SlideShare a Scribd company logo
1 of 31
Session 4
Enterprise Mobile
Security

© SecurBay 2012

2
Session 4 – Enterprise Mobile Security
 Lifecycle of Mobile Device Solutions
 Mobile Policy using Use Cases
 BYOD Scenarios
 MDM Solutions
 Mobile Audit & Assurance Program

 Essential elements of Mobile Security
 Case Study
 Questions

© SecurBay 2012

3
BYOD is Not New !

Source: a Greek marble relief that dates back to 100 BC @ Getty Museum in LA
© SecurBay 2012

4
Mobile Platform Key Issues
•

Mobile is different than Desktops

•

Mobile platform security is immature

•

Mobile security features can be easily compromised

© SecurBay 2012

5
Life cycle of enterprise mobile device solutions
•

Phase 1: Initiation

•

Phase 2: Development

•

Phase 3: Implementation

•

Phase 4: Operation and Maintenance

•

Phase 5: Disposal

© SecurBay 2012

6
Mobile Policy using Use Case Definition
• What types of devices will be allowed ?
• What corporate data / application will be used ?
• Who will be allowed to access data/application ?
• What happens if the device is lost or stolen ?

• How will be policy be communicated or enforced?
• What about Asset Management ?

• What about HR / Business Processes ?
• Who will be responsible for BYOD Support ?
• What about Asset Management ?
• How do you control the communication cost ?
• How do you Audit Mobile Security ?

• How will you handle Employee Education ?
© SecurBay 2012

7
BYOD Scenarios

Source: Securosis

© SecurBay 2012

8
Challenges with unmanaged devices
•

Limited Security Controls
•

Often lack the rigor of those provided by a centralized mobile

device management client application
•

Maintenance and Management
•

Patch Management issues

•

Desperate OS makes the control difficult

© SecurBay 2012

9
Mobile – Enterprise Strategies

High

VDI/Remote
VDI/Remo
Desktop
te Desktop
Sandbox
Sandbox

Low

Management Control

Management Control Vs User Experience

MDM

Exchange ActiveSync

Limited / No control

Unfamiliar

Familiar

User Experience
© SecurBay 2012

10
Mobile Device Management

•

Remotely set up email, VPN, calendar, identity certificates

•

Send free and pre-paid apps to devices

•

Send web bookmarks to devices

•

Inventory devices for apps, usage info, and identities

•

Configure features of email accounts not available in the UI:
sandboxing, encryption

•

Additional restrictions on iCloud, encrypted backups,

FaceTime, the App Store, videos, and more

© SecurBay 2012

11
MDM – What are different options ?
•

Exchange ActiveSync Protocol
•
•
•
•
•

•

Require passcode
Require a complex passcode
Lock device after X unsuccessful attempts to unlock
Disable camera
Erase device

Vendor Supplied
•
•

•

Often from the same vendor that makes a particular brand of phone
Offers more robust support for the phones than third party products

Third Party MDM
•

Single product that can manage multiple brands of phones desired for
use within an enterprise.

© SecurBay 2012

12
Exchange ActiveSync
•

Exchange ActiveSync Protocol
•

Developed by Microsoft in 2002

•

Supported by Microsoft, Google, Lotus Notes

© SecurBay 2012

13
Exchange ActiveSync Mailbox Policy Examples

Source: http://technet.microsoft.com/en-us/library/bb123484
© SecurBay 2012

14
Google Apps Device Policy

Source: http://support.google.com/a/bin/answer.py?hl=en&answer=1408863
© SecurBay 2012

15
Apple Configuration Utility

Source: Apple

•Apple Configuration Utility helps to create configuration profiles.
•Configuration profiles define how iOS devices work with your

enterprise systems.
© SecurBay 2012

16
Third Party MDM – Multiple Choices

© SecurBay 2012

17
Selecting MDM Solution
•

Applications: Can the vendor's MDM product manage the deployment,
maintenance and use of mobile applications?

•

Security: Does the product provide such security features as authentication,
encryption and device wipe?

•

Policy: Does the mobile device management system allow the enterprise to

define, enter and monitor its mobile policies?
•

Device: Does the system give you the ability to manage mobile devices'

underlying hardware and operating systems (BlackBerry, Windows Mobile,
iPhone, Android, Symbian or webOS)?

