SlideShare a Scribd company logo
1 of 11
Download to read offline
Bring Your Own Data
in motion without risks
Adopt a mobile access strategy that users can easily embrace


Giuseppe Paternò
IT Security Architect - gpaterno@garl.ch
EVERY USER IS AN ADMIN
    ... of his devices (BYOD)      ... of his apps, softwares,
 . ... of his credential to     virus installed with company’s
access to company’s data        management tools
THE BYOD OPPORTUNITIES


Let your users choose their   Lower costs and less time
devices                       dedicated to test and
                              development




Improve agility with          Less time spent in the IT
teleworking                   helpdesk
THE BYOD RISKS
Access to company’s network

Unable to enforce company’s policies on the
device

Respect privacy regulations (ex. customers’
data stored within address book accessible by
social networks)

Users install mobile apps that accessing and
collecting data like bank and shopping accounts

Stolen or lost devices with credential to access
to company’ system
THE STRATEGY
The BYOD access strategy should be focused
on securing the users’ access, not the devices
STRONG
     SECURITY
      POLICY
  A secure access gateway
              +
     A virtual desktop
       infrastructure
              +
A secure centralized identity
    management system
ACCESS GATEWAY

Easy web access from
anywhere with SSL

Full HTML compatibility

Per-user customized portal

Access to applications based
on users’ role
VIRTUAL DESKTOP
       INFRASTRUCTURE




Desktop experience from     No need to rewrite
anywhere and any device     existing desktop
                            applications
Easy to use for everybody
IDENTITY MANAGEMENT
Centralized identity
management across all on-line
applications

Grant users’ access with One
Time Passwords

Easy integration with all your
web based applications

Few minutes to secure
existing partner portals,
virtual desktops and VPN
AND DON’T FORGET BEST
     PRACTICES!




Configure an SSL VPN   Adopt a firewall and check
                         policies periodically
EASY SECURITY
                      FOR YOUR ON-LINE SERVICES




www.secure-pass.net                     www.intellicomp.de

More Related Content

More from Giuseppe Paterno'

Filesystem Comparison: NFS vs GFS2 vs OCFS2
Filesystem Comparison: NFS vs GFS2 vs OCFS2Filesystem Comparison: NFS vs GFS2 vs OCFS2
Filesystem Comparison: NFS vs GFS2 vs OCFS2
Giuseppe Paterno'
 
Creating OTP with free software
Creating OTP with free softwareCreating OTP with free software
Creating OTP with free software
Giuseppe Paterno'
 
Protecting confidential files using SE-Linux
Protecting confidential files using SE-LinuxProtecting confidential files using SE-Linux
Protecting confidential files using SE-Linux
Giuseppe Paterno'
 
Secure real-time collaboration with SecurePass and Etherpad
Secure real-time collaboration with SecurePass and EtherpadSecure real-time collaboration with SecurePass and Etherpad
Secure real-time collaboration with SecurePass and Etherpad
Giuseppe Paterno'
 

More from Giuseppe Paterno' (8)

Filesystem Comparison: NFS vs GFS2 vs OCFS2
Filesystem Comparison: NFS vs GFS2 vs OCFS2Filesystem Comparison: NFS vs GFS2 vs OCFS2
Filesystem Comparison: NFS vs GFS2 vs OCFS2
 
Creating OTP with free software
Creating OTP with free softwareCreating OTP with free software
Creating OTP with free software
 
Protecting confidential files using SE-Linux
Protecting confidential files using SE-LinuxProtecting confidential files using SE-Linux
Protecting confidential files using SE-Linux
 
Comparing IaaS: VMware vs OpenStack vs Google’s Ganeti
Comparing IaaS: VMware vs OpenStack vs Google’s GanetiComparing IaaS: VMware vs OpenStack vs Google’s Ganeti
Comparing IaaS: VMware vs OpenStack vs Google’s Ganeti
 
La gestione delle identità per il controllo delle frodi bancarie
La gestione delle identità per il controllo delle frodi bancarieLa gestione delle identità per il controllo delle frodi bancarie
La gestione delle identità per il controllo delle frodi bancarie
 
Secure real-time collaboration with SecurePass and Etherpad
Secure real-time collaboration with SecurePass and EtherpadSecure real-time collaboration with SecurePass and Etherpad
Secure real-time collaboration with SecurePass and Etherpad
 
Identity theft in the Cloud and remedies
Identity theft in the Cloud and remediesIdentity theft in the Cloud and remedies
Identity theft in the Cloud and remedies
 
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimediIl problema dei furti di identita' nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimedi
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

BYOD Strategy: Bring Your Own Data in motion without risks

  • 1. Bring Your Own Data in motion without risks Adopt a mobile access strategy that users can easily embrace Giuseppe Paternò IT Security Architect - gpaterno@garl.ch
  • 2. EVERY USER IS AN ADMIN ... of his devices (BYOD) ... of his apps, softwares, . ... of his credential to virus installed with company’s access to company’s data management tools
  • 3. THE BYOD OPPORTUNITIES Let your users choose their Lower costs and less time devices dedicated to test and development Improve agility with Less time spent in the IT teleworking helpdesk
  • 4. THE BYOD RISKS Access to company’s network Unable to enforce company’s policies on the device Respect privacy regulations (ex. customers’ data stored within address book accessible by social networks) Users install mobile apps that accessing and collecting data like bank and shopping accounts Stolen or lost devices with credential to access to company’ system
  • 5. THE STRATEGY The BYOD access strategy should be focused on securing the users’ access, not the devices
  • 6. STRONG SECURITY POLICY A secure access gateway + A virtual desktop infrastructure + A secure centralized identity management system
  • 7. ACCESS GATEWAY Easy web access from anywhere with SSL Full HTML compatibility Per-user customized portal Access to applications based on users’ role
  • 8. VIRTUAL DESKTOP INFRASTRUCTURE Desktop experience from No need to rewrite anywhere and any device existing desktop applications Easy to use for everybody
  • 9. IDENTITY MANAGEMENT Centralized identity management across all on-line applications Grant users’ access with One Time Passwords Easy integration with all your web based applications Few minutes to secure existing partner portals, virtual desktops and VPN
  • 10. AND DON’T FORGET BEST PRACTICES! Configure an SSL VPN Adopt a firewall and check policies periodically
  • 11. EASY SECURITY FOR YOUR ON-LINE SERVICES www.secure-pass.net www.intellicomp.de