important today nor in the future, 1% Don’t know, 1% How important would you say the use of mobile devices by employees is to your organization’s business processes and productivity? (Percent of respondents, N=174)
  • 6. White Paper: A Business-Driven Approach to Mobile Enterprise Security 6 © 2012, Enterprise Strategy Group, Inc. All Rights Reserved. • Mobile device security is a work-in-progress. Large organizations have been battling endpoint security issues for years—antivirus signature distribution, vulnerability scanning, patch management, etc. As bad as this situation is already, mobile device security makes current PC protection seem like child’s play. Why? These devices come in many flavors so IT and security teams must learn the platform, software, and security idiosyncrasies of multiple systems. Consumer-focused mobile device applications are notoriously insecure and known to perform blatant security policy violations like harvesting user contacts for vendor marketing campaigns. Mobile devices are often lost or stolen, in some cases while containing sensitive or regulated data. Finally, mobile device malware is on the rise, especially for the open source Android operating system. Enterprises are quickly learning that managing and securing these devices is bound to test their existing IT capabilities. • Network access isn’t black and white. Obviously, mobile devices are portable which means they can access the network from any WiFi access point or insecure Internet hotspot. Yes, this may bolster convenience and productivity but it can also violate corporate governance or regulatory compliance policies. Security best practices suggest a granular approach, where mobile device network access policies are enforced according to who wants access, the type of device they are using, where they are located, and what they want to do. In other words, network access privileges for mobile devices are based on a set of decision criteria. This type of access control structure should be consistent and able to support, for instance, employees with mobile devices or contractors using PCs from the corporate network. While granular and contextual access controls can support business and security requirements, many existing network and security point tools lack the integration or network coverage to provide this type of tailored security policy enforcement across the enterprise. • Web-based applications open new threat vectors. As described above, business applications have also become highly mobile with the proliferation of cloud-based applications. Combined with laptops, tablets, and smartphones, however, cloud-based applications represent a potentially toxic security mix. New endpoint applications can open easily exploitable system vulnerabilities. Social networking sites like Facebook can act as malware distribution vectors. Online file sharing programs like Dropbox could easily become vehicles for accidental or malicious data leakage. Since most organizations are unwilling to block all cloud-based application traffic, CISOs are forced to try to monitor and manage cloud-based application activities without alienating employees or violating corporate security policies. Given the limitations of existing network and security controls, this is extremely difficult to do. • Security credential provisioning. Mobile devices are notoriously hard to handle with regard to the credential provisioning to truly enable secure connections on the wireless network. Some verticals such as education and hospitality prefer a non-intrusive clientless approach to credential provisioning while the enterprise lends itself to a managed security provisioning approach. These challenges are not trivial IT details as they represent a potential increase in risk to the business. Mobile enterprise benefits must be aligned with proper management and security or it is fairly easy to lose visibility and control of valuable IT assets and sensitive data. Lacking the right network infrastructure and security controls, CIOs and CISOs face a losing battle here. A Business-Driven Approach to Mobile Enterprise Security Large organizations must make policy changes and security technology investments to adequately manage and monitor new risks posed by the mobile enterprise. That said, ESG sees too many firms addressing mobile enterprise security issues haphazardly by implementing standalone security policies, investing in tactical security controls, or relying on incomplete monitoring. This may be reactionary. CISOs feel like they need to do something, but incomplete measures provide marginal results, leaving organizations exposed. ESG recommends a more strategic, comprehensive, and business-driven approach to mobile enterprise security composed of three related activities:
  • 7. White Paper: A Business-Driven Approach to Mobile Enterprise Security 7 © 2012, Enterprise Strategy Group, Inc. All Rights Reserved. 1. Create mobile enterprise security policies as a collaborative effort between business and IT. 2. Build the right network, security, and management infrastructure for the mobile enterprise policy support and enforcement. 3. Monitor and measure mobile enterprise security for IT audits, policy and controls effectiveness, and constant improvement These three processes complement each other, creating a mobile enterprise security lifecycle that can be modified as business, IT, and security requirements change (see Figure 3). Figure 3. Cooperative Cycle for Mobile Enterprise Policy Creation, Management, and Security Source: Enterprise Strategy Group, 2012. Mobile Enterprise Policy Creation ESG sees several common mistakes with current policy implementations in the marketplace. First, security managers often create policies without input from their business peers. This tends to lead to guidelines that are either overly liberal, adding risk, or excessively draconian, which disaffects users. It is imperative for organizations to bridge this gap by crafting mobile enterprise security policies as a collaborative effort between business, IT, and security. Business managers should come prepared with a list of objectives in terms of desired user behavior and success metrics while IT and security executives should be equipped to point out risks and any technical limitations. Both groups should also fully understand and adhere to the organization’s governance statutes and compliance obligations.
