SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
BYOD Risk Management Best Practices
Presented by:
Troy Fulton, Director, Product Marketing
May 22 & 23, 2013

© 2013 Tangoe, Inc.
Today’s Speaker
Troy Fulton
Director, Product Marketing
• 20+ years in high-tech and communications devices
• Senior product marketing and management positions with global
corporations including Motorola Mobility, Nokia, and Compaq
• MBA from The College of William and Mary; BA from Boston

College

© 2013 Tangoe, Inc.

2
Agenda
• BYOD Trends
• Concerns and Risks
• Segmentation
• Mistakes to avoid
• Security and Access Management
• Best Practices
• Critical Success Factors

• Shared Control

© 2013 Tangoe, Inc.
A Radical Shift is Occurring

© 2013 Tangoe, Inc.

4
Gartner: The BYO Trend is Clear
• Over 60% of employees report
using a personal device for work
• US and APAC lead, EU lags
• 2/3 of consumers report that work

influences what they buy for
personal devices
• By 2015, emphasis will shift
toward cost-reduction through
mandatory BYO programs
• PC BYOD lags smartphones and
tablets (<8% of companies) but
will accelerate in 2014+

© 2013 Tangoe, Inc.

5
Concerns and Risks
• Not surprising drivers and concerns
• 55%: employee satisfaction = productivity

(Source: Information Security Group survey 4/2013)

•

54%: need for increased employee mobility

•

51%: increased employee productivity

•

Favorite devices: iOS (72%), followed by Android, Blackberry, Microsoft

• Concerns
•

70% stated security as top criteria for success

•

Loss of company or client data, unauthorized access and malware infections

•

Lack the resources necessary to address security concerns

•

33% stated they do not have even a basic BYOD policy in place

• 78% of security professionals believe BYOD is a significant risk

(Source: Frost and Sullivan)

• Unknown level of exposure
• Where is our data?
• Who has access to what resources?
• Who else has, or could have, access to our data and resources?

• Is BYOD strategic?

© 2013 Tangoe, Inc.

6
Segment Employees and Security Profiles
Corporate
Liable
Formal
BYOD
Minimal
BYOD

Under the
Radar
• Employee owned
device without
corporate support or
awareness
• No trust, no access

• Employee owned
device with usage
policy enforcement for
selected applications
and data

• Senior execs and
knowledge workers to
replace corporatesupplied devices
and/or protect
strategic IP and data
• Event trigger-based
policy enforcement
• Full network access

• Event trigger-based
policy enforcement

• Strong authentication

• Minimal access / trust

• Event trigger-based
policy enforcement
• Full network access
• Strong authentication
• Full support
• IT approved device

• MDM client required

• IT approved device

• Fully trusted

• IT approved device

• No support

• Corporate supplied
device and formal
processes to enforce
compliance respective
to role and location.

•

• Minimal support

© 2013 Tangoe, Inc.

• MDM client required

7
From “Under the Radar” to “Over the Dam”
• No management results in BYOD happening without you
• Easy connect into company systems and store business data
• No identification, tracking or management.

• Microsoft EAS does not help
• Does not identify and remediate a jailbroken or rotted device
• No enforcement of device, OS or app version controls.
• “Free and easy“ was not tolerated for company or personal laptops

• In the real world…
• Easy for devices to connect to company systems – no alerts
• No lifecycle management
•

Apps, data, and network access credentials are not removed

•

Unmanaged (unknown) devices remain fully active until passwords expire.

• Best practices:
• No access to email, LAN, VPN, Wi-Fi or other services without authentication
• Users are limited to 2 devices

© 2013 Tangoe, Inc.

8
Getting Started: Policy Strategy Questions
• Who qualifies?
• What devices are allowed?
• Who buys/owns the device?

• What service expenses will be covered, and how?
• What is supported, at what level?
• What does the employee have to do?
• Enterprise security, data usage and privacy restrictions

• Employee privacy issues
• Labor implications of after-hours support
• Liability issues (E-discovery)
• Limitations on reimbursement (what is the strategy?)
• Penalties for noncompliance (and enforcement?
• Data and phone number transition at termination
• Support policies and liability issues must be reviewed by the corporate legal department, the
executive board, HR and business unit managers.
© 2013 Tangoe, Inc.

