SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
Locking Down the Risks
from Unlocked Devices
Presented by:
Troy Fulton
Director, Product Marketing
Wednesday, February 20, 2013
© 2013 Tangoe, Inc.

Thursday, February 21, 2013
Today‟s Speaker
Troy Fulton
Director, MDM Product Marketing
• 20+ years in high-tech and communications devices

• Senior product marketing and management positions
with global corporations including Motorola Mobility,
Nokia, and Compaq

• MBA from The College of William and Mary; BA from
Boston College

© 2013 Tangoe, Inc.

2
Agenda
• Definitions
• What is Illegal
• Key Takeaways
• Risk & Mitigation
• Summary
• Q&A

© 2013 Tangoe, Inc.

3
Definitions: Unlocking
• Enables a device to work on a wireless carrier other than the one device
was purchased from
•

If an AT&T iPhone were unlocked, it could be used on T-Mobile USA's network

• In October, the U.S. Library of Congress invalidated a copyright
exemption in the Digital Millennium Copyright Act for unlocking

cell phones
• Unlocking a device is potentially illegal, unless authorized
by a carrier
• Civil fines range from $200 to $2,500 per unlock
• Criminal penalties up to $500,000 and five years in jail.
• http://bits.blogs.nytimes.com/2013/01/25/cellphone-unlock-dmca/
• Unauthorized unlocking requires the device to be jailbroken

© 2013 Tangoe, Inc.

4
Definitions: Jailbreak
• Pertains to iOS devices
• Allows applications not approved by Apple to be downloaded from any
source
• Removes the security controls which prevent access to data on a device by
unauthorized people and applications
• Process of removing the sandbox protections that Apple places in its iOS
products
• Enables users to access files they normally wouldn't be permitted to, which
opens up all sorts of possibilities for customizing an iOS system

• Many technically inclined users loathe being
locked into a sandboxed device

© 2013 Tangoe, Inc.

5
Definitions: Root
• Pertains to Android devices
• Android, unlike Apple, is an open source operating system
• Android out of the box allows users to install 3rd party apps (also known as
sideloading)
• User can install themes
• Allows the install of applications directly from SD card or internal memory of
device
• Everything IOS users hope to accomplish with jailbreaking is basic functionality
within Android

• Rooting overcomes limitations carriers and OEMS put
on devices (skins, etc.)
• COMPLETELY remove and replace the entire
operating system of the device

© 2013 Tangoe, Inc.

6
What Has Been Reported to be Illegal
• Unlocking without carrier permission
• A common example….
• Use device as an Internet hotspot
• Switch to a local carrier when traveling overseas to avoid roaming charges

• In Europe, unlocked phones function as you might expect.
• You buy a phone and obtain a SIM card from the network you have chosen, and the phone
registers on that network
• Want to change networks? Get a different SIM and swap it out
• Why does this work?
•

Network operators share the same three portions of the spectrum and support GSM
(3G) and LTE (4G).

• In the U.S. carriers enable different features on their smartphones
• Support differentiated mobile experiences
• Support competing 3G and 4G wireless communication
standards at different spectrum frequencies

© 2013 Tangoe, Inc.

7
Key Takeaways: Unlocking
• New carrier = non-optimized usage rates
• Unlocking can also interfere with your phone‟s settings
• Features previously enabled will not likely function
• Phone warranty voided
• Jailbreaking attracts malware and decrypts data

• This law does not eliminate the practice of unlocking phones
• Does not prevent unlocked phones from entering corporate networks

• Organization may be held liable for an employee‟s unlocked device

© 2013 Tangoe, Inc.

8
Key Takeaways: Jailbreak vs. Rooted
• Sandbox protection for apps is removed
• Every app can get to everything
• iOS and Android apps designed not to share data

• Jailbreaking decrypts data on the device
• Bypasses device password
• Android app developers can store data in cipher text (optional)
•

If not, encrypted device data may be stored in plain text if you PC synch

• Jailbroken vs. rooted
• iOS: apps must utilize the Data Protection APIs to maintain encryption
•

Password protection enables data encryption

•

NSS Labs: possible to jailbreak an iOS device and completely bypass the passcode

•

Jailbroken phones are more vulnerable to malware

• Android: device password enables full file system encryption
•

Modifying the bootloader or OS is not sufficient to access data without the password

•

Rooting decrypts all data. Google recommends an OEM hardware solution

© 2013 Tangoe, Inc.

9
Risks and Mitigation
• Device is lost or stolen
• Exposed data…all of it
• SMS/iMessage texts
• Address book, calendar, email….

• VPN
• Secure communication but is the device secure?

• Access to enterprise resources
• Need mobile anti-virus

• Mitigate risks
• Monitor with automatic policy response
•

Carrier and application

• Mobile content management
• Containerization

• ABQ
© 2013 Tangoe, Inc.