  • 8. White Paper: A Business-Driven Approach to Mobile Enterprise Security 8 © 2012, Enterprise Strategy Group, Inc. All Rights Reserved. Detail-orientation is very important with regard to all security policies, so it behooves business and IT executives to do their homework and craft mobile enterprise policies that include: • Device and configuration support. BYOD cannot become an “open door” to any device from any user. Business managers should be ready to make a case for popular consumer devices like Macintosh PCs, iPhones/iPads, and Androids, and clearly propose why supporting these devices could benefit the business. Some firms may also need support for Blackberries and Windows Mobile, but since support equates to investment, each device type must have a clear and measurable business justification. Once devices are selected, it is important to define what “support” means. As part of security best practices, IT managers should be able to inspect each device before allowing network access. IT will want to establish configuration guidelines for operating systems and applications. For example, “rooted” or “jail- broken” devices are not permitted on the network, and mobile devices cannot store corporate contacts on local storage. As part of configuration management, IT should ensure that all devices are PIN protected with a 4-digit password as a minimum standard and those passwords are changed at least 4 times per year. IT will also likely want to install management and/or security software such as digital certificates, VPN clients, anti-malware protection, and remote wiping capabilities on each device in case they are lost or stolen. In verticals that don’t lend themselves to installing IT-managed software on the mobile device, a clientless self provisioning approach to device on-boarding should be offered. Business managers will want to get a commitment from IT, defining what type of support users can expect when they call the help desk or show up in the IT lab with a brand new iPhone S5 smartphone. • User access privileges and restrictions. This is the true nexus between the business, IT, and security, so it needs careful attention. The fundamental question to answer here is: Which mobile enterprise services do users need and through which type of devices do they need to access them? These questions seem straightforward but are often difficult to answer in practice because they really require a thorough review of job descriptions and business processes. Some of these appraisals are easy—remote salespeople can be more productive if they can access Salesforce using smartphones, while iPad access to health care records makes sense for physicians visiting patients at hospitals. Others aren’t as clear cut: Should all or just some employees have access to social networking sites? Are there social networking functions like gaming or video upload that should be blocked in all cases? What about device type and network location—should access decisions be based upon considerations like these? Where should corporate governance or regulatory compliance concerns dictate mobile enterprise policies? To work through this complex series of decisions, ESG recommends a matrix approach that aligns organizational groups (or subgroups) with mobile enterprise activities in order to craft specific policies and provide the IT security team with an enforcement template (see Table 1). Table 1. Sample Matrix for Mobile Enterprise Policies Organization Group/Role Endpoint Device Location Activity Permit/Deny/Limit Marketing Marketing Communications PC, tablet, smartphone Corporate network Access Facebook Permit access; block gaming, video upload, and content posting; monitor activity HR Recruiter PC, tablet, smartphone Corporate network, public network Access LinkedIn Permit access; block posting; monitor activity Finance Accounting PC, tablet, smartphone Corporate network, public network Access general ledger Permit on all devices from corporate network; monitor activity; deny access from public network
  • 9. White Paper: A Business-Driven Approach to Mobile Enterprise Security 9 © 2012, Enterprise Strategy Group, Inc. All Rights Reserved. Mobile enterprise policies should be thoroughly vetted by business and IT stakeholders before execution. Once completed, employees should be required to read and sign off on the policy (along with their managers) before submitting their devices to IT and gaining network access. After this step is completed, it is incumbent upon IT to provide employees with the self-service tools they need for network access and policy enforcement henceforth. Finally, it is important to recognize the sweeping impact mobile devices have on network access. Given their mobility, laptops, tablets, and smartphone policy enforcement is subject to constant change. A legitimate network session may be terminated suddenly when security tools detect the presence of unknown network protocols. A CEO’s laptop that worked fine at the office may be blocked from network access due to a software vulnerability alert that took place during her commute home. As a result of these dynamic conditions, it is crucial that business, IT, and security leaders thoroughly assess the risks, craft policies to address these risks, and build the right controls and metrics to gauge policy and controls effectiveness. Mobile Enterprise Management, Network, and Security Infrastructure Once again, many organizations approach mobile enterprise security in a piecemeal fashion by implementing tactical controls arbitrarily in response to their most pressing issues. This leads to “islands of security” rather than enterprise coverage. ESG believes it is worthwhile to create a more strategic plan that encompasses the entire network and security infrastructure. This strategy should include a comprehensive networking and security architecture designed specifically for the mobile enterprise (see Figure 4). Figure 4. Mobile Enterprise Architecture Source: Enterprise Strategy Group, 2012. Central command-and-control •Policy management •Configuration management •Monitoring/reporting Security Intelligence •Situational awareness •Threat management •Log management •Automated response Access Controls •By application •By user, role, device and location •Authentication •Device inspection •Wired/wireless •Local and remote access On-boarding and Device management •VPN •Auto-provision access policies •Remote device management •Remote device security •Remote wipe, backup, and restore