9
Minimal Acceptable Usage Policy Guidelines
• All devices
• Device will lock your account after 10 failed login attempts.

• Device will lock every 30 minutes requiring reentry of your password.
• Password rotation every 90 days with minimal strength
• Remote wipe:
•

Lose the device; terminate employment; IT detects data or policy breach or virus

• Minimum device level: iPhone 4, iOS 5.0x, Android 3.x
• Company-administered MDM
• No jailbreak & no rooting policies
• Certificates for any and all access: email, apps, networks
• Application and data encryption at all times

• Personal devices
• Limit device enrollments at company discretion
• Filter sensitive data at company discretion
• Accept company lock/wipe decisions
• Require end-user acceptable-use policy agreement

© 2013 Tangoe, Inc.

10
Mistakes to Avoid: Inconsistent Security Policies
• Focus on business requirements first and devices second
• Policy gaps are the origins of most mobile security failures

• Determine approved platform options for BYOD
• Get cross-departmental buy-in
• Business information requirements may be overly broad and difficult to fulfill
across mobile platforms

• Security policies need to account for OS limitations
• Adapt data and application policies accordingly, and document your policies

• All mobile devices are work platforms, irrespective of liability model
• Anticipate that mobile work platform loss could result in data breach event
• May require disclosure
• Know and track your device, application, and data inventory

© 2013 Tangoe, Inc.

11
Mistakes to Avoid: Data Leakage
• DLP has low visibility
• Security managers report these events tend to be ignored by decision makers
• Pervasive data fragmentation
• Send, save and mingle
• Difficult to trace or audit

• Consider data container solutions
• Options range from email encryption to content management
• Prioritize based on employee role, data sensitivity and access method

• Unsafe device sharing
• Tablets for business will end up playing “Barney” reruns or sports research at a BBQ
• Built-in (and reliable) biometric security…not on the immediate horizon
• Lost devices…be proactive
• Mitigate risks
•

Strong authentication for connectivity

•

Credentials that expire after a period of time

•

Dual persona containerization

© 2013 Tangoe, Inc.

12
Mistakes to Avoid: Click First, Worry Later
• Applications want your data
• iOS and Android apps are designed to be sandboxed
• End-users are not aware of risks from apps obtaining data from other apps

• Includes: contacts, location (current and history), Facebook friends, purchases
•

Data is tracked and sold

• Example: unapproved email application obtains login credentials

• Malware
• iOS has low risk
• Android has experienced more malware incidents

• Best practices
• App AUPs for employee devices

• Control limits of app installation on iOS and Android vs. Windows and Blackberry
• Mitigate on the device via containerization or virtualization
• Protect network resources via web application firewall
• Android has unique risks
•

Unapproved OS versions available

•

Applications from unofficial sources
© 2013 Tangoe, Inc.

13
BYOD Security and Access Best Practices
• Mobility is not a traditional IT silo
• Cross-functional governance
• Core team: business, apps, I&O, policy

• Baseline resource access to resources
• Liability model and AUPs

• Audit installed apps for non-compliance

• Create semi-annual strategy

• Perform background app inventory analysis

• Report to CIO

• Risk management

• IT governance council includes mobile

• Automated trigger-based responses
• Out of compliance real time monitoring
• Notifications and alerts
• Feature and function changes
• Out of compliance
•

Device OS is out of date

•

• Define use cases and app strategy

• Pitfalls to avoid
• Approaching mobility as tactical and not
strategic
• Choosing technology first

Applications requiring a patch

•

Process for compliance enforcement

• Work across organizational structure

No password = no encryption

•

•

Jailbroken and rooted detection

© 2013 Tangoe, Inc.
BYOD Security and Access Critical Success Factors
• Create an access baseline