•

Platform: Does it provide such core functions as centralized administration,
Over the Air provisioning, monitoring and vendor templates to simplify
provisioning?

•

Integration: Does the system integrate with existing systems, such as your
identity server?
© SecurBay 2012

18
ISACA Mobile Audit/Assurance Program

•

Mobile computing security addresses the following COBIT processes
•PO4 Define the IT processes, organization and relationships.

•PO6 Communicate management aims and directions.
•PO9 Assess and manage risks.
•DS5 Ensure systems security.
•DS11 Manage data.
•ME3 Ensure compliance with established regulations.

© SecurBay 2012

19
ISACA Mobile Audit/Assurance Program

Source: ISACA
© SecurBay 2012

20
Essential Elements of Enterprise Mobility
Device Management

Data Protection

Device Activation, Monitoring/Tracking
Device Patching, Content Management

Security Management
Remote Wipe, Lock down
Password Management,
Configuration, Compliance

Application Management
App Distribution, Enterprise Policies,
Mobile App Security Assessment

Data Encryption, Data Loss Prevention
Data Backup /Restore

Device
Management

Data Protection

Network Protection
Secure Communication
Device
Security
Management

ePO

Mobile
Application
Management

Network
Protection

Identify &
Access
Management

© SecurBay 2012

Identify & Access Management
Identity Management,
Authentication, Certificate
Management,

21
Mobile Security – Case Study
Roles

Data Stored on Mobile Devices

Senior Management

Carry sensitive data on email and in
documents

Manager

Corporate Emails, Customer Specific
Documents

Knowledge Worker

Corporate Emails, Project Related
Documents, Intellectual Property,
Customer Specific Data

HR/Admin

Access to corporate email, shared
resources

Contractor

Access to non-sensitive documents

© SecurBay 2012

22
Mobile Security – Case Study

© SecurBay 2012

23
Mobile OS Comparison
ID

ATTRIBUTE
1 Built-insecurity
2 Application Security
3 Authentication
4 Device Wipe
5 Device firewall
6 Data protection
7 Device protection
Corporate managed
8 Email
Support for
9 ActiveSync
Mobile device
10 management
11 Virtualization
12 Security Certifications
Average Score

BB7.0

iOS 5

WP 7.5

Android 2.3

3.13
2.44
3.9
4
4.5
3.8
3.5

3.75
2.06
2
1.25
0
1.5
0.63

3.5
1.88
3.2
2.25
0
2.4
2.38

2.5
1.44
2
0.63
0
2
2

3.42

3

0

0

0

2

2.5

1.5

3.5
0
2.5
2.89

2.5
0.83
0.83
1.7

1.25
0
0
1.61

2
1.67
0.67
1.37

Source: http://www.trendmicro.com/cloudcontent/us/pdfs/business/reports/rpt_enterprise_readiness_consumerization_mobile_
platforms.pdf
© SecurBay 2012

24
Enterprise Mobility

1. Identify and classify data residing on mobile devices
2. Formulate Mobile Device Security Policy

3. Conduct Employee Awareness Session
4. Consider MDM for effective policy implementation
5. Consider Cost Implication of BYOD
6. Implement program for Mobile Security Audit

© SecurBay 2012

25
References

•MDM Comparisons http://www.enterpriseios.com/wiki/Comparison_MDM_Providers
•“Technical Information Paper: Cyber Threats to Mobile Devices” (http://www.us-

cert.gov/reading_room/TIP10-105-01.pdf)
• “Protecting Portable Devices: Physical Security” (http://www.us-cert.gov/cas/tips/ST04-

017.html)
• “Protecting Portable Devices: Data Security” (http://www.us-cert.gov/cas/tips/ST04-

020.html)
• “Securing Wireless Networks” (http://www.us-cert.gov/cas/tips/ST05-003.html)
• “Cybersecurity for Electronic Devices” (http://www.us-cert.gov/cas/tips/ST05-017.html)
• “Defending Cell Phones and PDAs Against Attack” (http://www.uscert.gov/cas/tips/ST06-007.html)
•ISACA Audit/Assurance
http://www.isaca.org/KnowledgeCenter/Research/ResearchDeliverables/Pages/Mobile