10
Secure Mobile Content Management
• Enforce security for
device-based

Corporate
Document
Stores

access
• Manage distribution
authority
• Enforce DLP via
cut/paste features
• Manage document

Native, 3rd
Party
Editing
Tools

Mobile
Content
Management

version control &
redundancy

Device
Continuum

© 2013 Tangoe, Inc.

Simple,
Private
File
Sharing
Mobile Device Containerization

Tap to access Divide
•
•
•

Enter passcode

Get to work!
•
•
•

Personal phone, SMS and web
Choice of device, services
Freedom & privacy

Data security
Enterprise apps & services
Easy to manage and control

• Separate corporate data from personal data
• Allow „personal data‟ to co-exist
• Provide controls over corporate data
© 2013 Tangoe, Inc.

12
Secure Network Access: THE BYOD Solution
• Real-time detection and enforcement
• Detect and quarantine unknown devices
• Self-Service Device Enrollment Modules
• Guest Access Management
• Non-Browser Device Registration

• MDM Policy Enforcement
• MDM Self-Registration process integrated with NAC-based Policy
Enforcement
• NAC-based MDM Policy Enforcement and Remediation Messaging

13
© 2013 Tangoe, Inc.
Summary
• Terms and conditions should clearly describe the penalties for unlocking

• Know your environment
• SANS Institute IT Survey: 9% are “fully aware” of all mobile devices on their network

• Lifecycle of smartphones and tablets is very short: 12 – 18 months
• Do not be fooled…if no controls, there is sensitive data on the device

• Make (sustainable) decisions
• If you do not define policy, employees will

• Never store confidential corporate data on an unencrypted device
• No corporate business through the use of personal accounts
• Prohibit sending emails from your corporate address to private email accounts

• Lock down any device assigned to an employee, including remote wipe
• Secure communication to the device

• Block device access to ActiveSync for non-compliance
• Have a recycling program
© 2013 Tangoe, Inc.

14
Questions and Contacts
Troy Fulton
Director, Product Marketing
Troy.Fulton@tangoe.com

Tangoe
203.859.9300
info@tangoe.com
www.tangoe.com

© 2013 Tangoe, Inc.

15

Más contenido relacionado

La actualidad más candente

IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
ijcsit
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
jpmccormack
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
charvill
 

La actualidad más candente (20)

Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
File000093
File000093File000093
File000093
 
The Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityThe Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT Security
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phones
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
 
Sample IT Policy
Sample IT PolicySample IT Policy
Sample IT Policy
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Intro to information security
Intro to information securityIntro to information security
Intro to information security
 
The role and impact of IT in society
The role and impact of IT in societyThe role and impact of IT in society
The role and impact of IT in society
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Blackberry final
Blackberry finalBlackberry final
Blackberry final
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Security is sexy again
Security is sexy againSecurity is sexy again
Security is sexy again
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile world
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 

Similar a Locking down risks from unlocked devices

Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
STO STRATEGY
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
mkeane
 

Similar a Locking down risks from unlocked devices (20)

Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Android vs iOS encryption systems
Android vs iOS encryption systemsAndroid vs iOS encryption systems
Android vs iOS encryption systems
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Towards a Responsible Internet of Things
Towards a Responsible Internet of ThingsTowards a Responsible Internet of Things
Towards a Responsible Internet of Things
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile Device
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Locking down risks from unlocked devices

