SlideShare una empresa de Scribd logo
1 de 26
SECURE Mobile Access to SharePoint Mobile Devices (iPads! iPhones! Android!)Access SharePoint
SecureMobile Access To SharePoint 1 3 2 What Is The Issue Here? Technology Overview What Did NGC Do? Integrating Policy, Supporting Technology And SharePoint
Post PC Issue/ Opportunity Your Users / Customers Want Mobile Access – Non-PC Devices Will Take Over Someday… 1
Mobile AccessSharePoint, eMail – Work Resources!! Powerful Smartphones and Tablets Are More Mobile Than Many PCs People Want Mobile Access Now – MORE In Future!!
Mobile DevicesShiny New Devices – Few Blackberries… Powerful Inexpensive Devices Old Deployment Models Gone
Mobile DevicesHUGE Technical Differences Matter! Closed Basis For Mobile Devices (Apple, Carriers) Very Different From PC Your Employees, Partners, Customers (and Providers) OWN Devices – Not IT! Want Mobile Access (From Home, Coffee Shop, AND On Your Wireless LAN) New Types of Risks and Threats – HUGE Issues With Lost / Stolen Devices App Store Models – “There’s An App For That!!”
2 NGC Our Challenges,         Our Solution (So Far) Establish Policy and Technical Controls – Facilitate Adoption (with Proper Security)
Critical Security Policies Enrolled Connections Required  SSL VPN / ActiveSync Protection Theft / Tamper Protection PIN/Passcodes Required Inactivity Timeout Wipe Data after guesses Device / Business Data Encryption Protect Data On Device Protect Device Backup (iTunes) Remote Wipe For Lost/Stolen Devices “Find My Phone” Ideal…
“Nice To Have” Device Policies Simple, Self-Service Deployment 	Secure But Simple For People “Managed” App Store Links / App Delivery App Blacklist / Whitelist “Manage Device Features” Centrally Camera Allowed / Disallowed? Wireless LAN – Other Configs. One Policy – Across Many Devices iOS, Android, Windows, Etc…
Very Important PIN Policy! Can Become Issue – BALANCE Needed 	Secure But Simple For People Just Long Enough To Work Six to Eight Characters Auto Lock After No Active Use 30 minutes max – Devices Vary Ten Tries – Then Wipe Biz Data  Warnings Stop “Butt Dial”  No PIN Expiration Controls  Not Network (AD) Passwords Those Credentials Embedded?
How Can We Enforce This? Mobile Email Access (Addiction?) People NEED Their Email Security/Controls Needed On Devices Protect Data / Control Access Deploy “Email Locks” Tied To MDM MobileIron Sentry for NGC Update Company Policy / Forms Employee Acceptance Needed Agree To Device Management Agree To Possible “Wipe” Enrollment/Controls In Place
3 Demo: Technology Overview NGC Solutions: Device MDM/Policy via MobileIron, SSL VPN via Juniper SA / Junos Pulse
Agent Interaction Updates, Profiles, Certificates Report Dropped Calls Check Data Speeds  iOS Only Features Links to iTunes App Store App Delivery Direct to iOS
iOS “App Store” Links to Apple Store Point to Apps You Select  Define/Deliver Internal Apps Without App Store (From Your System)
Privacy Issues Mobile Intelligence / Activity Monitoring Features Track Cell Tower Connections / Location of Device Collect Call Logs and All SMS Messages Set To Ignore Calls/SMS and Track “Current Location” Only Concerns About Collecting Data and Controls / Management Not Presently Any Security / Business Requirements
Mobile Expense -   International Roaming Alerts Detect International Roaming Send Text Message Alert  Send Alert to IT Admins Update Plans / Activity
Access To SharePoint – Juniper/Junos VPN SSL VPN for PCs Users Already Know It Flexible Authentication RSA SecurdID / AD / etc. Very Good Controls – From Full VPN Tunnel to Simple One Site Link
Access To SharePoint – AircreekFilamente Detect International Roaming Send Text Message Alert
Filamente Document Library / Previews
Filamente Document Actions / Access
Filamente Document Actions / Upload Content
References Surveys - Sybase SurveyTelenav Survey MobileIron Picking PIN Policy - Perimeter Jaquith Blog  - NIST 800-63 iPhone Password Brute Force CNN Money http://money.cnn.com/galleries/2011/technology/1108/gallery.cybersecurity_tidbits/ Dino Dai Zovi -http://trailofbits.com/2011/08/10/ios-4-security-evaluation/
POWERPOINT 2010 What’s Your Message?

