SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Mobile Device Security The next challenge Jan Guldentops (  [email_address]  ) BA N.V. (  http://www.ba.be  )
About BA More information
I nformation  I ntegration i
Our Commitment Ask our partners
Our Commitment Ask our clients Public Sector/Government Non-profit Enterprise Association Vincotte Nuclear, Idewe, Handicap international, Jeugd en Stad Vzw) Hamburger Mannheimer, Didak Injection, Credimo, Nollekens (PGZ International), Altrad Havico, Paratel, Sodexo,  Securex Vlaams Parlement, Leuven, Hasselt, Boom, Overpelt, Mortsel, Ranst, Lummen, Olen, St-Katelijne-Waver, Kasterlee, Oud-Turnhout, OCMW Kontich, PZ Noord, Balen, Schoten, Zwijndrecht, KBR
Information Integration BA’s infrastructure for: Digitisation Security Mobility Virtualisation Data Storage  and Warehousing Data Protection and Integrity Digital  Preservation and Archiving Data Access and Portability
Traditional Security-model is gone forever There is no perimeter anymore... Users are accessing data/app(lication)s From everywhere From all kinds of devices
There are no sure bets in the mobile device market King today, beggar tomorrow (e.g. RIM, Nokia) What will happen to Apple now Steve is dead ? Will Nokia rise from the grave by selling its soul to the devil ?
End-user rules... ICT/security has to follow not lead End-user decides which (cloud) apps/device he or she is going to use Wants to have that sexy device that fiits his personality...
BYOD Bring your own device  Let users buy their own phone, tablet or laptop Make IT support it
Most secure devices 1. Blackberry  2. iOS 3. Symbian 4. Android  5. Windows Phone
Armsrace The security feature list is continuously evolving version by version. IOS5 and Android 4 look very promising Windows Phone is too early days Security should be in the device OS itself and not added by extra software
Mobile security = big business All antivirus vendors have a mobile solution Kaspersky (not for Ios), Gdata & Symantec (only android), etc. Lots of mobile device management platforms out there  Mobile Iron, Zenprise, Good technologies, Kaspersky
Problems to fear / fix DATA LEAKAGE Encrypt / remote wipe Don't store confidential data on the device MALWARE Update your os Control the dev community / signing Walled gardens / sandboxes
Problems to fear / fix (2) STRONG AUTHENTICATION Password policies Better: certificates CONTROL Controll the apps/usage of your endusers BACKUPS
Conclusions The ghost is out of the bottle, no way back  Go for a crossplatform solution  Control what you can control BYOD will happen so prepare for it
Conclusions First you need a good policy What level of security do you want/have to accomplish? Riskanalysis – is this possible ? Plan for the worse Then find the tools to do it First tool is common sense (be smart) Look at the management solutions
Thank You Contact us 016/ 29.80.45 016/ 29.80.46 www.ba.be Vaartdijk 3/501  B-3018 Wijgmaal, Belgium [email_address] www.ba.be www.ba.be Twitter: JanGuldentops

Weitere ähnliche Inhalte

Was ist angesagt?

Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, EverywhereLINE Corporation
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
What is a port?
What is a port? What is a port?
What is a port? Joe Karl
 
бизнес планирование Wimax
бизнес планирование Wimaxбизнес планирование Wimax
бизнес планирование Wimaxsham_sr
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDMApperian
 
Application security as crucial to the modern distributed trust model
Application security as crucial to   the modern distributed trust modelApplication security as crucial to   the modern distributed trust model
Application security as crucial to the modern distributed trust modelLINE Corporation
 
Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingDDoS Mitigation
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO AuthenticationLINE Corporation
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014Andris Soroka
 
AI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OTAI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OTJustin Hayward
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns Exosite
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowNowSecure
 

Was ist angesagt? (19)

Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
What is a port?
What is a port? What is a port?
What is a port?
 
