SlideShare une entreprise Scribd logo
1  sur  39
Télécharger pour lire hors ligne
© 2013 InterWorks, Page 1
© 2013 InterWorks, Page 2
The BYOD Phenomenon
“68% of devices used by information workers to access
business applications are ones they own themselves,
including laptops, smartphones, and tablets.”
“IT organizations underestimate the number of
personal mobile devices on their network by 50%.”
“By 2020, 70% of ‘4 Pillar Solution’ buyers will have the
LOB as their buyer.”
4 Pillars = mobile, cloud, big data, social media
1IDC Research, The Mobility Game Changer, June 2013
© 2013 InterWorks, Page 3
What is BYOD?
Option 1:
BYoD refers to employees bringing their own computing devices – to
the workplace for use on the corporate network.
Option 2:
BYoD is a change in how we move the cost of computing from
corporate owned devices to personally owned devices.
Option 3:
BYoD is the fundamental change in how we view ownership of, not just
devices, but also data, applications, & network. It changes how we
approach our company’s security, culture, & responsibility.
© 2013 InterWorks, Page 4
Fight or Embrace?
“Fighting BYOD is like the quixotic effort to resist the
use of PCs or the Web in business — it’s a losing
battle with no real strategic purpose or
long-term upside.”
- Forrester Research1
1 Forrester “Charting The Rising Tide Of Bring-Your-Own Technology”, June 12, 2012
© 2013 InterWorks, Page 5
Fight or Embrace?
“The rise of “BYoD" is the single most radical shift in
the economics of client computing for business since
PCs invaded the workplace.” - Gartner1
“The rise of “BYoD" is the single most radical cultural
shift in the corporate workplace since the typewriter.”
- Caston Thomas
1 Gartner “Bring Your Own Device: New Opportunities, New Challenges”, August 16, 2012
© 2013 InterWorks, Page 6
• Data loss
– Lost phone or laptop
– Unauthorized access
– Compromised systems
• APT/Malware
– Threats in the network
• Compliance
– Rogue infrastructure
– Unauthorized apps (e.g., dropbox)
– Unauthorized data (e.g., drug interaction)
The Risks of BYOD
For more depth, see:
Gartner,“Strategic Road Map for Network Access Control”,
Lawrence Orans and John Pescatore,11 October 2011
© 2013 InterWorks, Page 7
What Are Your BYOD Solution Options?
CHARACTERISTICSSOLUTION
© 2013 InterWorks, Page 8
What Are Your BYOD Solution Options?
CHARACTERISTICSSOLUTION
Manage all personal devices
(MDM)
• Good security at the device level
• Ignores Windows and Macs
• Separate management console
• No network protection
© 2013 InterWorks, Page 9
What Are Your BYOD Solution Options?
CHARACTERISTICSSOLUTION
Manage all personal devices
(MDM)
• Good security at the device level
• Ignores Windows and Macs
• Separate management console
• No network protection
Restrict the data (VDI) • Strong data protection
• Poor user experience
• Not for the road warrior
© 2013 InterWorks, Page 10
What Are Your BYOD Solution Options?
CHARACTERISTICSSOLUTION
Manage all personal devices
(MDM)
• Good security at the device level
• Ignores Windows and Macs
• Separate management console
• No network protection
Restrict the data (VDI) • Strong data protection
• Poor user experience
• Not for the road warrior
Control apps (MAM, MAW) • Leading edge approach
• Must be used with other controls
© 2013 InterWorks, Page 11
What Are Your BYOD Solution Options?
CHARACTERISTICSSOLUTION
Control devices (MDM) • Good security at the device level
• Ignores Windows and Macs
• Separate management console
• No network protection
Control data (VDI) • Strong data protection
• Poor user experience
• Not for the road warrior
Control apps (MAM, MAW) • Leading edge approach
• Must be used with other controls
Control the network (NAC) • Simple, fast, 100% coverage
• Protects data on the network,
not on the device
© 2013 InterWorks, Page 12
“No matter what BYOD strategy is selected, the
ability to detect when unmanaged devices are in
use for business purposes will be required — and
that requires NAC.”
Gartner Recommendations
Gartner, “NAC Strategies for Supporting BYOD Environments”,
22 December 2011, Lawrence Orans and John Pescatore
© 2013 InterWorks, Page 13
Multiple Security Choices
© 2013 InterWorks, Page 14
Multiple Security Choices
© 2013 InterWorks, Page 15
Multiple Security Choices
© 2013 InterWorks, Page 16
Multiple Security Choices
© 2013 InterWorks, Page 17
Multiple Security Choices
© 2013 InterWorks, Page 18
Network Access Policy
“Points of Integration”
• Universal visibility
• Universal access policy
• Universal reporting
• Automated enrollment
• On-access assessment
• Block malicious activity
© 2013 InterWorks, Page 19
The Enterprise Challenge:
Balance Access Agility With Security
• Employees, Guests,
Contractors
• Personal devices
• Wireless, wired,
VPN, mobile
• Data loss
• Zero-day attacks
and malware
• Endpoint integrity
• Regulations and
compliance
Security
Access
Agility
Requires real-time,
comprehensive
visibility
Requires real-time,
automated controls
© 2013 InterWorks, Page 20
End-To-End Security Automation
See
Grant
Fix
