SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Securing Business Mobility

Today’s Best Practices: How smart business is protecting
enterprise data integrity—and employee privacy—on popular
mobile devices




                    Your
                    Device
                    Here.
                    Good supports
                    hundreds of devices.
Contents


    Mobility Is Shifting Terrain                             2

    Enterprise Mobility: Security Level Red                  2

    The Good Solution                                        3

       Protect Enterprise Integrity, Employee Privacy        3

       Maintain Consistent, Centralized Control              3

       Prevent Rogue Device Network Access                   3

    Good Security Architecture                               4

    Good Security Model                                      4

       Authentication                                        4

       Data Protection                                       4

       Enforcing Access Controls                             4

       Securing Network Access                               5

       Securing the Platform                                 5

    Good Assurance                                           5




Good Technology   866-7-BE-GOOD   www.good.com          Securing Business Mobility   1
Mobility is shifting terrain
    It’s the price of portability. No longer does today’s workforce simply require access to business email,
    calendar functions, and contacts while out of the office. Because work and life are now more fluid than
    ever, people are working at literally any hour of the day or night—and anywhere a smart device can pick up
    a signal. True employee collaboration requires a broader suite of mobile solutions.

    Mobile phones have evolved into ultra-intelligent, and highly portable, mobile computers with sophisticated
    operating systems and the ability to connect to networks and applications. In the larger evolutionary picture,
    smart tablets are also now firmly entrenched in today’s mobile business scenarios.

    Agile businesses are now connecting employees, partners, and suppliers—no matter how remote—to
    Intranets, Web-enabled enterprise applications, document sharing, corporate instant messaging services,
    a broader range of collaboration tools, and, soon, custom, in-house-developed applications. All with
    appropriate security and control. At least, that’s the hope.

    Another key trend: Price points for both smart mobile devices and associated data plans continue to fall, so
    most employees are already equipped with the popular devices of their choice. What does this mean for
    CIOs and CFOs? The ability to shave millions from enterprise budgets that have traditionally been spent on
    devices and data plans.

    While these trends represent an opportunity for smart businesses to rapidly accelerate the pace of business
    and reduce costs, they also represent significant security challenges.



                            Contacts                                                             Your
         Browser 
         Access                              Voice Mail                                          Device
                                                                                                 Here.
                           Calendar
                                                                                                 Good supports 
                                                                                                               
          E-mail                             Document                                            hundreds of 
                                             Sharing                                             devices.

                            IM & SN
                                                                                              Anytime Anywhere




    Enterprise mobility: Security level red
    CIOs consistently rank security as one of their top IT priorities. As well they should. Today’s heightened
    security conditions in both the analog and digital worlds add to the likelihood of mobile security threats.
    Misplaced devices. Lost devices. Stolen devices. But today’s smart phones and tablets present additional
    challenges to IT administrators taxed with safeguarding enterprise infrastructure, applications, and data.
    As more employees buy their own devices and carrier plans, the consumerization of IT – or the access
    of corporate information by personal applications, Web services, and mobile hardware – is increasingly
    prevalent. To be more productive out of the office, employees frequently, and unwittingly, forward their email
    and documents to their personal Webmail accounts, inadvertently undermining IT security policies. In most



Good Technology     866-7-BE-GOOD      www.good.com                         Securing Business Mobility               2
cases, employees are simply unaware of the potential risks of enterprise data loss. Or they may be naive as
    to IT’s policies themselves. So while the IT consumerization trend presents businesses with the potential
    for tremendous cost savings, it has also introduced serious security risks for enterprises and government
    agencies alike, at the application level, the device level, the over-the-air level, and the enterprise network
    (perimeter) level. Before business mobility can be fully embraced, these obstacles must be overcome.



    The Good Solution
    Good Technology recognizes that managing business data security in today’s modern workplace is a huge
    undertaking—especially when it calls for securely providing employees with the information they need and
    the flexibility they want. To date, Good has satisfied the needs of the most demanding customers, including
    defense and intelligence agencies; companies in regulated industries such as financial services, healthcare,
    legal, and professional services; and many enterprises in high technology, retail, manufacturing, and other
    verticals. Good has developed a security model that addresses the safety of every part of the infrastructure.

