SlideShare une entreprise Scribd logo
1  sur  26
Enabling Inside-Out Network Security



                    BYOD and Your Business




     Learn about the BYOD trend, the risks associated with this trend,
    and how to successfully adopt BYOD while securing your network.
Agenda
Enabling Inside-Out Network Security




    •   The rise of BYOD
    •   Security risks associated with BYOD
    •   A BYOD strategy
    •   NetClarity’s Internal Security Solution
The Rise of BYOD
Enabling Inside-Out Network Security



      • Gartner projects a 9-40% savings using
        employee PCs
      • 1 in 10 use personal computers for
        primary work device today
      • 50% use personal computers for work at
        some time
      • 43% of companies have a written policy,
        with specific rules
BYOD: A fast-growing Dilemma
Enabling Inside-Out Network Security


    The challenge: seamless and secure management of ALL device

     Personal AND Professional Wired AND Wireless                  ANY operating system




         By 2016 at least 50% of enterprise email users will rely primarily on a browser,
                 tablet or mobile client instead of a desktop client. – Gartner
                                             - AND -
                     Today, 80% of attacks occur inside the network - SANS
The “Security” dilemma of BYOD
Enabling Inside-Out Network Security




    1. People
    2. Processes
    3. Policy
    4. Technology



                                                      5
Breach Statistics
Enabling Inside-Out Network Security


  174 million compromised records last year




    …and their firewall didn’t stop them!

                                                 Verizon 2012 Data Breach Investigations Report
Enabling Inside-Out Network Security




               And you thought a firewall
                 was all you needed?
BYOD: How is security breached?
Enabling Inside-Out Network Security


                                                  1. Accidentally download
                                                     malware onto your device.
                                                  2. Bring that device into work
                                                     and bypass the firewall.
                                                  3. A Trojan gets onto the
                                                     network.
                                                  4. Data gets transferred to a
                                                     hacker without you even
                                                     knowing it!




                                                                          Data
What’s the real internal security problem?
Enabling Inside-Out Network Security


        All Networks and IP Devices have Holes that
                       are known as:
                 Common Vulnerabilities and
                    Exposures (CVE)


                                                       https://nvd.nist.gov/
BYOD Risk: New Malware Outbreaks…
Enabling Inside-Out Network Security




    Your favorite anti-virus program catches no more than 70-90% of
     malware!

    What’s running on everyone’s personal device? Who knows?
BYOD Risk: New Malware Outbreaks…
Enabling Inside-Out Network Security



                       “Here's a video of my Droid cell phone that was hacked
                       after I loaded the new "Mobile Skype" program. It's as if
                       the phone has been possessed. Had to get a new cell.”

                                   http://www.youtube.com/watch?v=mpZgw5Db2ok

                       “Noticed this crazy messaging happening on my iPad2
                       earlier this evening.

                       You can see that there are messages being sent (blue
                       background) and the keypad is not being used at the
                       time. Secondly, I don't have a Romanian number or
                       contact. Thirdly, I don't speak Romanian.

                       Weird I tells ye! and it's still messaging back and forth as
                       I type here.”
                                       http://www.youtube.com/watch?v=wa9H-8Q1FeA
BYOD Risk: CVEs (iPhone sample…)
Enabling Inside-Out Network Security


  The current value of credit cards on the black market – Look, you can even buy in bulk!




                                See: http://nvd.nist.gov
BYOD Risk: Lost or Stolen?
Enabling Inside-Out Network Security




      “More than
      a third of
      consumers
      have had
      cell phones
      lost or
      stolen”
BYOD Risks: Control and Compliance
Enabling Inside-Out Network Security


         Behind every firewall, you need to manage BYOD.




     The businesses in each of these vertical markets
     are all very different, but they are all faced with
     similar challenges:

           • Ensuring Business Continuity.
           • Controlling Network Access.
           • Ensuring Regulatory Compliance.
BYOD Strategy
Enabling Inside-Out Network Security


     People  Awareness, training, culture

     Process  Assessments, real-time monitoring,
     onboarding/departing employees, quarantining
     devices

     Policy  Acceptable use, email security, access
     control, password policy, patch mgmt., incident
     response, business continuity

     Technology  NAC, MDM, firewalls, A/V,
     IPS/WIPS, etc.
Multi-faceted Internal Security
Enabling Inside-Out Network Security




                                           IPS/IDS
                                                      Firewall
                                  End Point
                                  Protection




       Asset Management
        and Access Control.                          Internal Security
       Vulnerability
        management,
        compliance reporting
        and Auditing
       Zero-Day Defense
Internal UTM: Critical technology
Enabling Inside-Out Network Security




        Remember, while firewalls protect
        networks from the outside-in, over
         80% of successful attacks come
                 from the inside.