Protect
© 2013 InterWorks, Page 21
( ( ( ( ( ( (
See Grant Fix Protect
• What type of device?
• Who owns it?
• Who is logged in?
• What applications?
© 2013 InterWorks, Page 22
See Grant Fix Protect
• Grant access
• Register guests
• Block access
• Restrict access
( ( ( ( ( ( (
© 2013 InterWorks, Page 23
See Grant Fix Protect
• Remediate OS
• Fix security agents
• Fix configuration
• Start/stop applications
• Disable peripheral
© 2013 InterWorks, Page 24
See Grant Fix Protect
• Detect unexpected behavior
• Block insider attack
• Block worms
• Block intrusions
© 2013 InterWorks, Page 25
See Grant Fix Protect
MOVE & DISABLERESTRICT ACCESSALERT & REMEDIATE
Deploy a Virtual Firewall around an infected
or non-compliant device
Reassign the device into a VLAN with
restricted access
Update access lists (ACLs) on switches,
firewalls and routers to restrict access
Automatically move device to a pre-
configured guest network
Open trouble ticket
Send email notification
SNMP Traps
Syslog
HTTP browser hijack
Auditable end-user acknowledgement
Self-remediation
Integrate with SMS, WSUS, SCCM,
Lumension, BigFix
Reassign device from production VLAN to
quarantine VLAN
Block access with 802.1X
Alter login credentials to block access
Block access with device authentication
Turn off switch port (802.1X or SNMP)
Terminate unauthorized applications
Disable peripheral device
© 2013 InterWorks, Page 26
• A variety of actions are
available to manage, remediate
and restrict mobile devices
• Multiple actions can be stacked
together to provide even more
control
Mobile Security Remediation
© 2013 InterWorks, Page 27
SANS Report: “Your Pad or Mine:
Enabling Secure Personal and Mobile
Device Use on Your Network”
IDC Report: “Architecting a Flexible
Strategy for Securing Enterprise Bring
Your Own Device (BYOD)”
Whitepapers
© 2013 InterWorks, Page 28
1. Form a committee
– Multiple IT departments
– Users across departments
10 Steps to BYOD Implementation
© 2013 InterWorks, Page 29
1. Form a committee
2. Gather data
– Devices in use?
– Ownership of devices?
– Applications in use?
– Entry paths?
10 Steps to BYOD Implementation
© 2013 InterWorks, Page 30
1. Form a committee
2. Gather data
3. Identify use cases
– Which applications?
– Which users? Role?
– Offline use?
– Sensitivity of data?
10 Steps to BYOD Implementation
© 2013 InterWorks, Page 31
1. Form a committee
2. Gather data
3. Identify use cases
4. Create an economic model
– Device costs (capital)
– Data connectivity costs (expense)
– Employee stipends (expense)
– Software license costs (capital)
– Employee productivity gains
– Infrastructure costs (security, bandwidth, data protection)
10 Steps to BYOD Implementation
© 2013 InterWorks, Page 32
1. Form a committee
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
– Which devices will you support?
– Which corporate applications?
– Which users?
– How will data be secured?
– Acceptable use?
– What if the device is lost or stolen?
– How will the endpoint be updated?
10 Steps to BYOD Implementation
© 2013 InterWorks, Page 33
1. Form a committee
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
6. Decide how to protect your network
– Manual or automated ?
– Types of compliance checks?
– Multiple wireless networks or one network?
10 Steps to BYOD Implementation
© 2013 InterWorks, Page 34
1. Form a committee
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
6. Decide how to protect your network
7. Decide how to protect data
– Containerization on the mobile device?
– Hosted Virtual Desktop?
10 Steps to BYOD Implementation
© 2013 InterWorks, Page 35
1. Form a committee
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
6. Decide how to protect your network
7. Decide how to protect data
8. Build a project plan
– Remote device management?
– Cloud storage?
– Wipe devices when employees are terminated?
10 Steps to BYOD Implementation
© 2013 InterWorks, Page 36
1. Form a committee
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
6. Decide how to protect your network
7. Decide how to protect data
8. Build a project plan
9. Evaluate solutions
– Ease of implementation?
– Cost?
– Security?
– Usability?
10 Steps to BYOD Implementation
© 2013 InterWorks, Page 37
1. Form a committee
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
6. Decide how to protect your network
7. Decide how to protect data
8. Build a project plan
9. Evaluate solutions
10.Implement solutions
– Phased approach
– Monitor, then pilot, then full deployment
10 Steps to BYOD Implementation
© 2013 InterWorks, Page 38
1. Form a committee
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
6. Decide how to protect your network
7. Decide how to protect data
8. Build a project plan
9. Evaluate solutions
10.Implement solutions
10 Steps to BYOD Implementation
© 2013 InterWorks, Page 39
1. Form a committee
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
6. Decide how to protect your network
7. Decide how to protect data
8. Build a project plan
9. Evaluate solutions
10.Implement solutions
10 Steps to BYOD Implementation

