At RSA Europe 2010, Ron Lapedis and Michael F. Angelo did a presentation on Consumerization, titled: "Bring Your Own Computer to Work – What Now?". The presentation covered Consumerization issues as embodied with the use of non-corporate owned computers in the corporate environment. With this in mind, they discussed the potential bleed out of intellectual property and mitigation techniques. You can read Michael's blogs on the subject here: http://bit.ly/11BhzC
WinMo and Blackberry not listed because they are considered to be corporate devices.Why?At the office, you've got a sluggish computer running aging software, and the email system routinely badgers you to delete messages after you blow through the storage limits set by your IT department.Searching your company's internal Web site feels like being teleported back to the pre-Google era of irrelevant search results.At home, though, you zip into the 21st century. You've got a slick, late-model computer and an email account with seemingly inexhaustible storage space.And while Web search engines don't always figure out exactly what you're looking for, they're practically clairvoyant compared with your company intranetWinMo and Blackberry not listed because they are considered to be corporate devices.Why?At the office, you've got a sluggish computer running aging software, and the email system routinely badgers you to delete messages after you blow through the storage limits set by your IT department.Searching your company's internal Web site feels like being teleported back to the pre-Google era of irrelevant search results.At home, though, you zip into the 21st century. You've got a slick, late-model computer and an email account with seemingly inexhaustible storage space.And while Web search engines don't always figure out exactly what you're looking for, they're practically clairvoyant compared with your company intranet
Gartner says 10% are primary system
After waiting 30 minutes for a ten year old work Pentium PC to boot Windows 98 we can see how the concept of a shiny new notebook you can call your own would be appealing
68% of SMB IT managers say their departments provide technical support for personal devices, including smartphones and computers.
ConfigurationBIOSDocuments & SettingsFirewall / Anti-Virus / Anti-malwareWireless networksVPN
Why?At the office, you've got a sluggish computer running aging software, and the email system routinely badgers you to delete messages after you blow through the storage limits set by your IT department.Searching your company's internal Web site feels like being teleported back to the pre-Google era of irrelevant search results.At home, though, you zip into the 21st century. You've got a slick, late-model computer and an email account with seemingly inexhaustible storage space.And while Web search engines don't always figure out exactly what you're looking for, they're practically clairvoyant compared with your company intranet
Things that you might do at home might get you in trouble when you put your corporate information at risk by doing them …
Various laws protect customer dataEmployee must protect assets whether physical or informational. Protect devices, encrypt HD, remove HD if needed.
Paging file could be a leakage point. Keylogger
Virus on hosted OS can only take out the hosted OS, but virus on host OS can take out both.
Virus on hosted OS can only take out the hosted OS, but virus on host OS can take out both.
BIOS protections…
So VM can be modified while running through rogue / compromised environment.
So VM can be modified while running through rogue / compromised environment.
So VM can be modified while running through rogue / compromised environment.