SlideShare ist ein Scribd-Unternehmen logo
1 von 25
SECURING “BYOD”
How We Secure Mobile Devices That We Do Not OWN...
People Love Their Smart-phones!!
People Love Their Smart-phones!!
BUSINESS
                                             ISSUES


• From   Company Owned Blackberry to Bring Your Own Device

  • From   Field Reps/Managers to Any Employee

• Approval   From Supervisor (“Business Need”)

• Allowed   Devices - Any Carrier - iPhone, Android, Windows -

• Initial Application   - Access Exchange - eMail, Calendar, Contacts
SECURITY POLICY - AUDIT
            ISSUES
• Protect “Corporate   Data” and Access To Systems (eMail)

• Old
    Blackberry - Had 4 Character PIN / Inactivity Timeout and
 Wipe - BES Provisioning and Management

• Minimal
        Protection on ActiveSync Devices “Enforced” Via
 Exchange Policy But Device Dependent - “Mileage Varies!”

• ActiveSync   Configuration W/O IT Enrollment

• No “Unified Audit Trail” -   Scattered Logs Across Systems
LOOKING FOR CONTROL
           TOOLS
• Limited Tools Available   in 2008/9 TimeFrame

• Identified   MobileIron System - Conducted Testing / POC

• Supported All   Policy Enforcement Needs - All Devices

• Excellent   Separation of User Data from Business Data on iOS

• Simple   Enrollment and Distribution of Client Agents

• Simple   Deployment of System - Appliance and Server Agent
AVAILABLE OPTIONS?


• MANY     Options Now

• Leader   Quadrant

• Successful   PoC
WHERE ARE WE NOW?

• Blackberry    Usage Dropping - Users Switching Away

• New    Users Connecting Via ActiveSync (iOS and Android)

• Policies   Now Equally Enforced Across All Mobile Devices

• User   Self Service / Minimal IT Effort In Deployment

• Users Adopting    iPad / Tablet Mobile Devices

• Research    Project To “Deliver App / Data” to iOS - iPad/iPhone
ACCESS TO MORE
    THAN EMAIL
• Mobile    Device Browsers Work Really Well...

• Users Want Access To Their    Data / Systems - Outside eMail

• Juniper   Secure Access and Junos Pulse Provide Access

• Same   Gateway Used For Remote Access

• Robust    Security and Granular Access / Roles for Users
IPAD ACCESS - APPLICATIONS
• Data Access To   More Than eMail Attachments - All Files

• Device   / Backup Encryption Turned On in MobileIron

• Best Way To Access   User Data?

 • DropBox?     Google Docs? Transfer Directly To iPad?

 • Leverage    SharePoint MySites / Team Sites Via Client

 • “There’s An App    For That” - Filamente (AirCreek)

 • Juniper   Provides VPN After SecurID Authentication
WHAT ARE THE THREATS?
• Malware    On Devices Exists But Not Yet In Numbers

  • Enforce App    Store Use (No JailBreaking) As Control

• Minimal   Business Need For “Device Control” Today

  • Could    Control SW Install, Device Features, Content Filters

• Biggest   Exposure - Lost / Stolen Devices, Device Swaps

  • Data Access, Data   On Device and Backups

  • MobileIron “Find   My Phone” - Remote Lock and Wipe

  • PIN   / Pass Code - Automatic Wipe After Guessing Wrong
BUSINESS INCENTIVES
• People   Like Security

• They   Don’t Like Inconvenience

• Balance   Is Needed!!



• “I   NEED My Email Now!”
PICKING OUR PIN POLICY

• Devices   Default To Open Access - But Support PIN Lock

• Users Very   Rarely Want The Security Enough (vs Ease of Use)

• NIST   Guidance on PIN / Passwords - Pub. 800-63 (“Entropy”)

 • “Level   1 PIN” - Simple But Effective Versus Guessing...