  • 10. White Paper: A Business-Driven Approach to Mobile Enterprise Security 10 © 2012, Enterprise Strategy Group, Inc. All Rights Reserved. This architecture includes: • Central command and control. Network configuration and security controls must “report” to an authoritative central command and control for all management functions. This includes policy management, configuration management, and all reporting. The word “central” is somewhat relative here as some organizations will want to delegate oversight to business units or departments. Of course, this type of entrustment is fine but the architecture should support a management hierarchy where lines of business have authority over their domains while “C-level” executives retain oversight over the entire enterprise. • End-to-end security controls. There are three goals here: 1) Layered defense, 2) Distributed policy enforcement, and 3) Comprehensive visibility. As such, security controls must be present throughout the enterprise: on endpoint devices, at the network access layer, in the network core, and even in the cloud. These controls are far from static security signatures and filtering rules. Rather, they provide the muscle for granular and flexible mobile device security enforcement like access policy, device configuration policy, and application controls. Furthermore, enforcement controls should also take on the role of network sentry, monitoring and reporting activities to central command and control in order to fine-tune risk management strategies, detect security events, and respond to attacks as soon as possible to minimize damages. • Automation. Mobile enterprise security must be designed to respond to real-time detection and remediation. This means that central management and distributed controls must be instrumented for security automation. When a new vulnerability is discovered, mobile enterprise security controls should be able to assess which assets are vulnerable, monitor these systems for anomalous or suspicious behavior, and create “virtual patching” enforcement rules as soon as possible. Furthermore, each component has local and systemic responsibilities. Endpoint security software can protect mobile devices from a malware attack and then communicate details of the attack to cloud resources to generate new rules to safeguard all other devices. Application controls can open the network to social networking traffic but block suspicious executables upon network ingress and then pass new rules to firewalls and IPSs. In this way, network defenses are fine-tuned constantly to protect each individual user and all of IT. In the mobile enterprise, historical organizational and technology boundaries between wired, wireless, and remote network access disappear. This demands common management of wired and wireless network infrastructure and wide-ranging security integration. This will not only require a mobile enterprise-friendly campus network but also new network and security skills within the IT organization. Mobile Enterprise Security Monitoring As the old business saying goes, “you can’t manage what you can’t measure.” Since the mobile enterprise is relatively new and includes a multitude of technology elements, it is essential that security policies and controls be observed and reviewed constantly to assess their effectiveness. This will require a contextual view of all endpoint, user, device, network and application activities. This seems logical but many monitoring tools are anchored in the technology realm of IP addresses, MAC addresses, and network protocols. By taking this information to a more user-friendly level, mobile enterprise monitoring can help in a multitude of ways. Security analysts can isolate suspicious traffic to specific users and initiate investigations, looking for behavioral patterns that may indicate a malicious insider attack. Network managers can study traffic patterns of individual groups to improve performance and SLAs. Business managers can review employee mobile device use to improve business processes. Mobile enterprise monitoring is anchored by information collection and sharing amongst all security enforcement points as well as tight integration with SIEM systems. Armed with a contextual view, SIEM can provide added value for analyzing behavior by user, location, device-type, application, or traffic patterns. The Juniper Networks Mobile Enterprise Strategy Mobile enterprises demand network and security designed for scale, resilience, intelligence, integration, and enterprise-wide coverage. Juniper Networks is one of the few vendors with the combination of experience,
  • 11. White Paper: A Business-Driven Approach to Mobile Enterprise Security 11 © 2012, Enterprise Strategy Group, Inc. All Rights Reserved. architecture, and products to address these new requirements. Best known for high-performance in the network core, Juniper has introduced networking and security products, acquired new technologies, and gained tremendous enterprise experience over the past few years. Juniper can now combine these individual products to form a comprehensive mobile enterprise architecture that includes: • Scalable and resilient wireless LAN and wired network. Juniper Networks offer a wireless LAN (WLAN) solution that can profile the device types and apply device-type-aware policy. The wireless LAN solution is designed for resilience and scale to meet the mission-critical needs of a growing mobile enterprise. The Juniper EX Series switching product family addresses the access, aggregation, and core layer switching requirements of micro branch, branch office, campus, and data center environments, providing a foundation for the fast, secure, and reliable delivery of applications that support strategic business processes in a mobile enterprise. The manageability and resiliency of the Juniper EX Virtual Chassis technology, which allows multiple interconnected EX Series switches to operate as a single, logical device, is an important element of a mobile enterprise. • Simplified user on-boarding. One of the fundamental challenges of a mobile enterprise is the ability for IT to scale, by letting users self provision and on-board their mobile devices to