        There is a major need for internal
        UTM to secure networks from the
                   inside-out.
Inside-Out Network Security™ Appliances
Enabling Inside-Out Network Security




          Scalable from 25 devices to thousands

                                          •   Immediately control access by any
                                              and all types of devices – if you don’t
                                              want them on the network, they don’t
                                              get on the network.

                                          •   Identify network holes (CVE®s) on the
                                              inside of your network and guide
                                              proactive remediation process

                                          •   Defend against malware through
                                              automated detection and blocking
Enabling Inside-Out Network Security
Enabling Inside-Out Network Security
Enabling Inside-Out Network Security
How NetClarity stops a breach
Enabling Inside-Out Network Security

                                         1. Accidentally download malware onto your
                                            device.
                                         2. Bring that device into work and bypass
                                            the firewall.
                                         3. A Trojan gets onto the network.
                                         4. NetClarity quarantines the device that
                                            has a Trojan installs
                                         5. NetClarity stops the hacker from
                                            receiving the data he was hoping to
                                            obtain!




                                                                                      Data
The BYOD NACwall Appliance Awards
Enabling Inside-Out Network Security




    “NetClarity Picks Up Where Firewalls,
    Anti-virus, Intrusion Detection Systems
    and Intrusion Prevention Systems
    Leave Off”
    – John Gallant, President, Network World
   “The only Next Gen. NAC solution to be        “The Most
   integrated with RSA enVision® for             Innovative NAC
   enterprise-wide internal risk management”     Vendor in the World”
                                                 – Network Products Guide, Hot
   – Apurva More, RSA Secured Program Manager    Companies, 2009, 2010, 2011
Next Generation NAC, Manages BYOD!
Enabling Inside-Out Network Security




                              “When evaluating NAC solutions, look for vendors
                              that understand the consumerization trend and
                              support, or have plans to support, policies for
                              managing the non-Microsoft endpoints
                              that will inevitably attempt to connect to your
                              network….


                                   • Convenient to install
                                   • Universal in application
                                   • All devices, OS,
                                     wired/wireless              Gartner NAC Report, 12/2010
In Summary: Managing BYOD
Enabling Inside-Out Network Security




   1. Personal devices are pervasive but the
      BYOD trend isn’t going anywhere.

   2. They add a new level of risk
      management to the organization.

   3. There are technologies to mitigate the
      risk, like NetClarity’s NACwalls!
Questions?
Enabling Inside-Out Network Security




www.netclarity.net

Contenu connexe

Tendances

Cyber Security
Cyber SecurityCyber Security
Cyber Securityfrcarlson
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Sophos
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol reviewFabio Pietrosanti
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hDave Arvin
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Security B-Sides
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsPeter Wood
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind MalwareSophos
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Anna Stirling
 

Tendances (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol review
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_h
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Exposing the Money Behind Malware
Exposing the Money Behind MalwareExposing the Money Behind Malware
Exposing the Money Behind Malware
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 

Similaire à BYOD and Your Business

Firewall
FirewallFirewall
FirewallGarmian
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Information security questions
Information security questions Information security questions
Information security questions gamemaker762
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)HITCON GIRLS
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Jiunn-Jer Sun
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxpdevang
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsLumension
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 

Similaire à BYOD and Your Business (20)

Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking AboutCybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
 
Firewall
FirewallFirewall
Firewall
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Information security questions
Information security questions Information security questions
Information security questions
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
 
dccn ppt-1.pptx
dccn ppt-1.pptxdccn ppt-1.pptx
dccn ppt-1.pptx
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 