 • Andrew      Jacquith - “Picking A Sensible Mobile Password”

 • Trade    Off Between “Secure Enough and User Pain”
PIN SETTINGS
                       8 Characters -     6 Characters - No
PIN Length / Format
                       No SImple PIN         SImple PIN

                      Lock 15 Minutes     Lock 30 Minutes
  Lock and Wipe
                      2 Minutes Grace     2 Minutes Grace
     Settings
                       8 Tries - Wipe      10 Tries - Wipe
                      No PIN Expiration   No PIN Expiration
  Change Policy?       (AD Passwords       (AD Passwords
                       Expire Like PC)     Expire Like PC)
PRIVACY ISSUES

• Mobile    Intelligence / Activity Monitoring Features

  • Track   Cell Tower Connections / Location of Device

  • Collect   Call Logs and All SMS Messages

• Set To   Ignore Calls/SMS and Track “Current Location” Only

• Concerns About      Collecting Data and Controls / Management

• Not   Presently Any Security / Business Requirements
AGENT INTERACTION

• Updates, Profiles, Certificates

• Report    Dropped Calls

• Check     Data Speeds

• iOS   Only Features

  • Links   to iTunes App Store

  • App     Delivery Direct to iOS
IOS “APP STORE”
• Links   to Apple

• Define/Deliver

• Direct   and Store
INTERNATIONAL ROAMING


• Detect   International Roaming

• Send Text   Message Alert

• Send Alert   to IT Admins

• Update   Plans / Activity
REFERENCES
• Surveys      - Sybase Survey Telenav Survey

• MobileIron

• Picking    PIN Policy - Perimeter Jaquith Blog - NIST 800-63

•   iPhone Password Brute Force
CNN Money http://money.cnn.com/galleries/2011/technology/1108/gallery.cybersecurity_tidbits/
Dino Dai Zovi -http://trailofbits.com/2011/08/10/ios-4-security-evaluation/


•

Weitere ähnliche Inhalte

Was ist angesagt?

Not another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigueNot another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigueRamin Firoozye
 
Signature solutions
Signature solutionsSignature solutions
Signature solutionsWacomIndia
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Tom Eston
 
Ultrabooks presentation
Ultrabooks presentationUltrabooks presentation
Ultrabooks presentationChris Harkins
 
Near Field Communication – IxDworks.com
Near Field Communication – IxDworks.comNear Field Communication – IxDworks.com
Near Field Communication – IxDworks.comInteractionDesign
 
Mobile security and what it means to you bb
Mobile security and what it means to you bbMobile security and what it means to you bb
Mobile security and what it means to you bbtechnosyah
 
Smartphone Shootout: Which One is Best?
Smartphone Shootout: Which One is Best?Smartphone Shootout: Which One is Best?
Smartphone Shootout: Which One is Best?Christopher Hunt
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Lg Web Network Mobile Presentation August 2009
Lg Web Network Mobile Presentation August 2009Lg Web Network Mobile Presentation August 2009
Lg Web Network Mobile Presentation August 2009Oliver Weidlich
 
Managing Remote Operation Teams
Managing Remote Operation TeamsManaging Remote Operation Teams
Managing Remote Operation TeamsSagi Brody
 
Chickens2
Chickens2 Chickens2
Chickens2 jing713
 
Nick Grant - Roam Solutions
Nick Grant - Roam SolutionsNick Grant - Roam Solutions
Nick Grant - Roam SolutionsLSmiro
 
Sfsu isys363 fall2013 part one rangers
Sfsu isys363 fall2013 part one   rangersSfsu isys363 fall2013 part one   rangers
Sfsu isys363 fall2013 part one rangersisys363rangers
 

Was ist angesagt? (18)

Not another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigueNot another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigue
 
smart watch
smart watchsmart watch
smart watch
 
I cloud
I cloudI cloud
I cloud
 
Making Mobile Manageable
Making Mobile Manageable Making Mobile Manageable
Making Mobile Manageable
 
Signature solutions
Signature solutionsSignature solutions
Signature solutions
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Ultrabooks presentation
Ultrabooks presentationUltrabooks presentation
Ultrabooks presentation
 
Near Field Communication – IxDworks.com
Near Field Communication – IxDworks.comNear Field Communication – IxDworks.com
Near Field Communication – IxDworks.com
 
Mobile security and what it means to you bb
Mobile security and what it means to you bbMobile security and what it means to you bb
Mobile security and what it means to you bb
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Smartphone Shootout: Which One is Best?
Smartphone Shootout: Which One is Best?Smartphone Shootout: Which One is Best?
Smartphone Shootout: Which One is Best?
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Lg Web Network Mobile Presentation August 2009
Lg Web Network Mobile Presentation August 2009Lg Web Network Mobile Presentation August 2009
Lg Web Network Mobile Presentation August 2009
 
E knock app v1
E knock app v1E knock app v1
E knock app v1
 
Managing Remote Operation Teams
Managing Remote Operation TeamsManaging Remote Operation Teams
Managing Remote Operation Teams
 