• Automate device provisioning

• Determine who has access

• Pre-configure AUP liability models

• Identify access control gaps

• Integrate with TEM procurement

• Tie access controls to environment

• Terminate unused accounts

• Segregate access by role and liability

• Prevent access to resources

model

• Consider a device recycle program

• Best practice what works best for your

• Proactively monitor for unusual activity

company

• Monitor high volume of SMS or data

• Check applicable regulations

• Control remote access to apps and

• Policy of “least access”

databases

• Regulators want doctrine of “least

• Mobility and cloud computing expand the

privilege” applied
• Enable specific security roles to enforce

enterprise operational perimeter
• NAC is becoming a baseline requirement

security and access management

policies

© 2013 Tangoe, Inc.
Tactics to Share (Not Gain) Control
• Consumerisation is not a uni-direction highway
• Successful BYOD is a true win-win
• Shared accountability
• Make (sustainable) choices

• No strategy, no hope for control
• Segmentation is key
•

Trust, liability, users, approved devices and applications, data management

•

Cross-discipline buy-in
•

One approach (aka PC) will not fly

•

Security enforcement consistency across segments

•

Know what employees need now vs. next year

•

Guide business leaders

• Revisit application architectures & tools
• Thinner = lower cost and more device neutral

• BYOD benefits
• Innovation, employee satisfaction, and cost optimization

© 2013 Tangoe, Inc.

16
Questions and Contacts

Troy Fulton
Director Product Marketing
Troy.Fulton@tangoe.com

Tangoe
203.859.9300
info@tangoe.com

www.tangoe.com

© 2013 Tangoe, Inc.

Contenu connexe

Tendances

Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...UL Transaction Security
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...Andris Soroka
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security failEnclaveSecurity
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Huntsman Security
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionEnclaveSecurity
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Summit 7 Systems
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...Information Security Awareness Group
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessPrecisely
 

Tendances (20)

Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings  InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings
 
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 

Similaire à BYOD risk management best practices

Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013 Troy C. Fulton
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityBitglass
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellAMD Developer Central
 
Locking down risks from unlocked devices
Locking down risks from unlocked devices  Locking down risks from unlocked devices
Locking down risks from unlocked devices Troy C. Fulton
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecuritySmartCompliance
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyResilient Systems
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device managementJason Murray
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Christopher Hunt
 

Similaire à BYOD risk management best practices (20)

Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD Security
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
 
Locking down risks from unlocked devices
Locking down risks from unlocked devices  Locking down risks from unlocked devices
Locking down risks from unlocked devices
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?Mobile Device Management - Can You Afford (Not) to Go IT Alone?
Mobile Device Management - Can You Afford (Not) to Go IT Alone?
 
GadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentationGadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentation
 

