SlideShare uma empresa Scribd logo
1 de 27
Leonard Raphael, 10th October 2013


BYOD Momentum



Identifying the Risks with BYOD



Security as the Main Challenge



BOYD Creates Management Challenges & Role
of Network Access Control



Mitigating Risk








BYOD Expertise
Know Every Device
Know Ever User
Reduce Help Desk
Minimise Risk
Ensure Compliance

3
Embrace
Contain

Block
Disregard

Visibility

Automation
Archiving is much more difficult

Data on personally owned devices is more difficult to archive because some of it is stored on
the mobile devices themselves, not necessarily on the backend servers that are operated by IT.
Monitoring content is more difficult

Monitoring content sent from and received by mobile devices is much more difficult than it is
from a conventional desktop infrastructure. This means that legal and regulatory violations are
easier to commit, which can lead to adverse legal judgments and regulatory sanctions.
Users are more autonomous

Mobile users tend to be more independent from IT’s control because they are outside of the
office and so IT cannot control how devices are used.
Compliance is more difficult

According to an Osterman Research survey, nearly two in five organisations find managing
policies for e-discovery or regulatory compliance to be difficult or very difficult, while 35% find
managing other types of policies to be this difficult. Managing mobile policies for issues like ediscovery and regulatory compliance is slightly more difficult than managing other types of
policies.
The environment is more diverse

The normal desktop infrastructure consists of mostly Windows machines and possibly some
Macs and maybe a few Linux machines. The typical BYOD environment, on the other hand, is
much more diverse, typically consisting of iPhones, Android smartphones, iPads, Windows
phones, BlackBerry devices, and other platforms. Further complicating the management of this
environment is that there are multiple versions of the operating systems in use, each of which
can provide users with slightly different capabilities.
Phishing
Email on
Device

Device
Compromised

Internal
Network
Scan

Data
Consolidation

Attack Surface is Multiplying With Every New Device

Data
Exfiltration
Configuration

Managed

Unmanaged

Devices

Consistent

Diverse

Applications

Corp Push

User Downloaded

Risk

Websites

Endpoint
Protection

Contained

Mature

Open

Emerging
Enable BYOD

60%

NAC is now one of the key
mechanisms for mitigating
the risks of consumerisation

Know The Devices

9%

(BYOD)

Gartner
Strategic Road Map for Network Access Control
Published: 11 October 2011 ID:G00219087
Have Access to Campus
Networks, Systems, and Data
Download/Store/Forward
Sensitive Information

9
Unauthorized Network
Access

Network Risk

Malicious Applications

Application Risk

Vulnerable Devices

Device Risk
Mobile Device Mgmt
Hosted Virtual Desktop
Network Access Control

11




Implementing the right Technologies
Implement the right Network Policy
Providing the right Resources to meet the
challenges.
Hybrid
Devices

Consumerization
BYOD

Guest
Device

Corp
Device

Guest
Networking

Endpoint
Compliance

Employee

Guest

Hybrid Users
BYOD RISK
MITIGATION

NETWORK
SENTRY

BYOD RISK
ASSESSMENT
WHO

WHAT

WHERE

WHEN

TRUSTED
LOCATIONS
TRUSTED
USERS

TRUSTED
TIME

TRUSTED
DEVICES
Students
University
Staffs
Guest Users

g

g

g

Desktop

iPad

a a a
a

h

a a

h

g
g

Smart
Phone

g

h

Laptop

g

Researchers

hh
hh
hh

Road

g

Devices
Branch Office

g

Telemarketer

IP

Academic
Staffs

PII

Profiles

Office

Locations

Guest Access

Information

a
a

a
16
SECURITY

MOBILITY

NETWORK
ACCESS
CONTROL

WIRED & WIRELESS

SECURE
BYOD

EDGE
VISIBILITY

GUEST
MANAGEMENT

NETWORK
SENTRY
NETWORK
ANALYTICS

EASY 802.1X
ONBOARDING

ENDPOINT
COMPLIANCE

WHEN

WHERE

REGULATORY
COMPLIANCE

WHAT

WHO
3.0

Consumerization
BYOD

All
Devices

2.0
Guest
Networking

Guest
Device

Cloud

1.0

Corp
Device

Endpoint
Compliance

Virtual Server

Appliance

Appliance

Employee

Guest

Virtual Server

Appliance

All Users
WHERE
LOCATION 1

Real-Time
Visibility

LOCATION 2

….