-Computing-Security-Audit-Assurance-Program.aspx

© SecurBay 2012

26
Questions

© SecurBay 2012
End of Session 4

© SecurBay 2012
THANK YOU

© SecurBay 2012
Contact Us

info@securbay.com
satamsantosh

@

© SecurBay 2012
>

Innovative
Solutions &
Services

31

More Related Content

What's hot

Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protectionxband
 
Building secure mobile apps
Building secure mobile appsBuilding secure mobile apps
Building secure mobile appsMartin Vigo
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety2FA, Inc.
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Ping Identity
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsPing Identity
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldPing Identity
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 

What's hot (20)

Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
Building secure mobile apps
Building secure mobile appsBuilding secure mobile apps
Building secure mobile apps
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 

Viewers also liked

3 f pr4_kolovos_introduction[1]
3 f pr4_kolovos_introduction[1]3 f pr4_kolovos_introduction[1]
3 f pr4_kolovos_introduction[1]alexanderkolovos
 
Day 2, Session 4: Enhancing Food Security and Nutrition through Agricultural ...
Day 2, Session 4: Enhancing Food Security and Nutrition through Agricultural ...Day 2, Session 4: Enhancing Food Security and Nutrition through Agricultural ...
Day 2, Session 4: Enhancing Food Security and Nutrition through Agricultural ...IFPRI-NSSP
 
4 pettarin ecdl-foglio elettronico
4 pettarin ecdl-foglio elettronico4 pettarin ecdl-foglio elettronico
4 pettarin ecdl-foglio elettronicoPietro Latino
 
Ecdl v5 module 4 print
Ecdl v5 module 4 printEcdl v5 module 4 print
Ecdl v5 module 4 printMichael Lew
 
Ecdl v5 module 2 print
Ecdl v5 module 2 printEcdl v5 module 2 print
Ecdl v5 module 2 printMichael Lew
 
Ecdl v5 module 1 print
Ecdl v5 module 1 printEcdl v5 module 1 print
Ecdl v5 module 1 printMichael Lew
 
What are aflatoxins?
What are aflatoxins?What are aflatoxins?
What are aflatoxins?ILRI
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...Michael Lew
 
Evolution of Network, Internet, Security and Public cryptography
Evolution of Network, Internet, Security and Public cryptographyEvolution of Network, Internet, Security and Public cryptography
Evolution of Network, Internet, Security and Public cryptographyjiricejka
 

Viewers also liked (11)

3 f pr4_kolovos_introduction[1]
3 f pr4_kolovos_introduction[1]3 f pr4_kolovos_introduction[1]
3 f pr4_kolovos_introduction[1]
 
Day 2, Session 4: Enhancing Food Security and Nutrition through Agricultural ...
Day 2, Session 4: Enhancing Food Security and Nutrition through Agricultural ...Day 2, Session 4: Enhancing Food Security and Nutrition through Agricultural ...
Day 2, Session 4: Enhancing Food Security and Nutrition through Agricultural ...
 
Session 4 - The Law
Session 4 - The LawSession 4 - The Law
Session 4 - The Law
 
4 pettarin ecdl-foglio elettronico
4 pettarin ecdl-foglio elettronico4 pettarin ecdl-foglio elettronico
4 pettarin ecdl-foglio elettronico
 
Ecdl v5 module 4 print
Ecdl v5 module 4 printEcdl v5 module 4 print
Ecdl v5 module 4 print
 
Ecdl v5 module 2 print
Ecdl v5 module 2 printEcdl v5 module 2 print
Ecdl v5 module 2 print
 
Ecdl v5 module 1 print
Ecdl v5 module 1 printEcdl v5 module 1 print
Ecdl v5 module 1 print
 
994187 mod 1
994187 mod 1994187 mod 1
994187 mod 1
 
What are aflatoxins?
What are aflatoxins?What are aflatoxins?
What are aflatoxins?
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
 
Evolution of Network, Internet, Security and Public cryptography
Evolution of Network, Internet, Security and Public cryptographyEvolution of Network, Internet, Security and Public cryptography
Evolution of Network, Internet, Security and Public cryptography
 