Más contenido relacionado

La actualidad más candente

Internet of things –
Internet of things –Internet of things –
Internet of things –Mathews Job
 
Internet of Things and Quality Assurance
Internet of Things and Quality AssuranceInternet of Things and Quality Assurance
Internet of Things and Quality AssuranceKhubaib Rehman
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptxLamisaFaria
 
IoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical IssuesIoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical IssuesBugRaptors
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...AkshetPatel
 
How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012hemantchaskar
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 pptMhae Lyn
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of ThingsTushar Sharma
 
IoT (Internet Of Things)
IoT (Internet Of Things)IoT (Internet Of Things)
IoT (Internet Of Things)Şafak Saylam
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Amjat Shaikh
 
Internet of things applications covering industrial domain
Internet of things applications covering industrial domainInternet of things applications covering industrial domain
Internet of things applications covering industrial domainDev Bhattacharya
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-thingsJohn Soldatos
 
Internet+of+things+iot+learn+faster+the+io t+
Internet+of+things+iot+learn+faster+the+io t+Internet+of+things+iot+learn+faster+the+io t+
Internet+of+things+iot+learn+faster+the+io t+CDKTCaoThangBMDTCN
 

La actualidad más candente (20)

Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things –
Internet of things –Internet of things –
Internet of things –
 
Internet of Things and Quality Assurance
Internet of Things and Quality AssuranceInternet of Things and Quality Assurance
Internet of Things and Quality Assurance
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptx
 
WHAT IS IoT
WHAT IS IoTWHAT IS IoT
WHAT IS IoT
 
Internet of Things
Internet of Things Internet of Things
Internet of Things
 
IoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical IssuesIoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical Issues
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
 
How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of Things
 
IoT (Internet Of Things)
IoT (Internet Of Things)IoT (Internet Of Things)
IoT (Internet Of Things)
 
Internet of Things(IoT)
Internet of Things(IoT)Internet of Things(IoT)
Internet of Things(IoT)
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Internet of things applications covering industrial domain
Internet of things applications covering industrial domainInternet of things applications covering industrial domain
Internet of things applications covering industrial domain
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things
 
Beacon Basics
Beacon BasicsBeacon Basics
Beacon Basics
 
Internet+of+things+iot+learn+faster+the+io t+
Internet+of+things+iot+learn+faster+the+io t+Internet+of+things+iot+learn+faster+the+io t+
Internet+of+things+iot+learn+faster+the+io t+
 

Destacado

Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!Mike Brannon
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013Mike Brannon
 
SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013Mike Brannon
 
NGC records management - SP2010 RM Features
NGC records management - SP2010 RM FeaturesNGC records management - SP2010 RM Features
NGC records management - SP2010 RM FeaturesMike Brannon
 
BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessMike Brannon
 
Mobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMike Brannon
 
Smartphone security
Smartphone securitySmartphone security
Smartphone securityMike Brannon
 
Search for Overview for SC Upstate SP users
Search for Overview for SC Upstate SP usersSearch for Overview for SC Upstate SP users
Search for Overview for SC Upstate SP usersMike Brannon
 

Destacado (8)

Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 
SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013
 
NGC records management - SP2010 RM Features
NGC records management - SP2010 RM FeaturesNGC records management - SP2010 RM Features
NGC records management - SP2010 RM Features
 
BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with business
 
Mobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not Repressive
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Search for Overview for SC Upstate SP users
Search for Overview for SC Upstate SP usersSearch for Overview for SC Upstate SP users
Search for Overview for SC Upstate SP users
 

Similar a Mobile Devices Securely Accessing SharePoint

LANDesk Mobility Manager
LANDesk Mobility ManagerLANDesk Mobility Manager
LANDesk Mobility ManagerInfraVision
 
Mobility manager 90
Mobility manager 90Mobility manager 90
Mobility manager 90Axle-IT
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Securitynexxtep
 
Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15Chris Beauchamp
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy AnkitThakkar46
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)shashankvaidyar2
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxArrow ECS UK
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Internet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersInternet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersFIITJEE PU College
 

Similar a Mobile Devices Securely Accessing SharePoint (20)

Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
LANDesk Mobility Manager
LANDesk Mobility ManagerLANDesk Mobility Manager
LANDesk Mobility Manager
 
Mobility manager 90
Mobility manager 90Mobility manager 90
Mobility manager 90
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15
 
Byod
ByodByod
Byod
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptx
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Internet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersInternet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginners
 

Último

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Último (20)

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Mobile Devices Securely Accessing SharePoint