Single
Network Sentry
Appliance

LOCATION N

VPN

WHO

WHAT

WHEN
Assign
Network Access
Assess
Risk

Unrestricted
Access

Identify
Device

Identify
User

Restricted
Access
Guest
Access

No
Access
Single

Mgmt Appliance

Location HQ

Location 1

High Trust
Required VLAN

Med Trust
Required VLAN

Low Trust
Required VLAN

No Trust
Required VLAN

Faculty
Data

Students
Data

Guest
Access
Captive
Portal

Faculty
Registered Device
Compliance
Student
Registered Device
Compliance
Any User
Any Device
Not Jailbroken

Any User
Any Device
Single

Mgmt Appliance

Location 1

Remote Registration and Scanning
Location HQ

Welcome
To gain network access users are required to adhere to our established
registration policies. Please select one of the following options:

 Authorized Users

Delegated & Automated
User
Device
Compliance

Guest
Access
Captive
Portal

 Pre-Authorized Guest With An Account

 Device Registration
 Self-Service Guest Registration
In need of assistance, please call the Help Desk.
Enterprise Resources
Databases Apps
Email

Enterprise SSID
Full Access

Restricted Access

802.1x

Xirrus
Wireless AP/Array

MDM

Guest SSID
Internet Only

AAA
AD/LDAP
Open or PSK
XMS

Blocked Devices

Captive Portal
Classify User/Device/Location
Enforce Policies

Network Sentry

Internet

Mobility Device
Management

•
•
•
•

Visibility
Policy Manager
Automation / Control
Compliance
Security
Rules
Job
Scheduler

WHO
Analytics
Engine

Network Sentry
Data Warehouse

Report
Server

COMPLIANCE
INVENTORY

WHAT

WHERE

HTTPS

HTTPS

ANOMALIES
EXCEPTIONS

WHEN
Network Sentry
Appliance

Network
Sentry/Analytics
Partial
Visibility
Remediation

Active
Directory
Devices
And Users
AD Registered
Devices & Users
Palo Alto
Networks
Agent

Palo Alto
Networks
Firewall

100%
Devices & Users
Non-Active
Directory
Devices
and Users

100%
Visibility
Remediation

Guests, Contractors, Students

Mais conteúdo relacionado

Mais procurados

IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM SolutionsIPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
Lacoon Mobile Security
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
Vineet Dubey
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterprise
Abha Damani
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
I P Abir
 

Mais procurados (20)

5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM SolutionsIPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterprise
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
Non-profit Tech Needs in North Macedonia
Non-profit Tech Needs in North MacedoniaNon-profit Tech Needs in North Macedonia
Non-profit Tech Needs in North Macedonia
 
Risk Assessment Cybersecurity Project at Utica College
Risk Assessment Cybersecurity Project at Utica CollegeRisk Assessment Cybersecurity Project at Utica College
Risk Assessment Cybersecurity Project at Utica College
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
Enterprise Information Systems Security: A Case Study in the Banking Sector
Enterprise Information Systems Security: A Case Study in the Banking SectorEnterprise Information Systems Security: A Case Study in the Banking Sector
Enterprise Information Systems Security: A Case Study in the Banking Sector
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
Information Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLockInformation Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLock
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 

Semelhante a The challenges of BYOD for campus network by Leonard Raphael

CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
kostikjaylonshaewe47
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
ijmnct
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
IJERD Editor
 

Semelhante a The challenges of BYOD for campus network by Leonard Raphael (20)

Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 
Security attacks taxonomy on
Security attacks taxonomy onSecurity attacks taxonomy on
Security attacks taxonomy on
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Evaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityEvaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise Mobility
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
BYOD - Secure the data, not the device
BYOD - Secure the data, not the deviceBYOD - Secure the data, not the device
BYOD - Secure the data, not the device
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
Byod
ByodByod
Byod
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

The challenges of BYOD for campus network by Leonard Raphael

Notas do Editor

  1. KBExplain graphicsLet us look at different aspect of our joint solution that deliver the three key capabilities – first being optimzied access, next comprehensive security and lastly validated solution.
  2. Bradford Networks’ Network Sentry maintains username information for all non-corporate device types. Because Network Sentry is “network aware”, it knows in real time when any device connects to the network. Network Sentry then immediately sends username and IP address information to the User-ID Palo Alto Agent, allowing the Palo Alto Networks firewall to apply policies based on the user information supplied by Network Sentry.