Presentation is loading. Please wait.

Presentation is loading. Please wait.

BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.

Similar presentations


Presentation on theme: "BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile."— Presentation transcript:

1 BYOD: An IT Security Perspective

2 What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace, and use those devices to access privileged company information and applications. Source: http://en.wikipedia.org/wiki/Bring_your_own_devicehttp://en.wikipedia.org/wiki/Bring_your_own_device Bring your own device is an alternative strategy allowing employees, business partners and other users to utilize a personally selected and purchased client device to execute enterprise applications and access data. Typically, it spans smart phones and tablets, but the strategy may also be used for PCs. Source: http://www.gartner.com/it-glossary/bring-your-own-device-byodhttp://www.gartner.com/it-glossary/bring-your-own-device-byod

3 What is BYOD to Security Professionals? RISK

4 The Problem  Loss of control over your data  Lost or Stolen Devices  Exposing your internal network to unmanaged devices  Difficulty in Reporting Vulnerability Status  Compliance Concerns eg PCI  Increasing Number of Viruses Targeting Mobile Devices

5  Mobile Device Policy  Balancing act  Password Protection  Encryption of Company Data  Remote Wiping of Devices  Define a standard  Must support the business  Security Awareness Training  Explain the risks The Solution

6  Deploy a Mobile Device Management Tool  Ability to provision and de-provision apps and profiles  It should support granular remote wipe and have the ability to track lost or stolen devices  Deploy an Application Aware IPS  You need to understand what applications are running across your network as you no longer control the endpoint  Deploy a Content Aware Network based DLP System  Without a dedicated DLP system you will have no visibility of data that is leaving your organization  Use a Security Operations Center to monitor everything  Continuous 24/7 monitoring and alerting

7 Take Away Points  BYOD is here to stay  You need to be prepared to implement the infrastructure to secure data on employee owned devices  You need to be able to effectively monitor devices for compliance to the Mobile Device Policy  You need to maintain and be able to demonstrate that you comply with legislation

8 Thank You Greg Fagan Security Architect Greg.Fagan@gsoc.co.za 082 800 5342


Download ppt "BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile."

Similar presentations


Ads by Google