Securing Mobile Devices for BYOD Environments Nate Kaminski Thank you for joining. We will begin shortly. Joe Yeager

Slides:



Advertisements
Similar presentations
CSWA Provider: Program and Tech Review
Advertisements

Introduction to Web Bill of Lading Q Proprietary and Confidential Copyright © 2005 INTTRA Inc. 2 Agenda Industry Challenges INTTRA Solution Value.
C9: SOA Management with Actional® for Sonic™
Slide 1 FastFacts Feature Presentation June 14, 2011 We are using audio during this session, so please dial in to our conference line… Phone number:
Slide 1 FastFacts Feature Presentation October 24, 2013 To dial in, use this phone number and participant code… Phone number: Participant.
Carrie, living with Crohns disease Mobile Devices & The Information Professional – Where Do I fit In? PHTD Spring Meeting, Baltimore March 18 th -20 th.
©2011 Quest Software, Inc. All rights reserved.. Andrei Polevoi, Tatiana Golubovich Program Management Group ActiveRoles Add-on Manager Overview.
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Copyright, 2011 WowWe® VERS ONLINE 2 3.
1 General Education Office IHM.316 / ILA2401 English for the Hotel Business Unit 4: Reservations and Check-In.
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Govern the Flow of Data: Moving from Chaos to Control
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Confidential R. C. Giltner Services February 11, Companion Card Strategy to Serve Customer Security and Transaction Needs.
1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey.
Fortune >80% deploying mobile clients Smartphones 289M in 2010 >900M in Slates 55M in 2011 >200M in Gartner Forecast: Mobile.
Network Systems Sales LLC
Copyright © 2012 Pearson Prentice Hall. All rights reserved. CHAPTER 23 Risk Management in Financial Institutions.
Grow your business with your head in the cloud. What is Cloud Computing ? Internet-based computing, whereby shared resources, software and information.
Enable Bring Your Own Device with SCCM 2012 David Caddick Solutions Architect, Quest Software WCL315.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Copyright © Open Text Corporation. All rights reserved. Slide 1 Automatic Routing With Captaris FaxPress and FaxPress Premier Darin McGinnes Sales Engineer.
SystemCheck for TestNav. Agenda 2 SystemCheck for TestNav – Overview – iPads and Chromebooks – Accessing SystemCheck SystemCheck – Check Your System Proctor.
The World in Their Pocket A Mobile Computing & Digital Mapping Revolution Nick Jones JONES CONSULTING Fall 2011.
MAXIMIZE WEBFOCUS GO MOBILE! Copyright 2010, Information Builders. Slide 1 Brian Carter 3/21/12.
1© Copyright 2013 EMC Corporation. All rights reserved. EMC STORAGE ANALYTICS With VNX and VMAX Support.
My ELAS December 2012.
© Robert G Parker – UW-CISA 2010 S-1 New and Emerging Technologies 3 - New and Emerging Technologies.
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
Empowering People-centric IT Speaker name 00/00/0000.
The printing drain… 60% of SMBs rely on printing 50% say colour volumes growing 60% say consumables expenditure growing.
1. 2 Captaris Workflow Microsoft SharePoint User Group 16 May 2006.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Need for Speed Win the.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN BCMSN Module 1 Lesson 1 Network Requirements.
Language Technologies and the Third Platform for Innovation Rafael Achaerandio Research Director IDCResearch.
New Mexico Broadband Program Internet Tools for Small Business Success Module 5 E-Newsletters.
Services Course Windows Live SkyDrive Participant Guide.
IN COMMERCIAL CONFIDENCE © BRITISH TELCOMMUNICATIONS Innovation in Public Services LGC Future Leaders Network Simon Yellowley BTGS Regional Director NEY&H.
Bomgar Product Strategy SECURE REMOTE SUPPORT FOR THE MOBILE ENTERPRISE © 2011 Bomgar Corporation | CONFIDENTIAL BOMGAR Solution Overview Stuart McGregor.
Page 1 GADD Software & GADD Analytics 1.6 Public version, 2015, gaddsoftware.com GADD Analytics.
Windfall Web Throughout this slide show there will be hyperlinks (highlighted in blue). Follow the hyperlinks to navigate to the specified Topic or Figure.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 1 © 2011 Cisco and/or its affiliates. All rights reserved. Ingram Micro:
SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
THE RIGHT TECHNOLOGY IN INVESTOR RELATIONS: WHAT TO DO ONLINE? THOMSON REUTERS Alex Ménage Head of Business Development Corporate Services Rapidly Developing.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
 Much of the information needed by an organisation comes from within the organisation, and the organisation’s IT systems can be used to extract this.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Mobile Apps For Small Businesses Your customers are mobile. Is your business?
© 2010 IBM Corporation Business Analytics software Business Analytics Editable Text Editable Text Editable Text.
Microsoft Management Seminar Series SMS 2003 Change Management.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
Designing a BYOD Strategy Bruce Hockin Head of Solutions Strategy Avnet Technology Solutions.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Presenter(s) Name Company Title Introduction. © 2014 Lancope, Inc. All rights reserved. Your Network is Compromised Do you know where?
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Riverbed Confidential. Riverbed – RVBD 22,000+ Customers $1 BILLION Revenue Market Leader * Performance Management * WAN Optimization * Cloud Storage.
©2015 Cisco and/or its affiliates. All rights reserved. Welcome… to the Digital Age Let’s make Amazing Happen Rick Huijbregts yes, on
Gain powerful insights into your print environment
StealthWatch: Network Visibility & Security Intelligence BATTLE CARD
Securing the Threats of Tomorrow, Today.
Presentation transcript:

