SlideShare una empresa de Scribd logo
1 de 26
SECURE Mobile Access to SharePoint Mobile Devices (iPads! iPhones! Android!)Access SharePoint
SecureMobile Access To SharePoint 1 3 2 What Is The Issue Here? Technology Overview What Did NGC Do? Integrating Policy, Supporting Technology And SharePoint
Post PC Issue/ Opportunity Your Users / Customers Want Mobile Access – Non-PC Devices Will Take Over Someday… 1
Mobile AccessSharePoint, eMail – Work Resources!! Powerful Smartphones and Tablets Are More Mobile Than Many PCs People Want Mobile Access Now – MORE In Future!!
Mobile DevicesShiny New Devices – Few Blackberries… Powerful Inexpensive Devices Old Deployment Models Gone
Mobile DevicesHUGE Technical Differences Matter! Closed Basis For Mobile Devices (Apple, Carriers) Very Different From PC Your Employees, Partners, Customers (and Providers) OWN Devices – Not IT! Want Mobile Access (From Home, Coffee Shop, AND On Your Wireless LAN) New Types of Risks and Threats – HUGE Issues With Lost / Stolen Devices App Store Models – “There’s An App For That!!”
2 NGC Our Challenges,         Our Solution (So Far) Establish Policy and Technical Controls – Facilitate Adoption (with Proper Security)
Critical Security Policies Enrolled Connections Required  SSL VPN / ActiveSync Protection Theft / Tamper Protection PIN/Passcodes Required Inactivity Timeout Wipe Data after guesses Device / Business Data Encryption Protect Data On Device Protect Device Backup (iTunes) Remote Wipe For Lost/Stolen Devices “Find My Phone” Ideal…
“Nice To Have” Device Policies Simple, Self-Service Deployment 	Secure But Simple For People “Managed” App Store Links / App Delivery App Blacklist / Whitelist “Manage Device Features” Centrally Camera Allowed / Disallowed? Wireless LAN – Other Configs. One Policy – Across Many Devices iOS, Android, Windows, Etc…
Very Important PIN Policy! Can Become Issue – BALANCE Needed 	Secure But Simple For People Just Long Enough To Work Six to Eight Characters Auto Lock After No Active Use 30 minutes max – Devices Vary Ten Tries – Then Wipe Biz Data  Warnings Stop “Butt Dial”  No PIN Expiration Controls  Not Network (AD) Passwords Those Credentials Embedded?
How Can We Enforce This? Mobile Email Access (Addiction?) People NEED Their Email Security/Controls Needed On Devices Protect Data / Control Access Deploy “Email Locks” Tied To MDM MobileIron Sentry for NGC Update Company Policy / Forms Employee Acceptance Needed Agree To Device Management Agree To Possible “Wipe” Enrollment/Controls In Place
3 Demo: Technology Overview NGC Solutions: Device MDM/Policy via MobileIron, SSL VPN via Juniper SA / Junos Pulse
Agent Interaction Updates, Profiles, Certificates Report Dropped Calls Check Data Speeds  iOS Only Features Links to iTunes App Store App Delivery Direct to iOS
iOS “App Store” Links to Apple Store Point to Apps You Select  Define/Deliver Internal Apps Without App Store (From Your System)
Privacy Issues Mobile Intelligence / Activity Monitoring Features Track Cell Tower Connections / Location of Device Collect Call Logs and All SMS Messages Set To Ignore Calls/SMS and Track “Current Location” Only Concerns About Collecting Data and Controls / Management Not Presently Any Security / Business Requirements
Mobile Expense -   International Roaming Alerts Detect International Roaming Send Text Message Alert  Send Alert to IT Admins Update Plans / Activity
Access To SharePoint – Juniper/Junos VPN SSL VPN for PCs Users Already Know It Flexible Authentication RSA SecurdID / AD / etc. Very Good Controls – From Full VPN Tunnel to Simple One Site Link
Access To SharePoint – AircreekFilamente Detect International Roaming Send Text Message Alert
Filamente Document Library / Previews
Filamente Document Actions / Access
Filamente Document Actions / Upload Content
References Surveys - Sybase SurveyTelenav Survey MobileIron Picking PIN Policy - Perimeter Jaquith Blog  - NIST 800-63 iPhone Password Brute Force CNN Money http://money.cnn.com/galleries/2011/technology/1108/gallery.cybersecurity_tidbits/ Dino Dai Zovi -http://trailofbits.com/2011/08/10/ios-4-security-evaluation/
POWERPOINT 2010 What’s Your Message?

