1 SANS Technology Institute - Candidate for Master of Science Degree 1 Deployment of iPads Lessons from the Trenches Jim Horwath March 2012 GIAC GSE, GCUX,

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Network Systems Sales LLC
Security for Mobile Devices
City of Boroondara Mobile Device Management
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
© 2014 Cognizant 4 th March 2015 MBaaS: Mobile Backend as a Service Pablo Gutiérrez / Senior Mobility developer.
SANS Technology Institute - Candidate for Master of Science Degree Design Phase 1 of an iPhone Rollout Mark Baggett, Jim Horwath June 2010.
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Help enable mobile productivity. For years, companies have leveraged Microsoft solutions for their productivity needs. In an evolving cloud-first and mobile-first.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Live for today as if it is your last day but plan for tomorrow as if it will last forever!
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
1. 2 New Computing Models, and What They Mean to the Small and Mid Sized Business Consumer How your business can make practical decisions between “The.
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
by Evolve IP Managed Services
Cloud computing Tahani aljehani.
Mobility Methods for document access while away from the office.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
 Cloud computing is one of the more recent technologies that many businesses, individuals and other industry organizations believe to by one of the keys.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
SEC835 Database and Web application security Information Security Architecture.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
Confidential The Power to Connect. Business presentations in boardrooms, conference rooms and outside the office are always in high demand. With CircleHub,
Lessons Learned in Smart Grid Cyber Security
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
10/8/20151 Mobile Apps and QAD Stephen McHugh Broom Street Software 03-17,2013.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Gary Gruba Systems Engineer Absolute Manage MDM Managing iPhones, iPads, iPod Touches and Android Dougald MacNaughton Account Executive.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.
Wireless and Mobile Security
IT as a Service (ITaaS) by Evolve IP Managed Services Last Update: May 19, 2015.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Built atop SharePoint Online, WorkPoint 365 Offers a Project and Case Management Solution to Boost Business Productivity and Deliver Governance OFFICE.
Easily Organize Common Templates, Phrases, Statements and More to Quickly Reuse Within Microsoft Office 365 Using Dolphin Compose WHAT WE OFFER Replace.
Take Control of Your Contracts with Dolphin 365, a Companion Product to Microsoft Office 365 That Leverages Your Investment and Reduces Risk OFFICE 365.
VDI AND DAAS – SAY WHAT?!? Bob Marshall, MD MPH MISM FAAFP Faculty, Valley Family Medicine Residency Faculty, DoD Clinical Informatics Fellowship.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Scott Musgrove Senior Business Systems Analyst Water Corporation of Western Australia Developing for an Evolving Mobility Landscape: How Do You Hit a Moving.
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
Managed IT Services JND Consulting Group LLC
#SummitNow Managing Mobile Content Wednesday 13 th November 2013 Mike Hatfield, Lead Engineer Mobile Apps, Alfresco Marc Dubresson, Dir. Mobile Product.
Total Enterprise Mobility Comprehensive Management and Security
StreetSmart Mobile Workforce App Incorporates Microsoft Office 365 Outlook Add-In for Improved Field Worker Scheduling and Streamlined Invoicing OFFICE.
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Mobile Data Solutions Inc
Tim Carter Sales Director Sybase Confidential Propriety.
Deployment Planning Services
2016 Citrix presentation.
in All Office 365 Apps for Enterprise Companies
Tim Carter Sales Director Sybase Confidential Propriety.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Emerging technologies-
Yooba File Sync: A Microsoft Office 365 Add-In That Syncs Sales Content in SharePoint Online to Yooba’s Sales Performance Management Solution OFFICE 365.
Presentation transcript:

1 SANS Technology Institute - Candidate for Master of Science Degree 1 Deployment of iPads Lessons from the Trenches Jim Horwath March 2012 GIAC GSE, GCUX, GCIA, GCIH, GREM, GSEC, GSIP

SANS Technology Institute - Candidate for Master of Science Degree 2 Objective  Overview of the iPad and the effect it will have on business  Security risks of bringing a consumer oriented device such as an iPad into a corporate environment  Security and lack of controls on an iPad - what you need to know  Operational costs and headaches associated with deploying iPads to users  The management nightmare of deploying iPad - patching, securing, keeping users safe from themselves  This is NOT an explanation concerning iPad forensics

SANS Technology Institute - Candidate for Master of Science Degree 3 The iPad Storm Apple’s incredible sales numbers and market penetration Time magazine gave the iPad one of the 50 best inventions of 2010 Medical, legal, and sales staff were early adopters of iPads Apple’s App Store imposes censorship of content causing issues with books and magazines Closed system – but still more applications available for iOS than Androids No support for flash

SANS Technology Institute - Candidate for Master of Science Degree 4 Consumer Device – Security an Afterthought Penetration into Fortune 100 companies and other businesses made iPads THE status symbol  Executives see convenience, increased productivity, and freedom  Status symbol cost - This addictive appeal has a cost to it – device + monthly fees  Default configuration has few security controls e.g. No password  Consumers want ease – especially younger users  Closed platform - not too much security information available  No anti-virus or malware controls