Similar to Session 4 Enterprise Mobile Security

Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013 Troy C. Fulton
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCloudIDSummit
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesSumana Mehta
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0Dilshan Edirisuriya
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD PolicyKaseya
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerWSO2
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology MobileWorxs
 

Similar to Session 4 Enterprise Mobile Security (20)

Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Session 4 Enterprise Mobile Security

  • 1.
  • 3. Session 4 – Enterprise Mobile Security  Lifecycle of Mobile Device Solutions  Mobile Policy using Use Cases  BYOD Scenarios  MDM Solutions  Mobile Audit & Assurance Program  Essential elements of Mobile Security  Case Study  Questions © SecurBay 2012 3
  • 4. BYOD is Not New ! Source: a Greek marble relief that dates back to 100 BC @ Getty Museum in LA © SecurBay 2012 4
  • 5. Mobile Platform Key Issues • Mobile is different than Desktops • Mobile platform security is immature • Mobile security features can be easily compromised © SecurBay 2012 5
  • 6. Life cycle of enterprise mobile device solutions • Phase 1: Initiation • Phase 2: Development • Phase 3: Implementation • Phase 4: Operation and Maintenance • Phase 5: Disposal © SecurBay 2012 6
  • 7. Mobile Policy using Use Case Definition • What types of devices will be allowed ? • What corporate data / application will be used ? • Who will be allowed to access data/application ? • What happens if the device is lost or stolen ? • How will be policy be communicated or enforced? • What about Asset Management ? • What about HR / Business Processes ? • Who will be responsible for BYOD Support ? • What about Asset Management ? • How do you control the communication cost ? • How do you Audit Mobile Security ? • How will you handle Employee Education ? © SecurBay 2012 7
  • 9. Challenges with unmanaged devices • Limited Security Controls • Often lack the rigor of those provided by a centralized mobile device management client application • Maintenance and Management • Patch Management issues • Desperate OS makes the control difficult © SecurBay 2012 9
  • 10. Mobile – Enterprise Strategies High VDI/Remote VDI/Remo Desktop te Desktop Sandbox Sandbox Low Management Control Management Control Vs User Experience MDM Exchange ActiveSync Limited / No control Unfamiliar Familiar User Experience © SecurBay 2012 10
  • 11. Mobile Device Management • Remotely set up email, VPN, calendar, identity certificates • Send free and pre-paid apps to devices • Send web bookmarks to devices • Inventory devices for apps, usage info, and identities • Configure features of email accounts not available in the UI: sandboxing, encryption • Additional restrictions on iCloud, encrypted backups, FaceTime, the App Store, videos, and more © SecurBay 2012 11
  • 12. MDM – What are different options ? • Exchange ActiveSync Protocol • • • • • • Require passcode Require a complex passcode Lock device after X unsuccessful attempts to unlock Disable camera Erase device Vendor Supplied • • • Often from the same vendor that makes a particular brand of phone Offers more robust support for the phones than third party products Third Party MDM • Single product that can manage multiple brands of phones desired for use within an enterprise. © SecurBay 2012 12
  • 13. Exchange ActiveSync • Exchange ActiveSync Protocol • Developed by Microsoft in 2002 • Supported by Microsoft, Google, Lotus Notes © SecurBay 2012 13
  • 14. Exchange ActiveSync Mailbox Policy Examples Source: http://technet.microsoft.com/en-us/library/bb123484 © SecurBay 2012 14
  • 15. Google Apps Device Policy Source: http://support.google.com/a/bin/answer.py?hl=en&answer=1408863 © SecurBay 2012 15
  • 16. Apple Configuration Utility Source: Apple •Apple Configuration Utility helps to create configuration profiles. •Configuration profiles define how iOS devices work with your enterprise systems. © SecurBay 2012 16
  • 17. Third Party MDM – Multiple Choices © SecurBay 2012 17