    The model is built on three main tenets:

    1. Respect enterprise data integrity as well as employee
       privacy. The sheer number of device types that combine a
       variety of untrusted consumer applications, personalization
       capabilities, and business data leads to tremendous
       challenges in maintaining the confidentiality and integrity of
       enterprise content. Good limits business risk associated with
       enterprise data on mobile devices by “containerizing” the data
       (which leaves employees’ private information untouched) and       Personal                     Business
       enforcing policies and compliance at the application level.         Data                         Data
    2. Maintain consistent, centralized control. Enterprises
       and government agencies are struggling to maintain
       centralization and enforce consistent security policies
       on all enterprise content in environments with different
       devices, different security approaches, and different
       operating systems. As your business expands to support
       personal devices and data plans, you must change the way
       you approach control.                                               Good’s security container separates
                                                                           company and personal information.
    3. Prevent rogue device network access. The scope and
       number of mobile devices employees use today opens the
       possibility that devices may be replicated and rogue devices
       could potentially access the corporate network. Because these
       devices aren’t authorized, they may or may not be following
       corporate security policies. Chances are, they’re not. Without
       visibility into all the devices on the network, IT simply can’t
       ensure the integrity of corporate data.




Good Technology      866-7-BE-GOOD         www.good.com                     Securing Business Mobility               3
Good Security Architecture
    Good Technology’s flagship product, Good for Enterprise, is a comprehensive platform providing
    secure end-to-end, wireless, real-time messaging, collaboration, and Intranet access supported by
    comprehensive device management and security. Good has developed a proven architecture that
    can help you overcome the challenges you face in embracing enterprise mobility. At the core of Good’s
    architecture is a robust security model that helps you enable consumer-owned devices, and consequently
    increase employee productivity. You can also continue to deploy corporate-owned smart devices, while
    maintaining high levels of security and assurance in both device populations.

    Good for Enterprise provides mobile professionals with up-to-date collaboration, connectivity, and access
    when and where they need it, while giving IT the means to secure and manage a diverse fleet of smart
    devices. The data path through the Good system is encrypted end-to-end: from the enterprise servers behind
    the firewall, over the air, and all the way to wireless handhelds.




    Good Security Model
    The growing use of smart devices extends the corporate network beyond the physical boundaries of the
    enterprise, and places the endpoint of the network outside the firewall. Using public and carrier networks
    to transmit data raises a multitude of security issues, some of which have already been described.

    Good has developed an optimum security model, with five key elements:

    1. Authentication. Good provides you with the administration tools necessary to define strong
       authentication policies, enforced consistently across platforms. You have the flexibility to enforce
       passwords at the device level, for corporate-issued devices, or at the Good application level, for
       personally owned devices. Also, you can define policies to wipe the Good application and all its data
       (and on some device platforms, wipe the entire device), for an employee’s failure to provide the correct
       password after a set number of failed attempts or if a device is lost or stolen. Strong policies let you
       disable sequential numbers in passwords, require special characters, and more. When you deploy
       strong over-the-air (OTA) policies, only employees that are authenticated can connect to the Good
       Network Operations Center (NOC).

    2. Data Protection. With Good for Enterprise, you can be confident your business data is protected
       even when your data shares the same device with any number of consumer applications. It’s possible
       because of the Good enterprise container, an encrypted cocoon that securely houses enterprise data
       and applications on the device, which encrypts all data with strong AES 192-bit encryption. The Good
       solution also encrypts any data that’s in transit between the device and servers behind your firewall. So
       the data protection extends all the way from the firewall to the device — irrespective of whether the device
       is company-owned or employee-owned.