Dernier

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

BYOD and Your Business

  • 1. Enabling Inside-Out Network Security BYOD and Your Business Learn about the BYOD trend, the risks associated with this trend, and how to successfully adopt BYOD while securing your network.
  • 2. Agenda Enabling Inside-Out Network Security • The rise of BYOD • Security risks associated with BYOD • A BYOD strategy • NetClarity’s Internal Security Solution
  • 3. The Rise of BYOD Enabling Inside-Out Network Security • Gartner projects a 9-40% savings using employee PCs • 1 in 10 use personal computers for primary work device today • 50% use personal computers for work at some time • 43% of companies have a written policy, with specific rules
  • 4. BYOD: A fast-growing Dilemma Enabling Inside-Out Network Security The challenge: seamless and secure management of ALL device Personal AND Professional Wired AND Wireless ANY operating system By 2016 at least 50% of enterprise email users will rely primarily on a browser, tablet or mobile client instead of a desktop client. – Gartner - AND - Today, 80% of attacks occur inside the network - SANS
  • 5. The “Security” dilemma of BYOD Enabling Inside-Out Network Security 1. People 2. Processes 3. Policy 4. Technology 5
  • 6. Breach Statistics Enabling Inside-Out Network Security 174 million compromised records last year …and their firewall didn’t stop them! Verizon 2012 Data Breach Investigations Report
  • 7. Enabling Inside-Out Network Security And you thought a firewall was all you needed?
  • 8. BYOD: How is security breached? Enabling Inside-Out Network Security 1. Accidentally download malware onto your device. 2. Bring that device into work and bypass the firewall. 3. A Trojan gets onto the network. 4. Data gets transferred to a hacker without you even knowing it! Data
  • 9. What’s the real internal security problem? Enabling Inside-Out Network Security All Networks and IP Devices have Holes that are known as: Common Vulnerabilities and Exposures (CVE) https://nvd.nist.gov/
  • 10. BYOD Risk: New Malware Outbreaks… Enabling Inside-Out Network Security  Your favorite anti-virus program catches no more than 70-90% of malware!  What’s running on everyone’s personal device? Who knows?
  • 11. BYOD Risk: New Malware Outbreaks… Enabling Inside-Out Network Security “Here's a video of my Droid cell phone that was hacked after I loaded the new "Mobile Skype" program. It's as if the phone has been possessed. Had to get a new cell.” http://www.youtube.com/watch?v=mpZgw5Db2ok “Noticed this crazy messaging happening on my iPad2 earlier this evening. You can see that there are messages being sent (blue background) and the keypad is not being used at the time. Secondly, I don't have a Romanian number or contact. Thirdly, I don't speak Romanian. Weird I tells ye! and it's still messaging back and forth as I type here.” http://www.youtube.com/watch?v=wa9H-8Q1FeA
  • 12. BYOD Risk: CVEs (iPhone sample…) Enabling Inside-Out Network Security The current value of credit cards on the black market – Look, you can even buy in bulk! See: http://nvd.nist.gov
  • 13. BYOD Risk: Lost or Stolen? Enabling Inside-Out Network Security “More than a third of consumers have had cell phones lost or stolen”
  • 14. BYOD Risks: Control and Compliance Enabling Inside-Out Network Security Behind every firewall, you need to manage BYOD. The businesses in each of these vertical markets are all very different, but they are all faced with similar challenges: • Ensuring Business Continuity. • Controlling Network Access. • Ensuring Regulatory Compliance.
  • 15. BYOD Strategy Enabling Inside-Out Network Security People  Awareness, training, culture Process  Assessments, real-time monitoring, onboarding/departing employees, quarantining devices Policy  Acceptable use, email security, access control, password policy, patch mgmt., incident response, business continuity Technology  NAC, MDM, firewalls, A/V, IPS/WIPS, etc.
  • 16. Multi-faceted Internal Security Enabling Inside-Out Network Security IPS/IDS Firewall End Point Protection  Asset Management and Access Control. Internal Security  Vulnerability management, compliance reporting and Auditing  Zero-Day Defense
  • 17. Internal UTM: Critical technology Enabling Inside-Out Network Security Remember, while firewalls protect networks from the outside-in, over 80% of successful attacks come from the inside. There is a major need for internal UTM to secure networks from the inside-out.
  • 18. Inside-Out Network Security™ Appliances Enabling Inside-Out Network Security Scalable from 25 devices to thousands • Immediately control access by any and all types of devices – if you don’t want them on the network, they don’t get on the network. • Identify network holes (CVE®s) on the inside of your network and guide proactive remediation process • Defend against malware through automated detection and blocking
  • 22. How NetClarity stops a breach Enabling Inside-Out Network Security 1. Accidentally download malware onto your device. 2. Bring that device into work and bypass the firewall. 3. A Trojan gets onto the network. 4. NetClarity quarantines the device that has a Trojan installs 5. NetClarity stops the hacker from receiving the data he was hoping to obtain! Data
  • 23. The BYOD NACwall Appliance Awards Enabling Inside-Out Network Security “NetClarity Picks Up Where Firewalls, Anti-virus, Intrusion Detection Systems and Intrusion Prevention Systems Leave Off” – John Gallant, President, Network World “The only Next Gen. NAC solution to be “The Most integrated with RSA enVision® for Innovative NAC enterprise-wide internal risk management” Vendor in the World” – Network Products Guide, Hot – Apurva More, RSA Secured Program Manager Companies, 2009, 2010, 2011
  • 24. Next Generation NAC, Manages BYOD! Enabling Inside-Out Network Security “When evaluating NAC solutions, look for vendors that understand the consumerization trend and support, or have plans to support, policies for managing the non-Microsoft endpoints that will inevitably attempt to connect to your network…. • Convenient to install • Universal in application • All devices, OS, wired/wireless Gartner NAC Report, 12/2010
  • 25. In Summary: Managing BYOD Enabling Inside-Out Network Security 1. Personal devices are pervasive but the BYOD trend isn’t going anywhere. 2. They add a new level of risk management to the organization. 3. There are technologies to mitigate the risk, like NetClarity’s NACwalls!
  • 26. Questions? Enabling Inside-Out Network Security www.netclarity.net