  • 18. Selecting MDM Solution • Applications: Can the vendor's MDM product manage the deployment, maintenance and use of mobile applications? • Security: Does the product provide such security features as authentication, encryption and device wipe? • Policy: Does the mobile device management system allow the enterprise to define, enter and monitor its mobile policies? • Device: Does the system give you the ability to manage mobile devices' underlying hardware and operating systems (BlackBerry, Windows Mobile, iPhone, Android, Symbian or webOS)? • Platform: Does it provide such core functions as centralized administration, Over the Air provisioning, monitoring and vendor templates to simplify provisioning? • Integration: Does the system integrate with existing systems, such as your identity server? © SecurBay 2012 18
  • 19. ISACA Mobile Audit/Assurance Program • Mobile computing security addresses the following COBIT processes •PO4 Define the IT processes, organization and relationships. •PO6 Communicate management aims and directions. •PO9 Assess and manage risks. •DS5 Ensure systems security. •DS11 Manage data. •ME3 Ensure compliance with established regulations. © SecurBay 2012 19
  • 20. ISACA Mobile Audit/Assurance Program Source: ISACA © SecurBay 2012 20
  • 21. Essential Elements of Enterprise Mobility Device Management Data Protection Device Activation, Monitoring/Tracking Device Patching, Content Management Security Management Remote Wipe, Lock down Password Management, Configuration, Compliance Application Management App Distribution, Enterprise Policies, Mobile App Security Assessment Data Encryption, Data Loss Prevention Data Backup /Restore Device Management Data Protection Network Protection Secure Communication Device Security Management ePO Mobile Application Management Network Protection Identify & Access Management © SecurBay 2012 Identify & Access Management Identity Management, Authentication, Certificate Management, 21
  • 22. Mobile Security – Case Study Roles Data Stored on Mobile Devices Senior Management Carry sensitive data on email and in documents Manager Corporate Emails, Customer Specific Documents Knowledge Worker Corporate Emails, Project Related Documents, Intellectual Property, Customer Specific Data HR/Admin Access to corporate email, shared resources Contractor Access to non-sensitive documents © SecurBay 2012 22
  • 23. Mobile Security – Case Study © SecurBay 2012 23
  • 24. Mobile OS Comparison ID ATTRIBUTE 1 Built-insecurity 2 Application Security 3 Authentication 4 Device Wipe 5 Device firewall 6 Data protection 7 Device protection Corporate managed 8 Email Support for 9 ActiveSync Mobile device 10 management 11 Virtualization 12 Security Certifications Average Score BB7.0 iOS 5 WP 7.5 Android 2.3 3.13 2.44 3.9 4 4.5 3.8 3.5 3.75 2.06 2 1.25 0 1.5 0.63 3.5 1.88 3.2 2.25 0 2.4 2.38 2.5 1.44 2 0.63 0 2 2 3.42 3 0 0 0 2 2.5 1.5 3.5 0 2.5 2.89 2.5 0.83 0.83 1.7 1.25 0 0 1.61 2 1.67 0.67 1.37 Source: http://www.trendmicro.com/cloudcontent/us/pdfs/business/reports/rpt_enterprise_readiness_consumerization_mobile_ platforms.pdf © SecurBay 2012 24
  • 25. Enterprise Mobility 1. Identify and classify data residing on mobile devices 2. Formulate Mobile Device Security Policy 3. Conduct Employee Awareness Session 4. Consider MDM for effective policy implementation 5. Consider Cost Implication of BYOD 6. Implement program for Mobile Security Audit © SecurBay 2012 25
  • 26. References •MDM Comparisons http://www.enterpriseios.com/wiki/Comparison_MDM_Providers •“Technical Information Paper: Cyber Threats to Mobile Devices” (http://www.us- cert.gov/reading_room/TIP10-105-01.pdf) • “Protecting Portable Devices: Physical Security” (http://www.us-cert.gov/cas/tips/ST04- 017.html) • “Protecting Portable Devices: Data Security” (http://www.us-cert.gov/cas/tips/ST04- 020.html) • “Securing Wireless Networks” (http://www.us-cert.gov/cas/tips/ST05-003.html) • “Cybersecurity for Electronic Devices” (http://www.us-cert.gov/cas/tips/ST05-017.html) • “Defending Cell Phones and PDAs Against Attack” (http://www.uscert.gov/cas/tips/ST06-007.html) •ISACA Audit/Assurance http://www.isaca.org/KnowledgeCenter/Research/ResearchDeliverables/Pages/Mobile -Computing-Security-Audit-Assurance-Program.aspx © SecurBay 2012 26
  • 28. End of Session 4 © SecurBay 2012