    3. Enforcing Access Controls. The Good platform lets administrators restrict access to Good servers,
       based on a particular device OS and/or Good client version number. Additionally, Good provides the
       capacity to control access to networks from the device, including Bluetooth. On the server side, IT can
       distribute management tasks across a hierarchy of administrators using role-based administration that


Good Technology    866-7-BE-GOOD        www.good.com                        Securing Business Mobility                4
offers a set of roles—with varying permissions—for administering the Good server and employee devices.
      Routine tasks, such as loading software, can be delegated to a wider group of administrators across
      multiple locations. More restricted tasks, such as setting global policies or remotely erasing a handheld
      when lost or stolen, can be limited to a smaller group.

    4. Securing Network Access. Good servers establish an outbound connection to the enterprise firewall,
       so there’s no need to open inbound ports and expose the enterprise network to attack. In addition,
       network traffic between the device and the server is always encrypted with AES 192-bit encryption. The
       NOC only services encrypted packets, so it provides the additional functionality of authenticating devices
       to the network, granting access only to devices that have been provisioned to access their respective
       servers and services—thus preventing rogue devices from gaining access to the network.

    5. Securing the Platform. Good provides strong protections on each platform, with policy controls that
       include strong encryption of data (OTA and at rest), full device wipe, application white-listing/black-
       listing, preventing applications from being installed or registry settings from being changed, and detecting
       jailbroken or rooted devices. On some device platforms, Good can offer granular Bluetooth profile
       management, disabling transfers and LAN access through the Bluetooth network, while allowing devices
       (such as headsets) to pair with the device. On iOS devices, Good provides policies to prevent access to
       the App Store, YouTube, the Safari browser and more, if needed by your business.



    Good Assurance
    Good’s cryptography has been successfully tested by NIST-approved labs and certified to be compliant
    with FIPS 140-2 Level 1. Additionally, intelligence agencies and defense organizations such as the Defense
    Information Systems Agency (DISA), the US Army, the US Air Force, and the Department of Homeland
    Security (DHS) have tested the Good product and approved it for their most sensitive deployments.

    When deployed securely, smart device and mobile application technologies can improve your business
    processes and yield substantial ROI with lower TCO. You can make your workforce more productive and
    responsive with the assurance that you’re not compromising sensitive data or incurring unnecessary costs.




       To learn more about Good solutions, visit good.com/demos or call 866-7-BE-GOOD.




Good Technology    866-7-BE-GOOD       www.good.com                        Securing Business Mobility                 5

Más contenido relacionado

La actualidad más candente

Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Serviceswhite paper
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Securityijtsrd
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2olambel
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Essential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscapeEssential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscapeUnified Communications Online
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureArrow ECS UK
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 

La actualidad más candente (20)

Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Services
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
188
188188
188
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Essential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscapeEssential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscape
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD Brochure
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 

Similar a Good Security Whitepaper

10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicCitrix
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityCitrix
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochureDan Smith
 

Similar a Good Security Whitepaper (20)

10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Securing mobile devices 1
Securing mobile devices 1Securing mobile devices 1
Securing mobile devices 1
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochure
 