бизнес планирование Wimax
бизнес планирование Wimaxбизнес планирование Wimax
бизнес планирование Wimax
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
 
Application security as crucial to the modern distributed trust model
Application security as crucial to   the modern distributed trust modelApplication security as crucial to   the modern distributed trust model
Application security as crucial to the modern distributed trust model
 
Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 
FRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHYFRONTIERS IN CRYPTOGRAPHY
FRONTIERS IN CRYPTOGRAPHY
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
AI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OTAI/ML for Real-time decision-making in IT/OT
AI/ML for Real-time decision-making in IT/OT
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
Pace IT - Secure Mobile Devices
Pace IT - Secure Mobile DevicesPace IT - Secure Mobile Devices
Pace IT - Secure Mobile Devices
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to Know
 

Andere mochten auch

Mobile augmented virtual location reality"- ORBIT
Mobile augmented virtual location reality"- ORBIT Mobile augmented virtual location reality"- ORBIT
Mobile augmented virtual location reality"- ORBIT Mobile Monday Brussels
 
Mark Daemen Corelio, Current status & strategy of newspaper company"
Mark Daemen Corelio, Current status & strategy of newspaper company"Mark Daemen Corelio, Current status & strategy of newspaper company"
Mark Daemen Corelio, Current status & strategy of newspaper company"Mobile Monday Brussels
 
Lakewood WA, crime, July 2009 report
Lakewood WA, crime, July 2009 reportLakewood WA, crime, July 2009 report
Lakewood WA, crime, July 2009 reportWalter Neary
 
Meeting with Investors of March 2015
Meeting with Investors of March 2015Meeting with Investors of March 2015
Meeting with Investors of March 2015TIM RI
 

Andere mochten auch (7)

Testimonials
TestimonialsTestimonials
Testimonials
 
Mobile augmented virtual location reality"- ORBIT
Mobile augmented virtual location reality"- ORBIT Mobile augmented virtual location reality"- ORBIT
Mobile augmented virtual location reality"- ORBIT
 
Mark Daemen Corelio, Current status & strategy of newspaper company"
Mark Daemen Corelio, Current status & strategy of newspaper company"Mark Daemen Corelio, Current status & strategy of newspaper company"
Mark Daemen Corelio, Current status & strategy of newspaper company"
 
Uxperts mobi 2013 ux for android
Uxperts mobi 2013   ux for androidUxperts mobi 2013   ux for android
Uxperts mobi 2013 ux for android
 
Apps For Ghent
Apps For GhentApps For Ghent
Apps For Ghent
 
Lakewood WA, crime, July 2009 report
Lakewood WA, crime, July 2009 reportLakewood WA, crime, July 2009 report
Lakewood WA, crime, July 2009 report
 
Meeting with Investors of March 2015
Meeting with Investors of March 2015Meeting with Investors of March 2015
Meeting with Investors of March 2015
 

Ähnlich wie Mobilemonday b2b b-asecurity

Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Andris Soroka
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation SlidesIvanti
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingIvanti
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantVladimir Jirasek
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0Jon Collins
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point FinalBen Rothke
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Andris Soroka
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Advanced monitoring
 

Ähnlich wie Mobilemonday b2b b-asecurity (20)

Sophos
SophosSophos
Sophos
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Byod
ByodByod
Byod
 
Mobile security management
Mobile security managementMobile security management
Mobile security management
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 

Mehr von Mobile Monday Brussels

Privacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 BelgiumPrivacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 BelgiumMobile Monday Brussels
 
GARI - mobile accessibility for mobile apps
GARI - mobile accessibility for mobile appsGARI - mobile accessibility for mobile apps
GARI - mobile accessibility for mobile appsMobile Monday Brussels
 
Uxperts mobi 2013 Ux for the future @ EhB
Uxperts mobi 2013  Ux for the future @ EhBUxperts mobi 2013  Ux for the future @ EhB
Uxperts mobi 2013 Ux for the future @ EhBMobile Monday Brussels
 
Mobile gaming app promotion- mark brill
Mobile gaming   app promotion- mark brillMobile gaming   app promotion- mark brill
Mobile gaming app promotion- mark brillMobile Monday Brussels
 