Contenu connexe

Tendances

IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
Dr Laurent Guiraud
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
Jim Romeo
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
Potato
 

Tendances (20)

IoT.ppt
IoT.pptIoT.ppt
IoT.ppt
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
Legal certainty as a tool for the spread of the internet of things
Legal certainty as a tool for the spread of the internet of thingsLegal certainty as a tool for the spread of the internet of things
Legal certainty as a tool for the spread of the internet of things
 
IoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityIoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and security
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security Considerations
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
 

En vedette

Effects ppt
Effects pptEffects ppt
Effects ppt
gnitu
 
BALANCE OF PAYMENTInternational flow of goods & services & coping with curren...
BALANCE OF PAYMENTInternational flow of goods & services & coping with curren...BALANCE OF PAYMENTInternational flow of goods & services & coping with curren...
BALANCE OF PAYMENTInternational flow of goods & services & coping with curren...
Hilal Ahmad
 
9b absolute comparative advantage
9b absolute comparative advantage9b absolute comparative advantage
9b absolute comparative advantage
maynardteacher
 
Research lesson problem statement
Research lesson problem statementResearch lesson problem statement
Research lesson problem statement
Harve Abella
 
Income And Substitution Effect
Income And Substitution EffectIncome And Substitution Effect
Income And Substitution Effect
night seem
 
Law of supply
Law of supplyLaw of supply
Law of supply
Balamoni
 

En vedette (14)

262796504806
262796504806262796504806
262796504806
 
Presentation1
Presentation1Presentation1
Presentation1
 
Effects ppt
Effects pptEffects ppt
Effects ppt
 
BALANCE OF PAYMENTInternational flow of goods & services & coping with curren...
BALANCE OF PAYMENTInternational flow of goods & services & coping with curren...BALANCE OF PAYMENTInternational flow of goods & services & coping with curren...
BALANCE OF PAYMENTInternational flow of goods & services & coping with curren...
 