  • 1. Locking Down the Risks from Unlocked Devices Presented by: Troy Fulton Director, Product Marketing Wednesday, February 20, 2013 © 2013 Tangoe, Inc. Thursday, February 21, 2013
  • 2. Today‟s Speaker Troy Fulton Director, MDM Product Marketing • 20+ years in high-tech and communications devices • Senior product marketing and management positions with global corporations including Motorola Mobility, Nokia, and Compaq • MBA from The College of William and Mary; BA from Boston College © 2013 Tangoe, Inc. 2
  • 3. Agenda • Definitions • What is Illegal • Key Takeaways • Risk & Mitigation • Summary • Q&A © 2013 Tangoe, Inc. 3
  • 4. Definitions: Unlocking • Enables a device to work on a wireless carrier other than the one device was purchased from • If an AT&T iPhone were unlocked, it could be used on T-Mobile USA's network • In October, the U.S. Library of Congress invalidated a copyright exemption in the Digital Millennium Copyright Act for unlocking cell phones • Unlocking a device is potentially illegal, unless authorized by a carrier • Civil fines range from $200 to $2,500 per unlock • Criminal penalties up to $500,000 and five years in jail. • http://bits.blogs.nytimes.com/2013/01/25/cellphone-unlock-dmca/ • Unauthorized unlocking requires the device to be jailbroken © 2013 Tangoe, Inc. 4
  • 5. Definitions: Jailbreak • Pertains to iOS devices • Allows applications not approved by Apple to be downloaded from any source • Removes the security controls which prevent access to data on a device by unauthorized people and applications • Process of removing the sandbox protections that Apple places in its iOS products • Enables users to access files they normally wouldn't be permitted to, which opens up all sorts of possibilities for customizing an iOS system • Many technically inclined users loathe being locked into a sandboxed device © 2013 Tangoe, Inc. 5
  • 6. Definitions: Root • Pertains to Android devices • Android, unlike Apple, is an open source operating system • Android out of the box allows users to install 3rd party apps (also known as sideloading) • User can install themes • Allows the install of applications directly from SD card or internal memory of device • Everything IOS users hope to accomplish with jailbreaking is basic functionality within Android • Rooting overcomes limitations carriers and OEMS put on devices (skins, etc.) • COMPLETELY remove and replace the entire operating system of the device © 2013 Tangoe, Inc. 6
  • 7. What Has Been Reported to be Illegal • Unlocking without carrier permission • A common example…. • Use device as an Internet hotspot • Switch to a local carrier when traveling overseas to avoid roaming charges • In Europe, unlocked phones function as you might expect. • You buy a phone and obtain a SIM card from the network you have chosen, and the phone registers on that network • Want to change networks? Get a different SIM and swap it out • Why does this work? • Network operators share the same three portions of the spectrum and support GSM (3G) and LTE (4G). • In the U.S. carriers enable different features on their smartphones • Support differentiated mobile experiences • Support competing 3G and 4G wireless communication standards at different spectrum frequencies © 2013 Tangoe, Inc. 7
  • 8. Key Takeaways: Unlocking • New carrier = non-optimized usage rates • Unlocking can also interfere with your phone‟s settings • Features previously enabled will not likely function • Phone warranty voided • Jailbreaking attracts malware and decrypts data • This law does not eliminate the practice of unlocking phones • Does not prevent unlocked phones from entering corporate networks • Organization may be held liable for an employee‟s unlocked device © 2013 Tangoe, Inc. 8
  • 9. Key Takeaways: Jailbreak vs. Rooted • Sandbox protection for apps is removed • Every app can get to everything • iOS and Android apps designed not to share data • Jailbreaking decrypts data on the device • Bypasses device password • Android app developers can store data in cipher text (optional) • If not, encrypted device data may be stored in plain text if you PC synch • Jailbroken vs. rooted • iOS: apps must utilize the Data Protection APIs to maintain encryption • Password protection enables data encryption • NSS Labs: possible to jailbreak an iOS device and completely bypass the passcode • Jailbroken phones are more vulnerable to malware • Android: device password enables full file system encryption • Modifying the bootloader or OS is not sufficient to access data without the password • Rooting decrypts all data. Google recommends an OEM hardware solution © 2013 Tangoe, Inc. 9
  • 10. Risks and Mitigation • Device is lost or stolen • Exposed data…all of it • SMS/iMessage texts • Address book, calendar, email…. • VPN • Secure communication but is the device secure? • Access to enterprise resources • Need mobile anti-virus • Mitigate risks • Monitor with automatic policy response • Carrier and application • Mobile content management • Containerization • ABQ © 2013 Tangoe, Inc. 10
  • 11. Secure Mobile Content Management • Enforce security for device-based Corporate Document Stores access • Manage distribution authority • Enforce DLP via cut/paste features • Manage document Native, 3rd Party Editing Tools Mobile Content Management version control & redundancy Device Continuum © 2013 Tangoe, Inc. Simple, Private File Sharing
  • 12. Mobile Device Containerization Tap to access Divide • • • Enter passcode Get to work! • • • Personal phone, SMS and web Choice of device, services Freedom & privacy Data security Enterprise apps & services Easy to manage and control • Separate corporate data from personal data • Allow „personal data‟ to co-exist • Provide controls over corporate data © 2013 Tangoe, Inc. 12
  • 13. Secure Network Access: THE BYOD Solution • Real-time detection and enforcement • Detect and quarantine unknown devices • Self-Service Device Enrollment Modules • Guest Access Management • Non-Browser Device Registration • MDM Policy Enforcement • MDM Self-Registration process integrated with NAC-based Policy Enforcement • NAC-based MDM Policy Enforcement and Remediation Messaging 13 © 2013 Tangoe, Inc.
  • 14. Summary • Terms and conditions should clearly describe the penalties for unlocking • Know your environment • SANS Institute IT Survey: 9% are “fully aware” of all mobile devices on their network • Lifecycle of smartphones and tablets is very short: 12 – 18 months • Do not be fooled…if no controls, there is sensitive data on the device • Make (sustainable) decisions • If you do not define policy, employees will • Never store confidential corporate data on an unencrypted device • No corporate business through the use of personal accounts • Prohibit sending emails from your corporate address to private email accounts • Lock down any device assigned to an employee, including remote wipe • Secure communication to the device • Block device access to ActiveSync for non-compliance • Have a recycling program © 2013 Tangoe, Inc. 14
  • 15. Questions and Contacts Troy Fulton Director, Product Marketing Troy.Fulton@tangoe.com Tangoe 203.859.9300 info@tangoe.com www.tangoe.com © 2013 Tangoe, Inc. 15