  • 1. SECURE Mobile Access to SharePoint Mobile Devices (iPads! iPhones! Android!)Access SharePoint
  • 2. SecureMobile Access To SharePoint 1 3 2 What Is The Issue Here? Technology Overview What Did NGC Do? Integrating Policy, Supporting Technology And SharePoint
  • 3. Post PC Issue/ Opportunity Your Users / Customers Want Mobile Access – Non-PC Devices Will Take Over Someday… 1
  • 4. Mobile AccessSharePoint, eMail – Work Resources!! Powerful Smartphones and Tablets Are More Mobile Than Many PCs People Want Mobile Access Now – MORE In Future!!
  • 5. Mobile DevicesShiny New Devices – Few Blackberries… Powerful Inexpensive Devices Old Deployment Models Gone
  • 6. Mobile DevicesHUGE Technical Differences Matter! Closed Basis For Mobile Devices (Apple, Carriers) Very Different From PC Your Employees, Partners, Customers (and Providers) OWN Devices – Not IT! Want Mobile Access (From Home, Coffee Shop, AND On Your Wireless LAN) New Types of Risks and Threats – HUGE Issues With Lost / Stolen Devices App Store Models – “There’s An App For That!!”
  • 7. 2 NGC Our Challenges, Our Solution (So Far) Establish Policy and Technical Controls – Facilitate Adoption (with Proper Security)
  • 8. Critical Security Policies Enrolled Connections Required SSL VPN / ActiveSync Protection Theft / Tamper Protection PIN/Passcodes Required Inactivity Timeout Wipe Data after guesses Device / Business Data Encryption Protect Data On Device Protect Device Backup (iTunes) Remote Wipe For Lost/Stolen Devices “Find My Phone” Ideal…
  • 9. “Nice To Have” Device Policies Simple, Self-Service Deployment Secure But Simple For People “Managed” App Store Links / App Delivery App Blacklist / Whitelist “Manage Device Features” Centrally Camera Allowed / Disallowed? Wireless LAN – Other Configs. One Policy – Across Many Devices iOS, Android, Windows, Etc…
  • 10. Very Important PIN Policy! Can Become Issue – BALANCE Needed Secure But Simple For People Just Long Enough To Work Six to Eight Characters Auto Lock After No Active Use 30 minutes max – Devices Vary Ten Tries – Then Wipe Biz Data Warnings Stop “Butt Dial” No PIN Expiration Controls Not Network (AD) Passwords Those Credentials Embedded?
  • 11. How Can We Enforce This? Mobile Email Access (Addiction?) People NEED Their Email Security/Controls Needed On Devices Protect Data / Control Access Deploy “Email Locks” Tied To MDM MobileIron Sentry for NGC Update Company Policy / Forms Employee Acceptance Needed Agree To Device Management Agree To Possible “Wipe” Enrollment/Controls In Place
  • 12. 3 Demo: Technology Overview NGC Solutions: Device MDM/Policy via MobileIron, SSL VPN via Juniper SA / Junos Pulse
  • 13.
  • 14.
  • 15.
  • 16. Agent Interaction Updates, Profiles, Certificates Report Dropped Calls Check Data Speeds iOS Only Features Links to iTunes App Store App Delivery Direct to iOS
  • 17. iOS “App Store” Links to Apple Store Point to Apps You Select Define/Deliver Internal Apps Without App Store (From Your System)
  • 18. Privacy Issues Mobile Intelligence / Activity Monitoring Features Track Cell Tower Connections / Location of Device Collect Call Logs and All SMS Messages Set To Ignore Calls/SMS and Track “Current Location” Only Concerns About Collecting Data and Controls / Management Not Presently Any Security / Business Requirements
  • 19. Mobile Expense - International Roaming Alerts Detect International Roaming Send Text Message Alert Send Alert to IT Admins Update Plans / Activity
  • 20. Access To SharePoint – Juniper/Junos VPN SSL VPN for PCs Users Already Know It Flexible Authentication RSA SecurdID / AD / etc. Very Good Controls – From Full VPN Tunnel to Simple One Site Link
  • 21. Access To SharePoint – AircreekFilamente Detect International Roaming Send Text Message Alert
  • 24. Filamente Document Actions / Upload Content
  • 25. References Surveys - Sybase SurveyTelenav Survey MobileIron Picking PIN Policy - Perimeter Jaquith Blog - NIST 800-63 iPhone Password Brute Force CNN Money http://money.cnn.com/galleries/2011/technology/1108/gallery.cybersecurity_tidbits/ Dino Dai Zovi -http://trailofbits.com/2011/08/10/ios-4-security-evaluation/
  • 26. POWERPOINT 2010 What’s Your Message?