Más contenido relacionado

La actualidad más candente

Internet of things –
Internet of things –Internet of things –
Internet of things –Mathews Job
 
Internet of Things and Quality Assurance
Internet of Things and Quality AssuranceInternet of Things and Quality Assurance
Internet of Things and Quality AssuranceKhubaib Rehman
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptxLamisaFaria
 
IoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical IssuesIoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical IssuesBugRaptors
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...AkshetPatel
 
How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012hemantchaskar
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 pptMhae Lyn
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of ThingsTushar Sharma
 
IoT (Internet Of Things)
IoT (Internet Of Things)IoT (Internet Of Things)
IoT (Internet Of Things)Şafak Saylam
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Amjat Shaikh
 
Internet of things applications covering industrial domain
Internet of things applications covering industrial domainInternet of things applications covering industrial domain
Internet of things applications covering industrial domainDev Bhattacharya
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-thingsJohn Soldatos
 
Internet+of+things+iot+learn+faster+the+io t+
Internet+of+things+iot+learn+faster+the+io t+Internet+of+things+iot+learn+faster+the+io t+
Internet+of+things+iot+learn+faster+the+io t+CDKTCaoThangBMDTCN
 

La actualidad más candente (20)

Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things –
Internet of things –Internet of things –
Internet of things –
 
Internet of Things and Quality Assurance
Internet of Things and Quality AssuranceInternet of Things and Quality Assurance
Internet of Things and Quality Assurance
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptx
 
WHAT IS IoT
WHAT IS IoTWHAT IS IoT
WHAT IS IoT
 
Internet of Things
Internet of Things Internet of Things
Internet of Things
 
IoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical IssuesIoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical Issues
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
 
How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012How BYOD Will Shape Wireless Network Security in 2012
How BYOD Will Shape Wireless Network Security in 2012
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of Things
 
IoT (Internet Of Things)
IoT (Internet Of Things)IoT (Internet Of Things)
IoT (Internet Of Things)
 
Internet of Things(IoT)
Internet of Things(IoT)Internet of Things(IoT)
Internet of Things(IoT)
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Internet of things applications covering industrial domain
Internet of things applications covering industrial domainInternet of things applications covering industrial domain
Internet of things applications covering industrial domain
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things01 internet-of-things-introduction-to-internet-of-things
01 internet-of-things-introduction-to-internet-of-things
 
Beacon Basics
Beacon BasicsBeacon Basics
Beacon Basics
 
Internet+of+things+iot+learn+faster+the+io t+
Internet+of+things+iot+learn+faster+the+io t+Internet+of+things+iot+learn+faster+the+io t+
Internet+of+things+iot+learn+faster+the+io t+
 

Destacado

Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!Mike Brannon
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013Mike Brannon
 
SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013Mike Brannon
 
NGC records management - SP2010 RM Features
NGC records management - SP2010 RM FeaturesNGC records management - SP2010 RM Features
NGC records management - SP2010 RM FeaturesMike Brannon
 
BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessMike Brannon
 
Mobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMike Brannon
 
Smartphone security
Smartphone securitySmartphone security
Smartphone securityMike Brannon
 
Search for Overview for SC Upstate SP users
Search for Overview for SC Upstate SP usersSearch for Overview for SC Upstate SP users
Search for Overview for SC Upstate SP usersMike Brannon
 

Destacado (8)

Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 
SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013SharePoint Best Practices Conference 2013
SharePoint Best Practices Conference 2013
 
NGC records management - SP2010 RM Features
NGC records management - SP2010 RM FeaturesNGC records management - SP2010 RM Features
NGC records management - SP2010 RM Features
 
BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with business
 
Mobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not RepressiveMobile Device Security - Responsible Not Repressive
Mobile Device Security - Responsible Not Repressive
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Search for Overview for SC Upstate SP users
Search for Overview for SC Upstate SP usersSearch for Overview for SC Upstate SP users
Search for Overview for SC Upstate SP users
 

Similar a Mobile Devices Securely Accessing SharePoint

LANDesk Mobility Manager
LANDesk Mobility ManagerLANDesk Mobility Manager
LANDesk Mobility ManagerInfraVision
 
Mobility manager 90
Mobility manager 90Mobility manager 90
Mobility manager 90Axle-IT
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Securitynexxtep
 
Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15Chris Beauchamp
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy AnkitThakkar46
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)shashankvaidyar2
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxArrow ECS UK
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Internet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersInternet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersFIITJEE PU College
 

Similar a Mobile Devices Securely Accessing SharePoint (20)

Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
LANDesk Mobility Manager
LANDesk Mobility ManagerLANDesk Mobility Manager
LANDesk Mobility Manager
 
Mobility manager 90
Mobility manager 90Mobility manager 90
Mobility manager 90
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15Wearables, Things & Apps - Mobile Dev + Test '15
Wearables, Things & Apps - Mobile Dev + Test '15
 
Byod
ByodByod
Byod
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptx
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Internet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersInternet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginners
 