SANS Technology Institute - Candidate for Master of Science Degree 5 Policy Is Your Friend Policy will become your best friend – develop early and involve the right people  Acceptable Use Policy (AUP)  Change Management  Device is meant for employee use only – not spouse, children or relatives  Security Awareness  Make users aware of common problems  Shoulder surfing – gets worse with complex passcodes

SANS Technology Institute - Candidate for Master of Science Degree 6 Security Issues - Strengths  Hardware encryption uses AES 256-bit encryption  APIs with the ability to lock-down access  Controlled environment with non-jailbroken devices  Applications receive a sandbox and are separate from each other  API provides a method for device lock/unlock/password reset/wipe  Implementation and engineering guarded IP secret  Cellular communications harder (but not impossible) to capture  Need to test security controls very thoroughly and keep notes regarding the test results

SANS Technology Institute - Candidate for Master of Science Degree

8 Security Issues - Challenges  Limited number of configurable items  There are items the user can change and there is no GPO-like facility to reinforce settings  No logging or event log like facility  Implementation and engineering guarded IP secret  Bluecoat K9 to use as a WEB proxy – but user can choose not to use it – you have to use a 3rd party product to enforce it  Companies lose control of data – dropbox, Google docs, iCloud  Alphanumeric credentials anywhere on the device echo characters as you type them  No warning or acceptable banner, network connectivity is always on

SANS Technology Institute - Candidate for Master of Science Degree

10 Infrastructure Issues Where do employees sync devices Is your corporate infrastructure ready for iTunes (packaging, updates, etc.) If iPad users sync to corporate assets, is your storage and backup environment ready Is there a business requirement to access internal resources - example Citrix for applications Can devices connect internally to wireless infrastructure – how do you control it Data leaves daily with employees and their iPads

SANS Technology Institute - Candidate for Master of Science Degree 11 Operational Challenges  Keeping iOS current – no mass distribution method  iOS 5.0 does allow software updates outside of iTunes  Apple provides a low-cost configuration utility iPhone Configuration Utility (ICU)  Mobile Device Management (MDM) software is young  Creation of a “Gold Image” is difficult  iTunes and corporate acceptance  Backing up devices onto personal employee assets – who owns the data  On corporate owned assets does your infrastructure allow for the additional overhead of iTunes and backups

SANS Technology Institute - Candidate for Master of Science Degree 12 More Operational Challenges  Blocking pop-ups -- users cannot change it – blocking pop-ups can stop things like SANS OnDemand from working  Very confusing with some terms: “Auto-Lock” and “Grace- Period”  How do you handle provisioning – corporate vs. personal devices  What happens after employee separation, companies cannot verify  License cost of software is unknown (productivity software for example)  Decreases productivity for some workers

SANS Technology Institute - Candidate for Master of Science Degree 13 Hello Help Desk... Users are scary Problems range from common to the bizarre Calling for device setup – most common Documentation of common problems should be available to users Added cost to train help desk staff on iPad triage Younger help desk staff are better than older staff due to familiarity of the technology Mail stopped and I need it now – the higher up the food chain the more demanding the user

SANS Technology Institute - Candidate for Master of Science Degree 14 Enterprise Management of iPads  Apple provides iPhone Configuration Utility (ICU) – good for just a few devices and proof of concepts  Mobile Device Management (MDM) products are young and lack maturity  Some examples: McAfee, Sybase, Good, AirWatch, BoxTone  Microsoft Active Sync will allow any device with a valid user name and password to connect  Lotus Notes requires granting access to Lotus traveler  How does this integrate into your authentication source LDAP/AD/Domino LDAP/Token  Do your homework!

SANS Technology Institute - Candidate for Master of Science Degree 15 Mobile Device Management (MDM) Software Policy, awareness, education and AUP are critical Managing a fleet of iPads requires management software MDM market place is emerging and not mature Employees – especially executives - quickly become “addicted” to an iPad, stability is a key issue Apple’s closed platform limits what vendors can do – most vendors do the same thing Managed service versus in-house, versus hybrid Managing a fleet of iPads requires management software

SANS Technology Institute - Candidate for Master of Science Degree 16 MDM Lessons Survey says and calendaring are the most important applications to an executive Be careful with demonstrations Negotiations - be prepared for push-back on policies from executive – they want convenience and not necessarily security Field communications is critical – leverage company communications and change management process Implement a test environment that is similar to production Be careful of firewall rules if using an in-house managed product Be very careful with destruction capabilities – a mistake can be career ending

SANS Technology Institute - Candidate for Master of Science Degree

18 Summary  Mobile computing is here to stay – learn it, embrace it, and control it the best you can  Mobile computing can give your firm a competitive advantage  Develop policy based on business need and use cases  Continual user education and awareness will go a long way  Invest in MDM software to manage devices  Avoid being an early adopter