9b absolute comparative advantage
9b absolute comparative advantage9b absolute comparative advantage
9b absolute comparative advantage
 
Research lesson problem statement
Research lesson problem statementResearch lesson problem statement
Research lesson problem statement
 
Public Policy Formulation and Analysis
 Public Policy Formulation and Analysis  Public Policy Formulation and Analysis
Public Policy Formulation and Analysis
 
Economics ppt 2nd sem- aishwarya pandey
Economics ppt 2nd sem- aishwarya pandeyEconomics ppt 2nd sem- aishwarya pandey
Economics ppt 2nd sem- aishwarya pandey
 
Income And Substitution Effect
Income And Substitution EffectIncome And Substitution Effect
Income And Substitution Effect
 
The Impact Of Government Policy On Business
The Impact Of Government Policy On BusinessThe Impact Of Government Policy On Business
The Impact Of Government Policy On Business
 
Policy formulation
Policy formulationPolicy formulation
Policy formulation
 
Law of supply
Law of supplyLaw of supply
Law of supply
 
Introduction To Macro Economics
Introduction To Macro EconomicsIntroduction To Macro Economics
Introduction To Macro Economics
 
Microeconomics: Introduction and basic concepts
Microeconomics: Introduction and basic conceptsMicroeconomics: Introduction and basic concepts
Microeconomics: Introduction and basic concepts
 

Similaire à How I learned to stop worrying & love the BYOD

Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
tjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
lmelaine
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
jeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
odiliagilby
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
vrickens
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
Madison Oliver
 

Similaire à How I learned to stop worrying & love the BYOD (20)

Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
SFScon15 - Charalampos Doukas: "Decentralising the IoT through adoptive Gatew...
SFScon15 - Charalampos Doukas: "Decentralising the IoT through adoptive Gatew...SFScon15 - Charalampos Doukas: "Decentralising the IoT through adoptive Gatew...
SFScon15 - Charalampos Doukas: "Decentralising the IoT through adoptive Gatew...
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Wp byod
Wp byodWp byod
Wp byod
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
sample assignment
sample assignmentsample assignment
sample assignment
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 
BYOD - Secure the data, not the device
BYOD - Secure the data, not the deviceBYOD - Secure the data, not the device
BYOD - Secure the data, not the device
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Internet of things(iot)
Internet of things(iot)Internet of things(iot)
Internet of things(iot)
 

Plus de Caston Thomas

7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
Caston Thomas
 

Plus de Caston Thomas (8)

Master gardeners... meet... "High Yech"
Master gardeners... meet... "High Yech"Master gardeners... meet... "High Yech"
Master gardeners... meet... "High Yech"
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 
How to adapt to the IoT
How to adapt to the IoTHow to adapt to the IoT
How to adapt to the IoT
 
How to adapt to the IOT
How to adapt to the IOTHow to adapt to the IOT
How to adapt to the IOT
 
The internet of things (io t) for issa v1.3
The internet of things (io t) for issa v1.3The internet of things (io t) for issa v1.3
The internet of things (io t) for issa v1.3
 
Inter works golden circles for healthcare it
Inter works golden circles for healthcare itInter works golden circles for healthcare it
Inter works golden circles for healthcare it
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