Último

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Último (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Mobile Devices Securely Accessing SharePoint

  • 1. SECURE Mobile Access to SharePoint Mobile Devices (iPads! iPhones! Android!)Access SharePoint
  • 2. SecureMobile Access To SharePoint 1 3 2 What Is The Issue Here? Technology Overview What Did NGC Do? Integrating Policy, Supporting Technology And SharePoint
  • 3. Post PC Issue/ Opportunity Your Users / Customers Want Mobile Access – Non-PC Devices Will Take Over Someday… 1
  • 4. Mobile AccessSharePoint, eMail – Work Resources!! Powerful Smartphones and Tablets Are More Mobile Than Many PCs People Want Mobile Access Now – MORE In Future!!
  • 5. Mobile DevicesShiny New Devices – Few Blackberries… Powerful Inexpensive Devices Old Deployment Models Gone
  • 6. Mobile DevicesHUGE Technical Differences Matter! Closed Basis For Mobile Devices (Apple, Carriers) Very Different From PC Your Employees, Partners, Customers (and Providers) OWN Devices – Not IT! Want Mobile Access (From Home, Coffee Shop, AND On Your Wireless LAN) New Types of Risks and Threats – HUGE Issues With Lost / Stolen Devices App Store Models – “There’s An App For That!!”
  • 7. 2 NGC Our Challenges, Our Solution (So Far) Establish Policy and Technical Controls – Facilitate Adoption (with Proper Security)
  • 8. Critical Security Policies Enrolled Connections Required SSL VPN / ActiveSync Protection Theft / Tamper Protection PIN/Passcodes Required Inactivity Timeout Wipe Data after guesses Device / Business Data Encryption Protect Data On Device Protect Device Backup (iTunes) Remote Wipe For Lost/Stolen Devices “Find My Phone” Ideal…
  • 9. “Nice To Have” Device Policies Simple, Self-Service Deployment Secure But Simple For People “Managed” App Store Links / App Delivery App Blacklist / Whitelist “Manage Device Features” Centrally Camera Allowed / Disallowed? Wireless LAN – Other Configs. One Policy – Across Many Devices iOS, Android, Windows, Etc…
  • 10. Very Important PIN Policy! Can Become Issue – BALANCE Needed Secure But Simple For People Just Long Enough To Work Six to Eight Characters Auto Lock After No Active Use 30 minutes max – Devices Vary Ten Tries – Then Wipe Biz Data Warnings Stop “Butt Dial” No PIN Expiration Controls Not Network (AD) Passwords Those Credentials Embedded?
  • 11. How Can We Enforce This? Mobile Email Access (Addiction?) People NEED Their Email Security/Controls Needed On Devices Protect Data / Control Access Deploy “Email Locks” Tied To MDM MobileIron Sentry for NGC Update Company Policy / Forms Employee Acceptance Needed Agree To Device Management Agree To Possible “Wipe” Enrollment/Controls In Place
  • 12. 3 Demo: Technology Overview NGC Solutions: Device MDM/Policy via MobileIron, SSL VPN via Juniper SA / Junos Pulse
  • 13.
  • 14.
  • 15.
  • 16. Agent Interaction Updates, Profiles, Certificates Report Dropped Calls Check Data Speeds iOS Only Features Links to iTunes App Store App Delivery Direct to iOS
  • 17. iOS “App Store” Links to Apple Store Point to Apps You Select Define/Deliver Internal Apps Without App Store (From Your System)
  • 18. Privacy Issues Mobile Intelligence / Activity Monitoring Features Track Cell Tower Connections / Location of Device Collect Call Logs and All SMS Messages Set To Ignore Calls/SMS and Track “Current Location” Only Concerns About Collecting Data and Controls / Management Not Presently Any Security / Business Requirements
  • 19. Mobile Expense - International Roaming Alerts Detect International Roaming Send Text Message Alert Send Alert to IT Admins Update Plans / Activity
  • 20. Access To SharePoint – Juniper/Junos VPN SSL VPN for PCs Users Already Know It Flexible Authentication RSA SecurdID / AD / etc. Very Good Controls – From Full VPN Tunnel to Simple One Site Link
  • 21. Access To SharePoint – AircreekFilamente Detect International Roaming Send Text Message Alert
  • 24. Filamente Document Actions / Upload Content
  • 25. References Surveys - Sybase SurveyTelenav Survey MobileIron Picking PIN Policy - Perimeter Jaquith Blog - NIST 800-63 iPhone Password Brute Force CNN Money http://money.cnn.com/galleries/2011/technology/1108/gallery.cybersecurity_tidbits/ Dino Dai Zovi -http://trailofbits.com/2011/08/10/ios-4-security-evaluation/
  • 26. POWERPOINT 2010 What’s Your Message?