Uxperts mobi 2013 how the f -_ do i start
Uxperts mobi 2013   how the f -_ do i startUxperts mobi 2013   how the f -_ do i start
Uxperts mobi 2013 how the f -_ do i startMobile Monday Brussels
 
Appsforgeonostalgia20130426 appsforgeo
Appsforgeonostalgia20130426 appsforgeoAppsforgeonostalgia20130426 appsforgeo
Appsforgeonostalgia20130426 appsforgeoMobile Monday Brussels
 
Mobile monday intro to social media on mobile
Mobile monday intro to social media on mobileMobile monday intro to social media on mobile
Mobile monday intro to social media on mobileMobile Monday Brussels
 

Mehr von Mobile Monday Brussels (20)

Privacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 BelgiumPrivacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 Belgium
 
GARI - mobile accessibility for mobile apps
GARI - mobile accessibility for mobile appsGARI - mobile accessibility for mobile apps
GARI - mobile accessibility for mobile apps
 
Djump
DjumpDjump
Djump
 
Appsmarathon 2013
Appsmarathon 2013Appsmarathon 2013
Appsmarathon 2013
 
Uxperts mobi 2013 Ux for the future @ EhB
Uxperts mobi 2013  Ux for the future @ EhBUxperts mobi 2013  Ux for the future @ EhB
Uxperts mobi 2013 Ux for the future @ EhB
 
Uxperts mobi 2013 soa & challenges
Uxperts mobi 2013   soa & challengesUxperts mobi 2013   soa & challenges
Uxperts mobi 2013 soa & challenges
 
Mobile gaming app promotion- mark brill
Mobile gaming   app promotion- mark brillMobile gaming   app promotion- mark brill
Mobile gaming app promotion- mark brill
 
Uxperts mobi 2013 what about testing
Uxperts mobi 2013   what about testing Uxperts mobi 2013   what about testing
Uxperts mobi 2013 what about testing
 
Uxperts mobi 2013 introduction
Uxperts mobi 2013   introductionUxperts mobi 2013   introduction
Uxperts mobi 2013 introduction
 
Uxperts mobi 2013 ux for windows 8
Uxperts mobi 2013   ux for windows 8Uxperts mobi 2013   ux for windows 8
Uxperts mobi 2013 ux for windows 8
 
Uxperts mobi 2013 how the f -_ do i start
Uxperts mobi 2013   how the f -_ do i startUxperts mobi 2013   how the f -_ do i start
Uxperts mobi 2013 how the f -_ do i start
 
Uxperts mobi 2013 ux for i os
Uxperts mobi 2013   ux for i osUxperts mobi 2013   ux for i os
Uxperts mobi 2013 ux for i os
 
Apps4 geo geosolutions
Apps4 geo geosolutionsApps4 geo geosolutions
Apps4 geo geosolutions
 
Appsforgeonostalgia20130426 appsforgeo
Appsforgeonostalgia20130426 appsforgeoAppsforgeonostalgia20130426 appsforgeo
Appsforgeonostalgia20130426 appsforgeo
 
Momojan21012013
Momojan21012013Momojan21012013
Momojan21012013
 
Mv use of social media Dorien Aerts
Mv use of social media   Dorien AertsMv use of social media   Dorien Aerts
Mv use of social media Dorien Aerts
 
Mobilemonday Slovakia
Mobilemonday SlovakiaMobilemonday Slovakia
Mobilemonday Slovakia
 
Mobile monday intro to social media on mobile
Mobile monday intro to social media on mobileMobile monday intro to social media on mobile
Mobile monday intro to social media on mobile
 
Survey anyplace apps marathon
Survey anyplace apps marathonSurvey anyplace apps marathon
Survey anyplace apps marathon
 
Belgian mobile app developer profile
Belgian mobile app developer profileBelgian mobile app developer profile
Belgian mobile app developer profile
 

Kürzlich hochgeladen

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Mobilemonday b2b b-asecurity