Dernier

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

BYOD risk management best practices

  • 1. BYOD Risk Management Best Practices Presented by: Troy Fulton, Director, Product Marketing May 22 & 23, 2013 © 2013 Tangoe, Inc.
  • 2. Today’s Speaker Troy Fulton Director, Product Marketing • 20+ years in high-tech and communications devices • Senior product marketing and management positions with global corporations including Motorola Mobility, Nokia, and Compaq • MBA from The College of William and Mary; BA from Boston College © 2013 Tangoe, Inc. 2
  • 3. Agenda • BYOD Trends • Concerns and Risks • Segmentation • Mistakes to avoid • Security and Access Management • Best Practices • Critical Success Factors • Shared Control © 2013 Tangoe, Inc.
  • 4. A Radical Shift is Occurring © 2013 Tangoe, Inc. 4
  • 5. Gartner: The BYO Trend is Clear • Over 60% of employees report using a personal device for work • US and APAC lead, EU lags • 2/3 of consumers report that work influences what they buy for personal devices • By 2015, emphasis will shift toward cost-reduction through mandatory BYO programs • PC BYOD lags smartphones and tablets (<8% of companies) but will accelerate in 2014+ © 2013 Tangoe, Inc. 5
  • 6. Concerns and Risks • Not surprising drivers and concerns • 55%: employee satisfaction = productivity (Source: Information Security Group survey 4/2013) • 54%: need for increased employee mobility • 51%: increased employee productivity • Favorite devices: iOS (72%), followed by Android, Blackberry, Microsoft • Concerns • 70% stated security as top criteria for success • Loss of company or client data, unauthorized access and malware infections • Lack the resources necessary to address security concerns • 33% stated they do not have even a basic BYOD policy in place • 78% of security professionals believe BYOD is a significant risk (Source: Frost and Sullivan) • Unknown level of exposure • Where is our data? • Who has access to what resources? • Who else has, or could have, access to our data and resources? • Is BYOD strategic? © 2013 Tangoe, Inc. 6
  • 7. Segment Employees and Security Profiles Corporate Liable Formal BYOD Minimal BYOD Under the Radar • Employee owned device without corporate support or awareness • No trust, no access • Employee owned device with usage policy enforcement for selected applications and data • Senior execs and knowledge workers to replace corporatesupplied devices and/or protect strategic IP and data • Event trigger-based policy enforcement • Full network access • Event trigger-based policy enforcement • Strong authentication • Minimal access / trust • Event trigger-based policy enforcement • Full network access • Strong authentication • Full support • IT approved device • MDM client required • IT approved device • Fully trusted • IT approved device • No support • Corporate supplied device and formal processes to enforce compliance respective to role and location. • • Minimal support © 2013 Tangoe, Inc. • MDM client required 7
  • 8. From “Under the Radar” to “Over the Dam” • No management results in BYOD happening without you • Easy connect into company systems and store business data • No identification, tracking or management. • Microsoft EAS does not help • Does not identify and remediate a jailbroken or rotted device • No enforcement of device, OS or app version controls. • “Free and easy“ was not tolerated for company or personal laptops • In the real world… • Easy for devices to connect to company systems – no alerts • No lifecycle management • Apps, data, and network access credentials are not removed • Unmanaged (unknown) devices remain fully active until passwords expire. • Best practices: • No access to email, LAN, VPN, Wi-Fi or other services without authentication • Users are limited to 2 devices © 2013 Tangoe, Inc. 8
  • 9. Getting Started: Policy Strategy Questions • Who qualifies? • What devices are allowed? • Who buys/owns the device? • What service expenses will be covered, and how? • What is supported, at what level? • What does the employee have to do? • Enterprise security, data usage and privacy restrictions • Employee privacy issues • Labor implications of after-hours support • Liability issues (E-discovery) • Limitations on reimbursement (what is the strategy?) • Penalties for noncompliance (and enforcement? • Data and phone number transition at termination • Support policies and liability issues must be reviewed by the corporate legal department, the executive board, HR and business unit managers. © 2013 Tangoe, Inc. 9
  • 10. Minimal Acceptable Usage Policy Guidelines • All devices • Device will lock your account after 10 failed login attempts. • Device will lock every 30 minutes requiring reentry of your password. • Password rotation every 90 days with minimal strength • Remote wipe: • Lose the device; terminate employment; IT detects data or policy breach or virus • Minimum device level: iPhone 4, iOS 5.0x, Android 3.x • Company-administered MDM • No jailbreak & no rooting policies • Certificates for any and all access: email, apps, networks • Application and data encryption at all times • Personal devices • Limit device enrollments at company discretion • Filter sensitive data at company discretion • Accept company lock/wipe decisions • Require end-user acceptable-use policy agreement © 2013 Tangoe, Inc. 10