the wireless network. Juniper’s SmartPass Guest management application and Junos Pulse solution, including secure remote access and on- device mobile security, enable user self provisioning on to guest and secure networks. • Mobile device management and security. When Juniper Networks acquired mobile device security and management vendor SMobile in 2009, it greatly expanded its footprint in the mobile enterprise. Juniper now combines this endpoint security, mobile device management software with a VPN and wireless config provisioning client, as part of its Junos Pulse solution for secure connectivity, network acceleration, and on- device mobile security and management. • An integrated network access control layer. Juniper offers a number of other technologies to enforce granular network access policies for the LAN. For example, Juniper’s Junos Pulse Access Control Service on MAG Series solutions or the IC Series Unified Access Control (UAC) appliance can authenticate wired and wireless devices using standard technologies like RADIUS, 802.1X, or MACauth. By integrating with Active Directory or other LDAP repositories, UAC can also push role-based ACLs to wireless LAN controller, EX Series Ethernet switches and SRX Series firewalls to enforce access policies for mobile devices and users whether they reside on campus or connect through public networks via VPN. Juniper’s Junos Pulse Secure Access and Access Control services also support single sign-on based on SAML, further extending the access security to the cloud for the Mobile Enterprise. Finally, Juniper SRX Series secure services gateways offers application controls to block or limit access to social networking sites like Facebook or online services like Dropbox. • Central management. Juniper mobile enterprise command-and-control comes together through its JUNOS Space and Ringmaster network management platforms. This is where business, IT, and security teams can create and deploy global network and security policies for enforcement across the enterprise. • Security intelligence. In a Juniper-based network, security monitoring and reporting takes place in its Security Threat Response Manager (STRM) product. STRM collects log and flow data for network security and provides more granular knowledge of user/device identity and applications. STRM is designed to detect suspicious behavior and security incidents and is integrated with other Juniper products like the SRX Series and IDP for automated security remediation. Juniper has also embraced the Interface for Metadata Access Points (IF-MAP) standard from the Trusted Computing Group (TCG). IF-MAP servers act as a database repository for security information and objects. While somewhat esoteric, ESG believes IF-MAP can be extremely helpful for providing granular data objects that can enhance security monitoring, analysis, and forensic investigations for mobile enterprises. Juniper’s implementation of IF- MAP for wireless LAN users helps tie the mobile device user policy with unified policy enforcement from Junos Pulse Access Control/UAC service.
  • 12. White Paper: A Business-Driven Approach to Mobile Enterprise Security 12 © 2012, Enterprise Strategy Group, Inc. All Rights Reserved. Finally, the Juniper mobile enterprise architecture can be deployed as a layered solution over time. For example, large organizations can start with Junos Pulse for mobile device security, UAC for network access policy enforcement, and wireless LAN, switching, or SRX Series for policy enforcement. This can help enterprises protect their existing investments as they transform static campus networks into a mobile enterprise architecture. The Bigger Truth It’s time that business managers, CIOs, and CISOs move beyond hyperbolic terminology like mobility, social networking, and BYOD to truly understand how these consumer technologies impact their businesses. There is little doubt that this will happen in most cases. Smart companies will get ahead of these technologies to assess where they create opportunities and where they increase risk. It is important to start with a thorough assessment of business goals. In other words, what are the objectives for providing users (i.e., employees, contractors, business partners, etc.) with mobile enterprise technologies like mobile devices and cloud-based services and how will success be measured? By performing this analysis up front, managers can then transpose business enablement into granular policies for network access, application controls, and security protection. For IT professionals, the mobile enterprise is the next step in a progression that started years ago with the introduction of laptop PCs, enterprise wireless access points (APs), and mobile storage devices. There are important distinctions however. The growing use of consumer technologies and cloud-based services makes mobile enterprise policy management and enforcement more granular and complex— few organizations are simply willing to ban the use of iPads or block all employees from Facebook. As soon as these technologies are accepted, decisions on who can use which technology at what time and for what purpose become more difficult to create and enforce. Ultimately, large organizations need to think of the mobile enterprise as a new model and act accordingly. This is already happening in some industries. For example, hospitals use wireless technology and RFID tags to locate mobile equipment and roaming physicians while private health care practices are eschewing in-house servers and applications for cloud-based alternatives. At a high-level, mobile enterprise guidelines are fairly simple: create and enforce policies to enable productive behavior and minimize risk. At the same time, constantly monitor activities to measure success. Finally, use technology to automate fixes when possible. While some vendors will take time to adjust to mobile enterprise requirements, Juniper Networks has already developed a comprehensive architecture that enables automated granular policy creation and enforcement spanning from mobile wired/wireless endpoints to the network core. As such, large organizations would be well served to evaluate Juniper Networks as they develop mobile enterprise strategies.
  • 13. 20 Asylum Street | Milford, MA 01757 | Tel: 508.482.0188 Fax: 508.482.0218 | www.enterprisestrategygroup.com