Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.
Enterprise
Mobility
challenges
Proposal for assistance in
implementing mobile security
© Nikhil Kulkarni | NikhilKulkarni....
Enterprise Mobility security has many aspects
• Common wisdom suggests that
protecting employee mobile devices
will take c...
Common approaches of BYOD / mobile security
• Locks down the
device
• Control what
gets installed,
what user can
access
• ...
The Solution: use mix of appropriate technologies
depending on what you want to protect
© Nikhil Kulkarni | NikhilKulkarni...
App wrapping is probably a most reliable tool
• App wrapping, also known as sandboxing, is a security
solution that automa...
That is not all!
• Once you implement MDM, MAM, MIM or combinations,
you should also ensure that:
• Access to Cloud storag...
Too confusing?
Next Steps
Enterprise Mobility
Challenges
© Nikhil Kulkarni | NikhilKulkarni.com
Approach to selecting a suitable BYOD solution
•Identify what data to
protect & where is it lying
•Identify what features ...
Next Steps
© Nikhil Kulkarni | NikhilKulkarni.com
Let us meet over coffee to discuss your
requirements and how would you w...
References
• Key Vendor websites:
• Airwatch
• Mobile Iron
• Citrix
• Maas360 (IBM)
• Image Credits:
• Unsplash.com
• Frie...
Próxima SlideShare
Cargando en…5
×

Enterprise Mobility Security - proposal

400 visualizaciones

Publicado el

Conventional wisdom suggests that protecting employee mobile devices will take care of security challenges. However, enterprise mobility has many other connotations beyond data protection; and further Mobile Device Management (MDM) has many limitations which leaves backdoors open for data protection as well. Some thoughts on what is needed and how to approach enterprise mobility!

Publicado en: Tecnología
  • Sé el primero en comentar

Enterprise Mobility Security - proposal

  1. 1. Enterprise Mobility challenges Proposal for assistance in implementing mobile security © Nikhil Kulkarni | NikhilKulkarni.com
  2. 2. Enterprise Mobility security has many aspects • Common wisdom suggests that protecting employee mobile devices will take care of security challenges • However, data leakage is a wider problem – data can leak through: • Official laptops connected to home Wi-Fi or client networks • Anywhere browser access to enterprise apps • Cloud ‘enterprise’ apps accessible on mobile devices on non-office networks • Personal devices ‘containing’ official data with access to office Wi-Fi • Personal devices without access to official network but connected to office laptops or devices • Email systems with Web access © Nikhil Kulkarni | NikhilKulkarni.com Mobile devices Personal access Official ‘services’ Office Wi-Fi Home Wi-Fi Cloud Storage Browser access to enterprise apps
  3. 3. Common approaches of BYOD / mobile security • Locks down the device • Control what gets installed, what user can access • Remote wipe data • No control on data • User resistance to restrictive policies • Does not consider impact of legacy ‘Web Access’ granted to employees Mobile Device & Application Management • Containerizing enterprise apps and data at the device level • Provide data access only through corporate mobile apps • Just one set of policies for the whole container • Makes it difficult to share data for bona-fide purposes Mobile Application Management • Looks at securing the information itself • Also called – app wrapping; implements security closer to the data • Technology still in its infancy • Not mature and applicable for all use cases Mobile Information Management © Nikhil Kulkarni | NikhilKulkarni.com
  4. 4. The Solution: use mix of appropriate technologies depending on what you want to protect © Nikhil Kulkarni | NikhilKulkarni.com Provide access to emails securely Restrict access to office Wi-Fi / Prevent accessing unsecured Wi-Fi Non-copy access to data in corporate servers Disable upload of data to Cloud storage Secure access to calendar / contacts data n mobile phones Prevent access to Social Media on office phone / in office hours 1 2 3 4 5 6 MDM MAM MIM 2, 4 3, 6 1, 5, 3 *Use cases shown here are illustrative and not meant to be an exhaustive representation
  5. 5. App wrapping is probably a most reliable tool • App wrapping, also known as sandboxing, is a security solution that automatically wraps fine-grained security policies around individual mobile apps so you can add multiple layers of protection to any app – particularly third-party apps – that needs more security without changing the actual app. • App wrapping is also implemented through containerization solutions provided by some vendors – but to use containerization, enterprises need to develop apps using vendor provided SDKs only (referred to as proprietary containerization) • Recent iOS, Android and Windows updates offer an alternative by building containerization capabilities into the native OS. © Nikhil Kulkarni | NikhilKulkarni.com
  6. 6. That is not all! • Once you implement MDM, MAM, MIM or combinations, you should also ensure that: • Access to Cloud storage is locked down on office networks • Web Sense / Web filtering solutions work irrespective of connectivity to corporate / home / client networks • Corporate web-applications are protected by two-factor authentication or accessible only on VPN • New Mobile app development follows a secure development lifecycle including containerization and encryption of on-device and in-transit data • You scan public app stores for rogue apps • Educate employees about secure source of downloading apps • Carry our periodic checks on access to corporate data from mobile / external channels for hint of malware activity / rogue behaviour etc.
  7. 7. Too confusing? Next Steps Enterprise Mobility Challenges © Nikhil Kulkarni | NikhilKulkarni.com
  8. 8. Approach to selecting a suitable BYOD solution •Identify what data to protect & where is it lying •Identify what features you need from the solution Define requirements •Invite vendors to present solutions •Benchmark against requirements Vendor discussions •Customization of or roadmap for features not available but planned •Commercial negotiation Negotiation © Nikhil Kulkarni | NikhilKulkarni.com Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Activities&Deliverables Discussions with key stakeholders End User interviews Prepare Device / OS landscape Documented RequirementsDefinition Presentation / Meetings with Vendor Discussion / clarification on features provided Internal discussion on feature priorities Vendortechnicalscoring Discuss customizations required with top 3 vendors Negotiate commercials VendorSelected
  9. 9. Next Steps © Nikhil Kulkarni | NikhilKulkarni.com Let us meet over coffee to discuss your requirements and how would you want me to get involved with your existing enterprise mobility / security initiatives. Reach out to me on: Nikhil Kulkarni work@nikhilkulkarni.com +91 9920983346 www.NikhilKulkarni.com www.NikhilKulkarni.inblog
  10. 10. References • Key Vendor websites: • Airwatch • Mobile Iron • Citrix • Maas360 (IBM) • Image Credits: • Unsplash.com • Friends & Family • Icons: • bootstrapcdn.com • fortawesome.github.io/Font-Awesome/icons/ • Thanks to – Microsoft for MS Office suite © Nikhil Kulkarni | NikhilKulkarni.com

×