  • 11. Mistakes to Avoid: Inconsistent Security Policies • Focus on business requirements first and devices second • Policy gaps are the origins of most mobile security failures • Determine approved platform options for BYOD • Get cross-departmental buy-in • Business information requirements may be overly broad and difficult to fulfill across mobile platforms • Security policies need to account for OS limitations • Adapt data and application policies accordingly, and document your policies • All mobile devices are work platforms, irrespective of liability model • Anticipate that mobile work platform loss could result in data breach event • May require disclosure • Know and track your device, application, and data inventory © 2013 Tangoe, Inc. 11
  • 12. Mistakes to Avoid: Data Leakage • DLP has low visibility • Security managers report these events tend to be ignored by decision makers • Pervasive data fragmentation • Send, save and mingle • Difficult to trace or audit • Consider data container solutions • Options range from email encryption to content management • Prioritize based on employee role, data sensitivity and access method • Unsafe device sharing • Tablets for business will end up playing “Barney” reruns or sports research at a BBQ • Built-in (and reliable) biometric security…not on the immediate horizon • Lost devices…be proactive • Mitigate risks • Strong authentication for connectivity • Credentials that expire after a period of time • Dual persona containerization © 2013 Tangoe, Inc. 12
  • 13. Mistakes to Avoid: Click First, Worry Later • Applications want your data • iOS and Android apps are designed to be sandboxed • End-users are not aware of risks from apps obtaining data from other apps • Includes: contacts, location (current and history), Facebook friends, purchases • Data is tracked and sold • Example: unapproved email application obtains login credentials • Malware • iOS has low risk • Android has experienced more malware incidents • Best practices • App AUPs for employee devices • Control limits of app installation on iOS and Android vs. Windows and Blackberry • Mitigate on the device via containerization or virtualization • Protect network resources via web application firewall • Android has unique risks • Unapproved OS versions available • Applications from unofficial sources © 2013 Tangoe, Inc. 13
  • 14. BYOD Security and Access Best Practices • Mobility is not a traditional IT silo • Cross-functional governance • Core team: business, apps, I&O, policy • Baseline resource access to resources • Liability model and AUPs • Audit installed apps for non-compliance • Create semi-annual strategy • Perform background app inventory analysis • Report to CIO • Risk management • IT governance council includes mobile • Automated trigger-based responses • Out of compliance real time monitoring • Notifications and alerts • Feature and function changes • Out of compliance • Device OS is out of date • • Define use cases and app strategy • Pitfalls to avoid • Approaching mobility as tactical and not strategic • Choosing technology first Applications requiring a patch • Process for compliance enforcement • Work across organizational structure No password = no encryption • • Jailbroken and rooted detection © 2013 Tangoe, Inc.
  • 15. BYOD Security and Access Critical Success Factors • Create an access baseline • Automate device provisioning • Determine who has access • Pre-configure AUP liability models • Identify access control gaps • Integrate with TEM procurement • Tie access controls to environment • Terminate unused accounts • Segregate access by role and liability • Prevent access to resources model • Consider a device recycle program • Best practice what works best for your • Proactively monitor for unusual activity company • Monitor high volume of SMS or data • Check applicable regulations • Control remote access to apps and • Policy of “least access” databases • Regulators want doctrine of “least • Mobility and cloud computing expand the privilege” applied • Enable specific security roles to enforce enterprise operational perimeter • NAC is becoming a baseline requirement security and access management policies © 2013 Tangoe, Inc.
  • 16. Tactics to Share (Not Gain) Control • Consumerisation is not a uni-direction highway • Successful BYOD is a true win-win • Shared accountability • Make (sustainable) choices • No strategy, no hope for control • Segmentation is key • Trust, liability, users, approved devices and applications, data management • Cross-discipline buy-in • One approach (aka PC) will not fly • Security enforcement consistency across segments • Know what employees need now vs. next year • Guide business leaders • Revisit application architectures & tools • Thinner = lower cost and more device neutral • BYOD benefits • Innovation, employee satisfaction, and cost optimization © 2013 Tangoe, Inc. 16
  • 17. Questions and Contacts Troy Fulton Director Product Marketing Troy.Fulton@tangoe.com Tangoe 203.859.9300 info@tangoe.com www.tangoe.com © 2013 Tangoe, Inc.