Good Security Whitepaper

  • 1. Securing Business Mobility Today’s Best Practices: How smart business is protecting enterprise data integrity—and employee privacy—on popular mobile devices Your Device Here. Good supports hundreds of devices.
  • 2. Contents Mobility Is Shifting Terrain 2 Enterprise Mobility: Security Level Red 2 The Good Solution 3 Protect Enterprise Integrity, Employee Privacy 3 Maintain Consistent, Centralized Control 3 Prevent Rogue Device Network Access 3 Good Security Architecture 4 Good Security Model 4 Authentication 4 Data Protection 4 Enforcing Access Controls 4 Securing Network Access 5 Securing the Platform 5 Good Assurance 5 Good Technology 866-7-BE-GOOD www.good.com Securing Business Mobility 1
  • 3. Mobility is shifting terrain It’s the price of portability. No longer does today’s workforce simply require access to business email, calendar functions, and contacts while out of the office. Because work and life are now more fluid than ever, people are working at literally any hour of the day or night—and anywhere a smart device can pick up a signal. True employee collaboration requires a broader suite of mobile solutions. Mobile phones have evolved into ultra-intelligent, and highly portable, mobile computers with sophisticated operating systems and the ability to connect to networks and applications. In the larger evolutionary picture, smart tablets are also now firmly entrenched in today’s mobile business scenarios. Agile businesses are now connecting employees, partners, and suppliers—no matter how remote—to Intranets, Web-enabled enterprise applications, document sharing, corporate instant messaging services, a broader range of collaboration tools, and, soon, custom, in-house-developed applications. All with appropriate security and control. At least, that’s the hope. Another key trend: Price points for both smart mobile devices and associated data plans continue to fall, so most employees are already equipped with the popular devices of their choice. What does this mean for CIOs and CFOs? The ability to shave millions from enterprise budgets that have traditionally been spent on devices and data plans. While these trends represent an opportunity for smart businesses to rapidly accelerate the pace of business and reduce costs, they also represent significant security challenges. Contacts Your Browser  Access Voice Mail Device Here. Calendar Good supports    E-mail Document hundreds of  Sharing devices. IM & SN Anytime Anywhere Enterprise mobility: Security level red CIOs consistently rank security as one of their top IT priorities. As well they should. Today’s heightened security conditions in both the analog and digital worlds add to the likelihood of mobile security threats. Misplaced devices. Lost devices. Stolen devices. But today’s smart phones and tablets present additional challenges to IT administrators taxed with safeguarding enterprise infrastructure, applications, and data. As more employees buy their own devices and carrier plans, the consumerization of IT – or the access of corporate information by personal applications, Web services, and mobile hardware – is increasingly prevalent. To be more productive out of the office, employees frequently, and unwittingly, forward their email and documents to their personal Webmail accounts, inadvertently undermining IT security policies. In most Good Technology 866-7-BE-GOOD www.good.com Securing Business Mobility 2
  • 4. cases, employees are simply unaware of the potential risks of enterprise data loss. Or they may be naive as to IT’s policies themselves. So while the IT consumerization trend presents businesses with the potential for tremendous cost savings, it has also introduced serious security risks for enterprises and government agencies alike, at the application level, the device level, the over-the-air level, and the enterprise network (perimeter) level. Before business mobility can be fully embraced, these obstacles must be overcome. The Good Solution Good Technology recognizes that managing business data security in today’s modern workplace is a huge undertaking—especially when it calls for securely providing employees with the information they need and the flexibility they want. To date, Good has satisfied the needs of the most demanding customers, including defense and intelligence agencies; companies in regulated industries such as financial services, healthcare, legal, and professional services; and many enterprises in high technology, retail, manufacturing, and other verticals. Good has developed a security model that addresses the safety of every part of the infrastructure. The model is built on three main tenets: 1. Respect enterprise data integrity as well as employee privacy. The sheer number of device types that combine a variety of untrusted consumer applications, personalization capabilities, and business data leads to tremendous challenges in maintaining the confidentiality and integrity of enterprise content. Good limits business risk associated with enterprise data on mobile devices by “containerizing” the data (which leaves employees’ private information untouched) and Personal Business enforcing policies and compliance at the application level. Data Data 2. Maintain consistent, centralized control. Enterprises and government agencies are struggling to maintain centralization and enforce consistent security policies on all enterprise content in environments with different devices, different security approaches, and different operating systems. As your business expands to support personal devices and data plans, you must change the way you approach control. Good’s security container separates company and personal information. 3. Prevent rogue device network access. The scope and number of mobile devices employees use today opens the possibility that devices may be replicated and rogue devices could potentially access the corporate network. Because these devices aren’t authorized, they may or may not be following corporate security policies. Chances are, they’re not. Without visibility into all the devices on the network, IT simply can’t ensure the integrity of corporate data. Good Technology 866-7-BE-GOOD www.good.com Securing Business Mobility 3
