BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.

Slides:



Advertisements
Similar presentations
Speaker Name, Title Windows 8 Pro: For Small Business.
Advertisements

Network Systems Sales LLC
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Security for Mobile Devices
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
Meraki Mobile Device Management
BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com.
Steps to Compliance: Bring Your Own Device PRESENTED BY.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
© 2012 Bradford Networks. All rights reserved. Secure BYOD.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Solution Briefing Flexible Workstyle. Solution Briefing work-life blur more mobile tech savvy multiple devices digital generation fast paced Consumerization.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Empower your workers and boost productivity Microsoft ® Windows ® Vista Business and Office Small Business 2007 on HP desktops, notebooks and workstations.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
Security considerations for mobile devices in GoRTT
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
IBM Mobile Security solutions 1IBM and Business Partner Sellers Only Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device.
MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
User and Device Management
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Data Protection and Governance at the Edge September 2014.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Moving to BYOD Gary Audin 1.
Managed IT Services JND Consulting Group LLC
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
BYOD Security Risks Presentation by Ravi Namboori Visit
Mobile Devices in the Corporate World
Phase 4: Manage Deployment
Barracuda Mobile Device Manager
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
OIT Security Operations
How to Define a Successful Mobility Strategy
Deployment Planning Services
BYOD: Short-term Gain Without Long-term Pain?
Impact of IT Consumerisation on Enterprise Security
Company Overview & Strategy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Contact Center Security Strategies
Securely run and grow your business
In the attack index…what number is your Company?
Personal Mobile Device Acceptable Use Policy Training Slideshow
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

BYOD: An IT Security Perspective

What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace, and use those devices to access privileged company information and applications. Source: Bring your own device is an alternative strategy allowing employees, business partners and other users to utilize a personally selected and purchased client device to execute enterprise applications and access data. Typically, it spans smart phones and tablets, but the strategy may also be used for PCs. Source:

What is BYOD to Security Professionals? RISK

The Problem  Loss of control over your data  Lost or Stolen Devices  Exposing your internal network to unmanaged devices  Difficulty in Reporting Vulnerability Status  Compliance Concerns eg PCI  Increasing Number of Viruses Targeting Mobile Devices

 Mobile Device Policy  Balancing act  Password Protection  Encryption of Company Data  Remote Wiping of Devices  Define a standard  Must support the business  Security Awareness Training  Explain the risks The Solution

 Deploy a Mobile Device Management Tool  Ability to provision and de-provision apps and profiles  It should support granular remote wipe and have the ability to track lost or stolen devices  Deploy an Application Aware IPS  You need to understand what applications are running across your network as you no longer control the endpoint  Deploy a Content Aware Network based DLP System  Without a dedicated DLP system you will have no visibility of data that is leaving your organization  Use a Security Operations Center to monitor everything  Continuous 24/7 monitoring and alerting

Take Away Points  BYOD is here to stay  You need to be prepared to implement the infrastructure to secure data on employee owned devices  You need to be able to effectively monitor devices for compliance to the Mobile Device Policy  You need to maintain and be able to demonstrate that you comply with legislation

Thank You Greg Fagan Security Architect