Notes de l'éditeur

  1. Cost savingsConvenienceAlready in serviceCost savingsIncreased employee satisfactionIncreased employee productivityCost savings
  2. 80% of attacks occur inside a network – behind the firewallMost BYOD devices will be wireless – but must be managed in tandem with wired.A myriad of:devices (phones, tablets, laptops), operating systems (Linux, IP-phone, Windows, iOS, Android), threats (malware, vulnerabilities)inside the network
  3. When do we know if a BYOD is on our network?How do we stop Rogue or Untrusted BYOD access?Is all BYOD Traffic Encrypted Well Enough to Ensure Compliance with PCI-DSS, HIPAA/HITECH, FERPA, GLBA or SOX-404?Are BYODs Harboring Personally Identifiable Information (PII)?Can we Require Whole Device Data Encryption to Protect this very Sensitive/High Risk Data?What if a BYOD gets lost or stolen? Can we (IT Staff) force a remote ‘wipe’ or ‘kill code’ on an employee owned device with corporate data on it?How do we Sync? How do we Backup BYOD?Is there any Good Firewall or Anti-virus/Anti-malware for BYOD?How do we Enforce Policies on BYOD employee-owned equipment?
  4. Firewalls do NOTPrevent malware from infecting a deviceStop the spread of malware within your networkPrevent high risk data, PII, etc from leaving your network
  5. Keyloggers and the use of stolen credentialsBackdoors and command controlTamperingPretextingPhishingBrute forceSQL injectionFor the most part, firewalls are one-way streets. Once the attacker is on the inside, they are presumed trusted, and can connect outward just as easily as a person surfing the web or checking email.
  6. http://blog.imperva.com/2011/10/current-value-of-credit-cards-on-the-black-market-part-ii.html
  7. What if the Former Employee was using Personally Owned Mobile Devices?What is your IT Security/Human Resources combined Checklist you go through when an Employee Leaves (voluntarily or involuntarily)?Does the Plan include Mobile Devices and their Company-related Data stored on the device? (Or are You Ready to Crack a Potentially Encrypted Backup you may have Retained?)
  8. In school settings:Students bring devices at their own riskThis means that if they bring a device, they are responsible for keeping it safe and secureThey should not leave their device in a classroom, even if the teacher allows itThe students are responsible for the appropriate use of their personal computing devicesIn government and business settings:Employees bring devices at the organizations’ riskThis means that if you bring a device, The IT STAFF is responsible for ensuring it does not increase risk by way of DATA LEAKAGE, DATA THEFT, HACKING and MALWARE OUTBREAKS
  9. Bottom line: GET THE DEVICE OWNER TO ASSUME SOME LEVEL OF RESPONSIBILITYTechnology affords you time, security
  10. “Consumerization is an unstoppable trend, and most organizations need to demonstrate flexibility and allow employees to use their personal devices for work. But, they also need to establish limits and not permit every device, every operating system and every configuration. Although approaches such as server-based computing and virtualization will also be used to deal with consumerization, NAC provides the flexibility that enterprises need in a BYOD environment, while providing the controls that enable network and security managers to retain control over the network.”
  11. Keyloggers and the use of stolen credentialsBackdoors and command controlTamperingPretextingPhishingBrute forceSQL injectionFor the most part, firewalls are one-way streets. Once the attacker is on the inside, they are presumed trusted, and can connect outward just as easily as a person surfing the web or checking email.
  12. Convinient to install, and universal in application.NetClarity is the vendor that targets SMBs and can manage all endpoints. Its family of NACwall appliances use an agentless (no additional software on the PCs) approach to baseline the health of the endpoints. NACwalls are deployed out of band in LANs, so they install easily and are not in the line of traffic…”