How I learned to stop worrying & love the BYOD

  • 2. © 2013 InterWorks, Page 2 The BYOD Phenomenon “68% of devices used by information workers to access business applications are ones they own themselves, including laptops, smartphones, and tablets.” “IT organizations underestimate the number of personal mobile devices on their network by 50%.” “By 2020, 70% of ‘4 Pillar Solution’ buyers will have the LOB as their buyer.” 4 Pillars = mobile, cloud, big data, social media 1IDC Research, The Mobility Game Changer, June 2013
  • 3. © 2013 InterWorks, Page 3 What is BYOD? Option 1: BYoD refers to employees bringing their own computing devices – to the workplace for use on the corporate network. Option 2: BYoD is a change in how we move the cost of computing from corporate owned devices to personally owned devices. Option 3: BYoD is the fundamental change in how we view ownership of, not just devices, but also data, applications, & network. It changes how we approach our company’s security, culture, & responsibility.
  • 4. © 2013 InterWorks, Page 4 Fight or Embrace? “Fighting BYOD is like the quixotic effort to resist the use of PCs or the Web in business — it’s a losing battle with no real strategic purpose or long-term upside.” - Forrester Research1 1 Forrester “Charting The Rising Tide Of Bring-Your-Own Technology”, June 12, 2012
  • 5. © 2013 InterWorks, Page 5 Fight or Embrace? “The rise of “BYoD" is the single most radical shift in the economics of client computing for business since PCs invaded the workplace.” - Gartner1 “The rise of “BYoD" is the single most radical cultural shift in the corporate workplace since the typewriter.” - Caston Thomas 1 Gartner “Bring Your Own Device: New Opportunities, New Challenges”, August 16, 2012
  • 6. © 2013 InterWorks, Page 6 • Data loss – Lost phone or laptop – Unauthorized access – Compromised systems • APT/Malware – Threats in the network • Compliance – Rogue infrastructure – Unauthorized apps (e.g., dropbox) – Unauthorized data (e.g., drug interaction) The Risks of BYOD For more depth, see: Gartner,“Strategic Road Map for Network Access Control”, Lawrence Orans and John Pescatore,11 October 2011
  • 7. © 2013 InterWorks, Page 7 What Are Your BYOD Solution Options? CHARACTERISTICSSOLUTION
  • 8. © 2013 InterWorks, Page 8 What Are Your BYOD Solution Options? CHARACTERISTICSSOLUTION Manage all personal devices (MDM) • Good security at the device level • Ignores Windows and Macs • Separate management console • No network protection
  • 9. © 2013 InterWorks, Page 9 What Are Your BYOD Solution Options? CHARACTERISTICSSOLUTION Manage all personal devices (MDM) • Good security at the device level • Ignores Windows and Macs • Separate management console • No network protection Restrict the data (VDI) • Strong data protection • Poor user experience • Not for the road warrior
  • 10. © 2013 InterWorks, Page 10 What Are Your BYOD Solution Options? CHARACTERISTICSSOLUTION Manage all personal devices (MDM) • Good security at the device level • Ignores Windows and Macs • Separate management console • No network protection Restrict the data (VDI) • Strong data protection • Poor user experience • Not for the road warrior Control apps (MAM, MAW) • Leading edge approach • Must be used with other controls
  • 11. © 2013 InterWorks, Page 11 What Are Your BYOD Solution Options? CHARACTERISTICSSOLUTION Control devices (MDM) • Good security at the device level • Ignores Windows and Macs • Separate management console • No network protection Control data (VDI) • Strong data protection • Poor user experience • Not for the road warrior Control apps (MAM, MAW) • Leading edge approach • Must be used with other controls Control the network (NAC) • Simple, fast, 100% coverage • Protects data on the network, not on the device
  • 12. © 2013 InterWorks, Page 12 “No matter what BYOD strategy is selected, the ability to detect when unmanaged devices are in use for business purposes will be required — and that requires NAC.” Gartner Recommendations Gartner, “NAC Strategies for Supporting BYOD Environments”, 22 December 2011, Lawrence Orans and John Pescatore
  • 13. © 2013 InterWorks, Page 13 Multiple Security Choices
  • 14. © 2013 InterWorks, Page 14 Multiple Security Choices
  • 15. © 2013 InterWorks, Page 15 Multiple Security Choices
  • 16. © 2013 InterWorks, Page 16 Multiple Security Choices
  • 17. © 2013 InterWorks, Page 17 Multiple Security Choices
  • 18. © 2013 InterWorks, Page 18 Network Access Policy “Points of Integration” • Universal visibility • Universal access policy • Universal reporting • Automated enrollment • On-access assessment • Block malicious activity
  • 19. © 2013 InterWorks, Page 19 The Enterprise Challenge: Balance Access Agility With Security • Employees, Guests, Contractors • Personal devices • Wireless, wired, VPN, mobile • Data loss • Zero-day attacks and malware • Endpoint integrity • Regulations and compliance Security Access Agility Requires real-time, comprehensive visibility Requires real-time, automated controls
