Mobile Security, Everything you NEED to know about Endpoint Security but were afraid to ask ! Matthew Johnson – Senior Technical Staff Member Mobility.

Slides:



Advertisements
Similar presentations
1 Making the Desktop Dynamic. 2 What does RES do? »IT as a Service & Automation »Context Aware Security »Dynamic Desktop Delivery »Follow-me Secure Data.
Advertisements

Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
Carrie, living with Crohns disease Mobile Devices & The Information Professional – Where Do I fit In? PHTD Spring Meeting, Baltimore March 18 th -20 th.
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Govern the Flow of Data: Moving from Chaos to Control
Yammer Technical Solutions Overview
Speaker Name, Title Windows 8 Pro: For Small Business.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Securely connecting users and applications from anywhere to anywhere in todays global economy MY-ARRAY DesktopDirect Bring.
Device Evolution Greg Pelton Chief Technology Officer
Discovering Computers Fundamentals, 2012 Edition
IBM DEVELOP, NETWORK, PROMOTE & GROW Cloud Transformation: What are the risks, pitfalls and challenges to be addressed? Steve Strutt, CTO Cloud Computing,
Strategic Meetings Management 101
IBM Endpoint Manager for Mobile Devices Mobile Device Management
Securing Emerging Mobile Technology JOHN G. LEVINE PH.D. D/CHIEF ARCHITECTURE GROUP 13 SEP
Office 365 for Enterprises ITExpo February 2, 2012.
Office 365: Pricing & Licensing Overview. | Copyright© 2010 Microsoft Corporation Transition to the Cloud: Were All In! 2.
Empowering People-centric IT Speaker name 00/00/0000.
Get the best of both worlds. With Windows 8, customers can get the fun of a tablet and the productivity of a PC, all in a single Windows 8 device. Game.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Bomgar Product Strategy SECURE REMOTE SUPPORT FOR THE MOBILE ENTERPRISE © 2011 Bomgar Corporation | CONFIDENTIAL BOMGAR Solution Overview Stuart McGregor.
Andrew J Haire. Agenda  Let us define Terms…  What do we know so far  How did we get here  What are Implications to Policy Makers  What will this.
CTS Strategic Roadmap Walkthrough, v1.2 Dan Mercer.
National Aeronautics and Space Administration NASA Mobility.
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
PRODUCT FOCUS 5/27/14 – 6/6/14 INTRODUCTION Our Product Focus for the next two weeks is CompTIA. CompTIA is most well known for serving as the backbone.
MICROSOFT ® OFFICE 365 Last updated Nov
Bring your own… everything! The impact of modern technology on knowledge sharing and the design of systems Sharon Richardson Joining
Top 10 Strategic Technology Trends for 2013 A Channel Partners Slide Show … as highlighted at.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Solution Briefing Flexible Workstyle. Solution Briefing work-life blur more mobile tech savvy multiple devices digital generation fast paced Consumerization.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Communications & Data Services The Evolution of Communications Cathy Avgiris EVP/GM May 10, 2012.
Findly Leads the World in Talent Innovation with Its Enterprise-Cloud for Global Talent Acquisition COMPANY PROFILE: FINDLY Findly is a SaaS ISV founded.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Hosted on the Powerful Microsoft Azure Platform, Advent Countdown Lets Companies Run Reliable and Scalable Holiday Marketing Campaigns MICROSOFT AZURE.
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
Exploring the Network.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
BARRY JINKS President & CEO March 22, 2011 President & CEO March 22, 2011.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Configuring Network Access Protection
1 Lotus Connections Customer Use Cases The following are stories from early customer engagements. They were created to help people understand the many.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Picturex Secures and Scales Event-Photo Sharing for Enterprise and Private Customers by Relying on the Powerful, Scalable Microsoft Azure Platform MICROSOFT.
The Claromentis Digital Workplace An Introduction
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Moving to BYOD Gary Audin 1.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
Total Enterprise Mobility Comprehensive Management and Security
A Brave New (connected) World – IoT& DX November 2015 Mark Walker – AVP Sub
A Shift in the Data Security Paradigm
Transforming business
Cloud adoption NECOOST Advisory | June 2017.
Enterprise Productivity Services
Developing Innovative Unified Communications Applications
MICROSOFT AZURE ISV PROFILE: ONEBE
IT Megatrends that shape the Digital Future…
Microsoft Virtual Academy
Presentation transcript:

Mobile Security, Everything you NEED to know about Endpoint Security but were afraid to ask ! Matthew Johnson – Senior Technical Staff Member Mobility Infrastructure, IBM CIO August 2012

© 2012 IBM Corporation Building a smarter planet 2 There are known knowns; there are things we know that we know. There are known unknowns; that is to say there are things that, we now know we don't know. But there are also unknown unknowns – there are things we do not know, we don't know. United States Secretary of Defense, Donald Rumsfeld February 12, 2002

© 2012 IBM Corporation Building a smarter planet Mobile devices are different from the standard enterprise laptop & desktop in many ways... Mobile Devices are Used in More Locations Smartphones and tablets are frequently used in challenging wireless situations that contrast with laptop friendly remote access centers. Laptops are used in a limited number of trusted locations Mobile Devices are Shared More Often Smartphones and tablets are multi- purpose personal devices. Therefore, users share them with friends, and family more often than traditional computing devices – laptops and desktops. Social norms on privacy are different when accessing file-systems vs. mobile apps Mobile Devices prioritize User Experience Smartphones and tablets place a premium on user experience and any security protocol that diminishes the experiences will not be adopted or will be circumvented. Workstation level security cannot be assumed unless they are dedicated devices Mobile Devices have multiple personas Smartphones and tablets may have multiple personas – entertainment device, work tool, etc. Each persona is used in a different context. Users may want to employ a different security model for each persona without affecting another. Mobile Devices are Diverse Smartphones and tablets employ a variety of different platforms and have numerous applications aimed at pushing the boundaries of collaboration. The standard interaction paradigms used on laptops and desktops cannot be assumed.

