To the ISSA Las Vegas Chapter April 13, 2011. Definition People Technology Policy.

Slides:



Advertisements
Similar presentations
Riva Integration Server for Oracle CRM On Demand Server-side sync | No plug-ins required Wolfgang Berger Business Development EMEA Region Omni Technology.
Advertisements

IT Services September 29, Portable OS solutions U3 Cryptostick Ceedo USB Suite Sticky (circa 2006)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy.
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Security for Mobile Devices
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
IBM Endpoint Manager for Mobile Devices Mobile Device Management
310KM M-Commerce Application Selection of Mobile Platform Group 4 Choy Chun Lung, Lawrence Hui Yiu Ting, Eddy Chan Ki Yin, CKY Liu Tsz Ping, Scott.
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
Office 365 for Enterprises ITExpo February 2, 2012.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
 This session details common scenarios for deploying Office 365 services. Office 365 provides a breadth of capability, but often there is a key scenario.
Which server is right for you? Get in Contact with us
{ Making Microsoft Office work for you Organizing Your Life at work and home in the Cloud Presented by: Matthew Baker (321)
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
© 2011 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Honing In on Multiple Targets with a Single Codebase Jeff Tapper Senior Technologist.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Building Mobile Apps in the Cloud – Comparing Approaches.
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Meraki Mobile Device Management
Vodacom Hosted Exchange. What is Hosted Exchange? A Business-Class Messaging solution and collaboration service designed to help your business communicate.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
Riva – Sync Dynamics CRM directly to Exchange Server-side sync | No plug-ins required Trevor Poapst VP Marketing and Sales Riva CRM Integration
Communication Technology Peer Group BLACKBERRY 10: ASKED AND ANSWERED.
“Turn you Smart phone into Business phone “
310KM Mobile Commerce Applications Lab/Tutorial 4 Part 3 Team members: Li Chun Yin Pun Hoi Lam Shek Hin Shing.
SmartPhones Student 1 Student 2 Student 3. SmartPhone Definition “A SmartPhone is one device that can take care of all your handheld computing and communication.
Lexmark Print Management
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
A+ Certification Guide Chapter 10 Mobile Devices.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Offer Exchange Let your customers pick their preferred version of the world’s most popular business and collaboration platform Lync Secure, business-grade,
Howard A. Carter III Senior Consultant Microsoft Consulting Services
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
Microsoft Confidential - Internal Only Cloud Services for Collaboration – the road to Wave 15.
A brief history, Smart Phones, Tablets, and Wearable Technology.
May l Washington, DC l Omni Shoreham iPhone 2.0, BlackBerry and Windows Mobile Smart-Phone Hosting without Exchange and BES John Davies President.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
How to complete the Europass Language Passport The current situation.
Riva Integration Server for Salesforce.com Server-side sync | No plug-ins required Wolfgang Berger Business Development EMEA Region Omni Technology Solutions.
Offer highly configurable and scalable services Maintain an evergreen service Provide a platform built on security, privacy, and trust.
Riva – Sync GoldMine to Exchange and Office 365 Server-side sync | No plug-ins required Neil Graham Riva Specialist Riva CRM Integration ext.
Craig Pringle & Derek Moir
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Mexican Internet Association, AMIPCI The Mexican Internet Association (AMIPCI) was founded in It integrates the most influential.
Technical Sales Specialist Software - OS and Applications John R. Moegling Sr. Systems Engineer.
BE-com.eu Brussel, 26 april 2016 EXCHANGE 2010 HYBRID (IN THE EXCHANGE 2016 WORLD)
Nextiva UCaaS. 2 Nextiva Proprietary and Confidential, do not copy, duplicate or distribute. Nextiva.com Transition to Emerging Technologies Today Many.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Secure Services Shared Hosted MS Exchange 2010.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Mobile Operating Systems
Office 365 is cloud-based productivity, hosted by Microsoft.
Mobile Data Solutions Inc
Get Office 2016 with Office 365 and get down to business
Mobile Device Management
Securely run and grow your business with Microsoft 365 Business
Which is right for your business, Office 365 or Microsoft 365?
Which is right for your business, Office 365 or Microsoft 365?
Riva – Sync Dynamics CRM directly to Exchange
Microsoft 365 Business Technical Fundamentals Series
Presentation transcript:

To the ISSA Las Vegas Chapter April 13, 2011

Definition People Technology Policy

A cellular telephone with built-in applications and Internet access. Smartphones provide digital voice service as well as text messaging, , Web browsing, still and video cameras, MP3 player, video viewing and often video calling. In addition to their built-in functions, smartphones can run myriad applications, turning the once single- minded cellphone into a mobile computer. Source: PC Magazine Encyclopedia

What do they want? Only carry one Anywhere access Any device supported Transparent security

What does management want? Lower cost Low support overhead Increased Productivity Any device supported Transparent security

Is the business willing to securely support a mix of personal/business data and smartphones/tablets? Remote access - to how much? Authority over data? Is the value worth the cost?

Source: Symantec

What are your organizations compliance requirements? Which rewards does management want to balance against risk and cost? –Compliance –Strategic mobility –Employee productivity/creativity/retention

Is confidential data allowed on mobile devices? Are personally-owned mobile devices allowed access? Who has authority/responsibility for… –Who gets company-issued smartphones –Who gets access from smartphones, and to what? –Purchasing smartphones –Provisioning smartphones –Securing/monitoring smartphones? –Support of Organization-owned (O)? Personally- owned (P)?

What are O mobile devices allowed access to? Is it different for P? Will you list specific devices supported, or just OS versions? Who is going to test all the new devices? How often? What about application maintenance? (how) Do you wipe a P phone at term? Crawl/Walk/Run or Flash Cut?

Review others policies for ideas Review your laptop policy Involve stakeholders in requirements and design Communicate early and often –Stakeholders –IT (they have to make the tech work) –Finance (our buddies with the budget) –Users (they hate change too – be nice)

Pure Monolithic – typically BES –Organization (O) owned only Mixed Monolithic –O or Personally (P) owned Mail System w/Supported Security –O, O/P, limited to native OSs 3 rd Party Mgmt Software (in-house, hosted, managed) – multiple device types

From Most to Least Complete Options –Blackberry –Windows Mobile (6.1 and 6.5 only) –iPhone –Android –Windows Mobile 7 –Symbian? –Nokia?

Passwords not pins Remote wipe Secure /Calendar sync Device and storage card encryption

Disable capabilities (removable storage, camera, BlueTooth, IR, etc…) Two-factor authentication Failed attempts lock/wipe

Source: Microsoft - comparison-table.aspx#cite_note-3

Android 2.2 supports all the basic security requirements except encryption Android 3.0 (Honeycomb) provides encryption, but is currently only on tablets and one phone Carriers modify Android, sometimes badly NitroDesk Touchdown (Android Market or direct, $20) adds device and storage card encryption (3DES) to 2.2

Mobile Device Management (MDM) –Not just security – can have operations management and deployment capabilities Asset management Application whitelist Deploy in-house apps Deploy patches/upgrades

–Which one fits your organization better? In-House In-House with external comm center Hosted Managed Service

Good Technology Encrypts Android 2.1 and above, and iPhone 3G and above Separation of data and apps from OS in encrypted sandbox Can control transfer of data to personal side (contacts typically) Onsite servers transmit through Good telecomm datacenters – no ActiveSync

Mobile Iron Suite of applications for security, asset management, and expense Self-service portal for apps, communications search/history, and usage Encrypts iPhones, Androids (with integrated Touchdown), integrates with BES

Air-Watch Can be purchased as a cloud service, appliance, or software Encrypts iPhones but not Android 2.x

Verizon Managed Mobility Service 750 employee accounts minimum Based on Sybase solutions Services include inventory & expense mgmt, provisioning and logistics, and Sybase (policies, security, app store) Note: Sybase did not support iOS4 or Android until Oct 2010

Employee and management requirements often conflict Consumer-grade products = security an afterthought or non-existent Proprietary OS = complexity, inequality, lack of standards Immature market = rapid change

Perform constant market research Provide non-technical executive management enough information to make informed risk decision(s) regarding mobile devices –Immature market = limited choices, constant change –Set realistic expectations – no Holy Grail –Communicate risks in business terms –Crawl/Walk/Run

Hi, my names Terry and Im a CISO…