  • 20. © 2013 InterWorks, Page 20 End-To-End Security Automation See Grant Fix Protect
  • 21. © 2013 InterWorks, Page 21 ( ( ( ( ( ( ( See Grant Fix Protect • What type of device? • Who owns it? • Who is logged in? • What applications?
  • 22. © 2013 InterWorks, Page 22 See Grant Fix Protect • Grant access • Register guests • Block access • Restrict access ( ( ( ( ( ( (
  • 23. © 2013 InterWorks, Page 23 See Grant Fix Protect • Remediate OS • Fix security agents • Fix configuration • Start/stop applications • Disable peripheral
  • 24. © 2013 InterWorks, Page 24 See Grant Fix Protect • Detect unexpected behavior • Block insider attack • Block worms • Block intrusions
  • 25. © 2013 InterWorks, Page 25 See Grant Fix Protect MOVE & DISABLERESTRICT ACCESSALERT & REMEDIATE Deploy a Virtual Firewall around an infected or non-compliant device Reassign the device into a VLAN with restricted access Update access lists (ACLs) on switches, firewalls and routers to restrict access Automatically move device to a pre- configured guest network Open trouble ticket Send email notification SNMP Traps Syslog HTTP browser hijack Auditable end-user acknowledgement Self-remediation Integrate with SMS, WSUS, SCCM, Lumension, BigFix Reassign device from production VLAN to quarantine VLAN Block access with 802.1X Alter login credentials to block access Block access with device authentication Turn off switch port (802.1X or SNMP) Terminate unauthorized applications Disable peripheral device
  • 26. © 2013 InterWorks, Page 26 • A variety of actions are available to manage, remediate and restrict mobile devices • Multiple actions can be stacked together to provide even more control Mobile Security Remediation
  • 27. © 2013 InterWorks, Page 27 SANS Report: “Your Pad or Mine: Enabling Secure Personal and Mobile Device Use on Your Network” IDC Report: “Architecting a Flexible Strategy for Securing Enterprise Bring Your Own Device (BYOD)” Whitepapers
  • 28. © 2013 InterWorks, Page 28 1. Form a committee – Multiple IT departments – Users across departments 10 Steps to BYOD Implementation
  • 29. © 2013 InterWorks, Page 29 1. Form a committee 2. Gather data – Devices in use? – Ownership of devices? – Applications in use? – Entry paths? 10 Steps to BYOD Implementation
  • 30. © 2013 InterWorks, Page 30 1. Form a committee 2. Gather data 3. Identify use cases – Which applications? – Which users? Role? – Offline use? – Sensitivity of data? 10 Steps to BYOD Implementation
  • 31. © 2013 InterWorks, Page 31 1. Form a committee 2. Gather data 3. Identify use cases 4. Create an economic model – Device costs (capital) – Data connectivity costs (expense) – Employee stipends (expense) – Software license costs (capital) – Employee productivity gains – Infrastructure costs (security, bandwidth, data protection) 10 Steps to BYOD Implementation
  • 32. © 2013 InterWorks, Page 32 1. Form a committee 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies – Which devices will you support? – Which corporate applications? – Which users? – How will data be secured? – Acceptable use? – What if the device is lost or stolen? – How will the endpoint be updated? 10 Steps to BYOD Implementation
  • 33. © 2013 InterWorks, Page 33 1. Form a committee 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect your network – Manual or automated ? – Types of compliance checks? – Multiple wireless networks or one network? 10 Steps to BYOD Implementation
  • 34. © 2013 InterWorks, Page 34 1. Form a committee 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect your network 7. Decide how to protect data – Containerization on the mobile device? – Hosted Virtual Desktop? 10 Steps to BYOD Implementation
  • 35. © 2013 InterWorks, Page 35 1. Form a committee 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect your network 7. Decide how to protect data 8. Build a project plan – Remote device management? – Cloud storage? – Wipe devices when employees are terminated? 10 Steps to BYOD Implementation
  • 36. © 2013 InterWorks, Page 36 1. Form a committee 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect your network 7. Decide how to protect data 8. Build a project plan 9. Evaluate solutions – Ease of implementation? – Cost? – Security? – Usability? 10 Steps to BYOD Implementation
  • 37. © 2013 InterWorks, Page 37 1. Form a committee 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect your network 7. Decide how to protect data 8. Build a project plan 9. Evaluate solutions 10.Implement solutions – Phased approach – Monitor, then pilot, then full deployment 10 Steps to BYOD Implementation
  • 38. © 2013 InterWorks, Page 38 1. Form a committee 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect your network 7. Decide how to protect data 8. Build a project plan 9. Evaluate solutions 10.Implement solutions 10 Steps to BYOD Implementation
  • 39. © 2013 InterWorks, Page 39 1. Form a committee 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect your network 7. Decide how to protect data 8. Build a project plan 9. Evaluate solutions 10.Implement solutions 10 Steps to BYOD Implementation