Securing Mobile Devices for BYOD Environments Nate Kaminski Thank you for joining. We will begin shortly. Joe Yeager

Can you hear me? NO… 1.Turn on/up the volume on your computer speakers - or - 2. Teleconference into the webcast a.Tick the Request box under the Participants panel on the right hand side of your screen Participant

Agenda Introduction Mobile Device Fast Facts The BYOD Problem Solutions to BYOD Lancope Solution to BYOD Conclusion 3

What is BYOD? 4

According to IDC estimates, mobile devices will outship PCs in 2012 by more than 2 to 1 and mobile device spending will exceed PC spending, growing 4 times as fast. 1 Aberdeen estimates nearly 75 percent of companies currently allow employee-owned smartphones and/or tablets to be used at work. 2 Garter finds that 90 percent of organizations will support corporate applications on personal devices by Mobile Device are Here to Stay 2: 1 90 % 75 % 4X Shipping Spending Work Use Corp Apps 1: 2: 3: 5

Organizations should embrace BYOD According to the Cisco Connected World Technology Report, 1 – 40% of college students would accept a lower- paying job that had flexible IT – 70% of young workers ignore IT rules ISACA has found through surveys that – Almost half of young professionals use their own personal device at work. 2 – Over half of all IT leaders in the U.S. say that employee-owned mobile devices pose a greater risk to the enterprise than mobile devices supplied by the company. 3 1: 2: 3: 6

The BYOD Problem Most organizations have… Scarce knowledge of what the device, operating system, or patch level is Limited control over policy for what resources device can and cannot access Incomplete information about whose device it is Lack of visibility into what the device is doing on the internal network and how confidential data is moving around Little understanding of the impact of the device on the network 7

BYOD: Proposed Solutions by the Security Industry 8 Say No to BYOD BYOD is here whether you embrace it or not Install agents on the devices You have limited control over the employees device Convert the device to a corporate one Dont forget the Your Own part of BYOD Install more network probes Not a cost-effective nor scalable solution BYOD REQUIRES A DIFFERENT APPROACH

Network Security Monitoring Using the Network 9 Internet Atlanta San Jose New York ASR-1000 Cat6k UCS with Nexus 1000v ASA Cat6k 3925 ISR 3560-X 3750-X Stack(s) Cat4k 9

Cisco Infrastructure Provides the Intelligence Internet Atlanta San Jose New York ASR-1000 Cat6k UCS with Nexus 1000v ASA Cat6k 3925 ISR 3560-X 3750-X Stack(s) Cat4k 10

Internal Visibility from Edge to Access... Internet Atlanta San Jose New York ASR-1000 Cat6k UCS with Nexus 1000v ASA Cat6k 3925 ISR 3560-X 3750-X Stack(s) Cat4k Lancope NetFlow Collector

StealthWatch – A Complete, Integrated Family of Products Behavior-based flow monitoring Contextual awareness – Identity – Device – Application – Virtual The Concern Index TM Relational Flow Mapping TM Point of View TM Advanced Querying & Reporting 12 Management Reporting Custom Dashboards Relational Flow Maps Security Monitoring Forensics Anomaly Detection ComplianceMitigation Network Performance Monitoring Trouble- shooting Service Delivery WAN Optimization Capacity Planning APPLICATION AWARENESS IDENTITY AWARENESS VIRTUAL AWARENESS Behavioral Analysis Flow Collection StealthWatch DEVICE AWARENESS

StealthWatch Answers The Tough Questions 13 WhoWhatWhereWhenHow owns the device the device is doing the device is on the network the device is impacting the network the device was on the network StealthWatch can show you…

StealthWatch Monitors BYOD Environments Monitors the entire internal network by passively collecting data from existing infrastructure and does not use agents, install software, or in any way modify the employees device. StealthWatch monitors and records everything that every user on any device running any operating system is doing on the network and how the network is affected by the users actions. Utilizing patented behavioral analysis techniques, StealthWatch determines whether any device is acting suspiciously, is accessing privileged resources outside of its policy. 14

Behavior-based Analysis 15 Critical ServersTablet computers Mobile phonesMarketing

Company with StealthWatch Company with Legacy Monitoring Tools To Enable Early Interjection BEFORE Crisis credit card data compromised attack identified vulnerability closed CRISIS REGION attack thwarted early warning attack identified vulnerability closed attack onset StealthWatch Reduces MTTK

Network activity is correlated with user and device information along with physical location on the network And you can also start with the user or device you are looking for and look at its network activity StealthWatch: The Solution for BYOD Environments

And can drill down to the exact flow: 18

StealthWatch: The Solution for BYOD Environments 19 Including which devices in the network it crossed:

Quick Recap BYOD is already here Embrace it Other solutions do not meet the needs of BYOD Prevent BYOD Install agents Change the device Install more network probes With StealthWatch you can gain visibility into every device on your network Using your existing infrastructure Answer the tough who, what, where, when, why, and how questions Once youve enabled flow collection you can... Gain deep traffic analysis and network visibility Detect attacks and network anomalies 20

Next Steps Contact Lancope: Joe Yeager Lancope Lancope Marketing Visit Blackhat for a live demo of the StealthWatch System & pick- up your free copy of NetFlow Security Monitoring for Dummies book. 21

Questions Web Blog LinkedIn : NetFlow Ninjas NetFlow Ninjas Challenge

Webinar with Forrester Research 23©2012 Lancope, Inc. All Rights Reserved.