  • 1. Mobile Device Security The next challenge Jan Guldentops ( [email_address] ) BA N.V. ( http://www.ba.be )
  • 2. About BA More information
  • 3. I nformation I ntegration i
  • 4. Our Commitment Ask our partners
  • 5. Our Commitment Ask our clients Public Sector/Government Non-profit Enterprise Association Vincotte Nuclear, Idewe, Handicap international, Jeugd en Stad Vzw) Hamburger Mannheimer, Didak Injection, Credimo, Nollekens (PGZ International), Altrad Havico, Paratel, Sodexo, Securex Vlaams Parlement, Leuven, Hasselt, Boom, Overpelt, Mortsel, Ranst, Lummen, Olen, St-Katelijne-Waver, Kasterlee, Oud-Turnhout, OCMW Kontich, PZ Noord, Balen, Schoten, Zwijndrecht, KBR
  • 6. Information Integration BA’s infrastructure for: Digitisation Security Mobility Virtualisation Data Storage and Warehousing Data Protection and Integrity Digital Preservation and Archiving Data Access and Portability
  • 7. Traditional Security-model is gone forever There is no perimeter anymore... Users are accessing data/app(lication)s From everywhere From all kinds of devices
  • 8. There are no sure bets in the mobile device market King today, beggar tomorrow (e.g. RIM, Nokia) What will happen to Apple now Steve is dead ? Will Nokia rise from the grave by selling its soul to the devil ?
  • 9. End-user rules... ICT/security has to follow not lead End-user decides which (cloud) apps/device he or she is going to use Wants to have that sexy device that fiits his personality...
  • 10. BYOD Bring your own device Let users buy their own phone, tablet or laptop Make IT support it
  • 11. Most secure devices 1. Blackberry 2. iOS 3. Symbian 4. Android 5. Windows Phone
  • 12. Armsrace The security feature list is continuously evolving version by version. IOS5 and Android 4 look very promising Windows Phone is too early days Security should be in the device OS itself and not added by extra software
  • 13. Mobile security = big business All antivirus vendors have a mobile solution Kaspersky (not for Ios), Gdata & Symantec (only android), etc. Lots of mobile device management platforms out there Mobile Iron, Zenprise, Good technologies, Kaspersky
  • 14. Problems to fear / fix DATA LEAKAGE Encrypt / remote wipe Don't store confidential data on the device MALWARE Update your os Control the dev community / signing Walled gardens / sandboxes
  • 15. Problems to fear / fix (2) STRONG AUTHENTICATION Password policies Better: certificates CONTROL Controll the apps/usage of your endusers BACKUPS
  • 16. Conclusions The ghost is out of the bottle, no way back Go for a crossplatform solution Control what you can control BYOD will happen so prepare for it
  • 17. Conclusions First you need a good policy What level of security do you want/have to accomplish? Riskanalysis – is this possible ? Plan for the worse Then find the tools to do it First tool is common sense (be smart) Look at the management solutions
  • 18. Thank You Contact us 016/ 29.80.45 016/ 29.80.46 www.ba.be Vaartdijk 3/501 B-3018 Wijgmaal, Belgium [email_address] www.ba.be www.ba.be Twitter: JanGuldentops

Hinweis der Redaktion

  1. Purpose of presentation: 20 slides, 20 seconds, maximum presentation time of 6 minutes Objective: visionary and innovating introduction
  2. Keywords: A) Virtual; Integrated; Enterprise; Federated; Combined; Contextual; Ad hoc; Distributed; Structured; Aggregated B) Information; Data; Knowledge; Wisdom; Query; Content; Schema; Resource; Model C) Integration; Infrastructure; Base; Broker; Systems; Management; Convergence; Architecture; Solution; Federation;
  3. Connect keywords with focus Keywords for Mobility: Freedom, Future, Productivity Keywords for Security: Threats, Globalisation, Competition Keywords for Virtualisation: Environment, Cost control, Financial crisis Keywords for Digitisation: Future, Sustainability, Preservation; Competition