  • 5. Good Security Architecture Good Technology’s flagship product, Good for Enterprise, is a comprehensive platform providing secure end-to-end, wireless, real-time messaging, collaboration, and Intranet access supported by comprehensive device management and security. Good has developed a proven architecture that can help you overcome the challenges you face in embracing enterprise mobility. At the core of Good’s architecture is a robust security model that helps you enable consumer-owned devices, and consequently increase employee productivity. You can also continue to deploy corporate-owned smart devices, while maintaining high levels of security and assurance in both device populations. Good for Enterprise provides mobile professionals with up-to-date collaboration, connectivity, and access when and where they need it, while giving IT the means to secure and manage a diverse fleet of smart devices. The data path through the Good system is encrypted end-to-end: from the enterprise servers behind the firewall, over the air, and all the way to wireless handhelds. Good Security Model The growing use of smart devices extends the corporate network beyond the physical boundaries of the enterprise, and places the endpoint of the network outside the firewall. Using public and carrier networks to transmit data raises a multitude of security issues, some of which have already been described. Good has developed an optimum security model, with five key elements: 1. Authentication. Good provides you with the administration tools necessary to define strong authentication policies, enforced consistently across platforms. You have the flexibility to enforce passwords at the device level, for corporate-issued devices, or at the Good application level, for personally owned devices. Also, you can define policies to wipe the Good application and all its data (and on some device platforms, wipe the entire device), for an employee’s failure to provide the correct password after a set number of failed attempts or if a device is lost or stolen. Strong policies let you disable sequential numbers in passwords, require special characters, and more. When you deploy strong over-the-air (OTA) policies, only employees that are authenticated can connect to the Good Network Operations Center (NOC). 2. Data Protection. With Good for Enterprise, you can be confident your business data is protected even when your data shares the same device with any number of consumer applications. It’s possible because of the Good enterprise container, an encrypted cocoon that securely houses enterprise data and applications on the device, which encrypts all data with strong AES 192-bit encryption. The Good solution also encrypts any data that’s in transit between the device and servers behind your firewall. So the data protection extends all the way from the firewall to the device — irrespective of whether the device is company-owned or employee-owned. 3. Enforcing Access Controls. The Good platform lets administrators restrict access to Good servers, based on a particular device OS and/or Good client version number. Additionally, Good provides the capacity to control access to networks from the device, including Bluetooth. On the server side, IT can distribute management tasks across a hierarchy of administrators using role-based administration that Good Technology 866-7-BE-GOOD www.good.com Securing Business Mobility 4
  • 6. offers a set of roles—with varying permissions—for administering the Good server and employee devices. Routine tasks, such as loading software, can be delegated to a wider group of administrators across multiple locations. More restricted tasks, such as setting global policies or remotely erasing a handheld when lost or stolen, can be limited to a smaller group. 4. Securing Network Access. Good servers establish an outbound connection to the enterprise firewall, so there’s no need to open inbound ports and expose the enterprise network to attack. In addition, network traffic between the device and the server is always encrypted with AES 192-bit encryption. The NOC only services encrypted packets, so it provides the additional functionality of authenticating devices to the network, granting access only to devices that have been provisioned to access their respective servers and services—thus preventing rogue devices from gaining access to the network. 5. Securing the Platform. Good provides strong protections on each platform, with policy controls that include strong encryption of data (OTA and at rest), full device wipe, application white-listing/black- listing, preventing applications from being installed or registry settings from being changed, and detecting jailbroken or rooted devices. On some device platforms, Good can offer granular Bluetooth profile management, disabling transfers and LAN access through the Bluetooth network, while allowing devices (such as headsets) to pair with the device. On iOS devices, Good provides policies to prevent access to the App Store, YouTube, the Safari browser and more, if needed by your business. Good Assurance Good’s cryptography has been successfully tested by NIST-approved labs and certified to be compliant with FIPS 140-2 Level 1. Additionally, intelligence agencies and defense organizations such as the Defense Information Systems Agency (DISA), the US Army, the US Air Force, and the Department of Homeland Security (DHS) have tested the Good product and approved it for their most sensitive deployments. When deployed securely, smart device and mobile application technologies can improve your business processes and yield substantial ROI with lower TCO. You can make your workforce more productive and responsive with the assurance that you’re not compromising sensitive data or incurring unnecessary costs. To learn more about Good solutions, visit good.com/demos or call 866-7-BE-GOOD. Good Technology 866-7-BE-GOOD www.good.com Securing Business Mobility 5