© 2012 IBM Corporation Building a smarter planet 4 Your users are bringing these mobile devices to work By % of Enterprise devices will be mobile devices Within a few years, over 50% of all employees will be generation Y IBM Projection Research from Toyota USA shows gen-Y prefer new devices and gaming consoles purchase over new vehicle purchase ZDNet Many organizations dont have a plan to allow mobile devices into the workplace - Information Week

© 2012 IBM Corporation Building a smarter planet 5 Which is causing a fundamental shift from Enterprise to Personal as the Primary IT that an person experiences Personal IT Public IT Enterprise IT

© 2012 IBM Corporation Building a smarter planet As personal IT grows, enterprises will participate in IT eco systems that are controlled by vendors & carriers. 6 Enterprise IT Size & scaleIndividual Home/SoHo Enterprise Personal IT Public IT (Cloud) Public IT (Cloud) Commoditisation Consumerisation Build Buy Participate

© 2012 IBM Corporation Building a smarter planet As such we need to look at Mobility from a different point of view 7 Mobility is focused on connecting an enterprise employee, using a standard enterprise asset managed in compliance with enterprise IT standards Mobility is now about securely projecting the enterprises capability (applications) onto almost any device, anywhere that connectivity can be found Old Mobility New Mobility

© 2012 IBM Corporation Building a smarter planet An enterprise needs to address the opportunities & challenges that mobile devices & BYOD offers across the organisation, it cannot be addressed by IT alone. Human Resources: What are the policies, guidelines and programs for mobile users and bring- your-own devices? (BYOD) Legal: What are the legal requirements in different geographies? Security: How do you ensure intellectual property is secure on a variety of mobile devices? Learning: How do you educate your workforce about mobility options available to them? Communications: How do you make sure your workforce hears key messages? How do you make sure you hear your workforce? Governance: How do you align IT strategy with business strategy and ensure that the business is on track to achieve its goals? Are mobile solutions delivering business value? Information Technology: What tools and technologies are needed to enable various personas to effectively do their jobs and drive innovation? 8

© 2012 IBM Corporation Building a smarter planet You can reduce this down to a key set of items that youneed to know. You have a published policy on Mobility, BYOD & Workstation Security The practice in your enterprise matches the policy that is published Your users understand their responsibilities in a Mobile/BYOD environment You have the technology in place to ensure that the devices connecting into the enterprise Intranet are, indeed, compliant to the policy. 9

© 2012 IBM Corporation Building a smarter planet IBM today Security and safeguarding IBM data is paramount –Very conservative approach –Constantly evaluating devices, operating systems and applications for suitability IBM supports BYOD for employees –Work is no longer a place you go to –Potential to drive productivity Internal Appstore called WhirlWind –> 500 apps –More than 40k downloads –E.g. MyMobileHub delivers file sharing Lotus Traveller –Application allowing mobile access to , calendar, contacts –30% of employees currently enabled, 20% active –120,000 mobile devices, 80,000 personally owned, supported in months 2/3rds BYOD, 1/3rd IBM-supplied –Best practices from pilot now available as a client service via 10

© 2012 IBM Corporation Building a smarter planet In IBM we approach workstation security from 3 overlapping and interlocking dimensions. 11 Policy Technology Education

© 2012 IBM Corporation Building a smarter planet Every IBMer must complete relevant, online, self paced education 12

© 2012 IBM Corporation Building a smarter planet IBM has as part of the annual standards update revised our security standards to include BYOD etc. 13

© 2012 IBM Corporation Building a smarter planet IBM is in the process of extending IBM Endpoint Manager to all of the mobile devices connecting into IBM 14

© 2012 IBM Corporation Building a smarter planet IBM experience using IBM Endpoint Manager 15 BeforeAfter Patch availability typically daysPatch availability within 24 hours 92% compliance within 5 days (ACPM only) 98% within 48 hours EZUpdate sometimes misses application of patches on required machines Detected about 35% of participants missing at least one previous patch Compliance model, completely reliant on user 90% of Device requirements can be automatically remediated Exceptions at machine levelExceptions at setting level

© 2012 IBM Corporation Building a smarter planet This is only the start of the transformation – use the information gathered to make smart decisions – IBMs VPN as an example Challenges –Current tools are application or infrastructure specific –Device posture validation can be circumvented The Innovation –Provide an extensible architecture and access methodology applicable across any device –Ensures only compliant devices can access corporate internal networks User identity Device posture End-user simplicity –Automated device registration –Records based on user and respective devices 16 AAA Server (Radius) Access Gateway VPN Tunnel

© 2012 IBM Corporation Building a smarter planet In Summary. Have a published policy on Mobility, BYOD & Workstation Security Ensure the practice in your enterprise matches the policy that is published Ensure your users understand their responsibilities in a Mobile/BYOD environment Have the technology in place to ensure that the devices connecting into the enterprise Intranet are, indeed, compliant to the policy. Use the information that you gather to make decisions on access to business capability based on your unique set of circumstances. 17

Thank You Matthew Johnson – Senior Technical Staff Member Mobility Infrastructure, IBM CIO August 2012 Twitter Blog :