Chickens2
Chickens2 Chickens2
Chickens2
 
Nick Grant - Roam Solutions
Nick Grant - Roam SolutionsNick Grant - Roam Solutions
Nick Grant - Roam Solutions
 
Sfsu isys363 fall2013 part one rangers
Sfsu isys363 fall2013 part one   rangersSfsu isys363 fall2013 part one   rangers
Sfsu isys363 fall2013 part one rangers
 

Andere mochten auch

BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessMike Brannon
 
Mobile Devices Securely Accessing SharePoint
Mobile Devices Securely Accessing SharePointMobile Devices Securely Accessing SharePoint
Mobile Devices Securely Accessing SharePointMike Brannon
 
Mobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMike Brannon
 
NGC records management - SP2010 RM Features
NGC records management - SP2010 RM FeaturesNGC records management - SP2010 RM Features
NGC records management - SP2010 RM FeaturesMike Brannon
 
SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013Mike Brannon
 
Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!Mike Brannon
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013Mike Brannon
 
Search for Overview for SC Upstate SP users
Search for Overview for SC Upstate SP usersSearch for Overview for SC Upstate SP users
Search for Overview for SC Upstate SP usersMike Brannon
 

Andere mochten auch (8)

BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with business
 
Mobile Devices Securely Accessing SharePoint
Mobile Devices Securely Accessing SharePointMobile Devices Securely Accessing SharePoint
Mobile Devices Securely Accessing SharePoint
 
Mobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not Repressive
 
NGC records management - SP2010 RM Features
NGC records management - SP2010 RM FeaturesNGC records management - SP2010 RM Features
NGC records management - SP2010 RM Features
 
SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013
 
Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 
Search for Overview for SC Upstate SP users
Search for Overview for SC Upstate SP usersSearch for Overview for SC Upstate SP users
Search for Overview for SC Upstate SP users
 

Ähnlich wie SECURING BYOD: How We Secure Mobile Devices That We Do Not Own

WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter Sailaja Tennati
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns John Mathon
 
Mobile security chess board - attacks & defense
Mobile security chess board - attacks & defenseMobile security chess board - attacks & defense
Mobile security chess board - attacks & defenseBlueinfy Solutions
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Blueinfy Solutions
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15Chris Beauchamp
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2
 
UKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterpriseUKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterpriseRené Winkelmeyer
 
Menofia UN -Mobile Security
Menofia UN -Mobile SecurityMenofia UN -Mobile Security
Menofia UN -Mobile SecurityAhmed Samara
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesTom Eston
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0Dilshan Edirisuriya
 

Ähnlich wie SECURING BYOD: How We Secure Mobile Devices That We Do Not Own (20)

WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
Mobile security chess board - attacks & defense
Mobile security chess board - attacks & defenseMobile security chess board - attacks & defense
Mobile security chess board - attacks & defense
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
UKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterpriseUKLUG 2011 - iOS devices in the enterprise
UKLUG 2011 - iOS devices in the enterprise
 
Menofia UN -Mobile Security
Menofia UN -Mobile SecurityMenofia UN -Mobile Security
Menofia UN -Mobile Security
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 

Kürzlich hochgeladen

NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 

Kürzlich hochgeladen (20)

NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 

SECURING BYOD: How We Secure Mobile Devices That We Do Not Own

  • 1. SECURING “BYOD” How We Secure Mobile Devices That We Do Not OWN...
  • 2. People Love Their Smart-phones!!
  • 3. People Love Their Smart-phones!!
  • 4. BUSINESS ISSUES • From Company Owned Blackberry to Bring Your Own Device • From Field Reps/Managers to Any Employee • Approval From Supervisor (“Business Need”) • Allowed Devices - Any Carrier - iPhone, Android, Windows - • Initial Application - Access Exchange - eMail, Calendar, Contacts
  • 5. SECURITY POLICY - AUDIT ISSUES • Protect “Corporate Data” and Access To Systems (eMail) • Old Blackberry - Had 4 Character PIN / Inactivity Timeout and Wipe - BES Provisioning and Management • Minimal Protection on ActiveSync Devices “Enforced” Via Exchange Policy But Device Dependent - “Mileage Varies!” • ActiveSync Configuration W/O IT Enrollment • No “Unified Audit Trail” - Scattered Logs Across Systems
  • 6. LOOKING FOR CONTROL TOOLS • Limited Tools Available in 2008/9 TimeFrame • Identified MobileIron System - Conducted Testing / POC • Supported All Policy Enforcement Needs - All Devices • Excellent Separation of User Data from Business Data on iOS • Simple Enrollment and Distribution of Client Agents • Simple Deployment of System - Appliance and Server Agent
  • 7. AVAILABLE OPTIONS? • MANY Options Now • Leader Quadrant • Successful PoC
  • 8.
  • 9.
  • 10.
  • 11. WHERE ARE WE NOW? • Blackberry Usage Dropping - Users Switching Away • New Users Connecting Via ActiveSync (iOS and Android) • Policies Now Equally Enforced Across All Mobile Devices • User Self Service / Minimal IT Effort In Deployment • Users Adopting iPad / Tablet Mobile Devices • Research Project To “Deliver App / Data” to iOS - iPad/iPhone
  • 12. ACCESS TO MORE THAN EMAIL • Mobile Device Browsers Work Really Well... • Users Want Access To Their Data / Systems - Outside eMail • Juniper Secure Access and Junos Pulse Provide Access • Same Gateway Used For Remote Access • Robust Security and Granular Access / Roles for Users
  • 13.
  • 14.
  • 15.
  • 16. IPAD ACCESS - APPLICATIONS • Data Access To More Than eMail Attachments - All Files • Device / Backup Encryption Turned On in MobileIron • Best Way To Access User Data? • DropBox? Google Docs? Transfer Directly To iPad? • Leverage SharePoint MySites / Team Sites Via Client • “There’s An App For That” - Filamente (AirCreek) • Juniper Provides VPN After SecurID Authentication
  • 17. WHAT ARE THE THREATS? • Malware On Devices Exists But Not Yet In Numbers • Enforce App Store Use (No JailBreaking) As Control • Minimal Business Need For “Device Control” Today • Could Control SW Install, Device Features, Content Filters • Biggest Exposure - Lost / Stolen Devices, Device Swaps • Data Access, Data On Device and Backups • MobileIron “Find My Phone” - Remote Lock and Wipe • PIN / Pass Code - Automatic Wipe After Guessing Wrong
  • 18. BUSINESS INCENTIVES • People Like Security • They Don’t Like Inconvenience • Balance Is Needed!! • “I NEED My Email Now!”
  • 19. PICKING OUR PIN POLICY • Devices Default To Open Access - But Support PIN Lock • Users Very Rarely Want The Security Enough (vs Ease of Use) • NIST Guidance on PIN / Passwords - Pub. 800-63 (“Entropy”) • “Level 1 PIN” - Simple But Effective Versus Guessing... • Andrew Jacquith - “Picking A Sensible Mobile Password” • Trade Off Between “Secure Enough and User Pain”
  • 20. PIN SETTINGS 8 Characters - 6 Characters - No PIN Length / Format No SImple PIN SImple PIN Lock 15 Minutes Lock 30 Minutes Lock and Wipe 2 Minutes Grace 2 Minutes Grace Settings 8 Tries - Wipe 10 Tries - Wipe No PIN Expiration No PIN Expiration Change Policy? (AD Passwords (AD Passwords Expire Like PC) Expire Like PC)
  • 21. PRIVACY ISSUES • Mobile Intelligence / Activity Monitoring Features • Track Cell Tower Connections / Location of Device • Collect Call Logs and All SMS Messages • Set To Ignore Calls/SMS and Track “Current Location” Only • Concerns About Collecting Data and Controls / Management • Not Presently Any Security / Business Requirements
  • 22. AGENT INTERACTION • Updates, Profiles, Certificates • Report Dropped Calls • Check Data Speeds • iOS Only Features • Links to iTunes App Store • App Delivery Direct to iOS
  • 23. IOS “APP STORE” • Links to Apple • Define/Deliver • Direct and Store
  • 24. INTERNATIONAL ROAMING • Detect International Roaming • Send Text Message Alert • Send Alert to IT Admins • Update Plans / Activity
  • 25. REFERENCES • Surveys - Sybase Survey Telenav Survey • MobileIron • Picking PIN Policy - Perimeter Jaquith Blog - NIST 800-63 • iPhone Password Brute Force CNN Money http://money.cnn.com/galleries/2011/technology/1108/gallery.cybersecurity_tidbits/ Dino Dai Zovi -http://trailofbits.com/2011/08/10/ios-4-security-evaluation/ •

Hinweis der Redaktion

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n