Publicité
Publicité

Contenu connexe

Présentations pour vous(20)

Publicité

Similaire à Secure mobile content SharePoint Best Practices Conference 2013(20)

Publicité

Secure mobile content SharePoint Best Practices Conference 2013

  1. Best Practices for Securing Mobile Content Mike Brannon, National Gypsum Ojas Rege, MobileIron Best Practices Conference (May 17, 2013)
  2. 22
  3. 3
  4. 4
  5. 5 Definition… Mobile First organizations embrace mobility as their primary IT platform in order to transform their businesses and increase their competitiveness Content of all types is easily and securely available on any device CONTENT End users choose their devices Security is invisible to end users User experience is the #1 design criteria USER EXPERIENCES New apps are developed and delivered to mobile devices first Core business processes can be performed on any device APPLICATIONS In a Mobile First Company…
  6. 66 Traditional enterprise security 6 Firewall & VPN
  7. 77 The perimeter is gone Copy/Paste Open-in Forward
  8. 88 The more the CIO says no, the less secure the organization becomes. Vivek Kundra, Former U.S. Federal CIO Responsible, not restrictive Mike Brannon, National Gypsum
  9. 99 Securing data-at-rest
  10. 1010 Open In Copy SaveView SharePoint documents Open In Copy SaveView Email attachments MobileIron Confidential10 Two primary document repositories • Solve “open in” problem • Store documents securely on device • Control cut / copy / paste actions • Selectively wipe documents • Prevent unauthorized distribution • Control end-to-end with policy • Leverage existing content repositories
  11. 1111 Securing email attachments 11 Email App Secure Content Viewer Email with Attachment REMOVE
  12. 1212 Secure Content Viewer Securing SharePoint 12 REMOVE Sharepoint
  13. 1313 Closed-loop actions when compromised 13 Remediation Notify Block Quarantine Closed-loop actions • Notify user and admin • Prevent access • Remove saved files • Remove SharePoint config • Protect enterprise persona MobileIron Confidential
  14. National Gypsum Company is a fully integrated building products manufacturer Headquartered in Charlotte, NC with mines and quarries, and manufacturing plants across North America
  15. 1515 National Gypsum Implementation • Risks / Threats Addressed: – Loss of Company Data / Lost Devices / Departing Employees – All Devices and Users Registered / Security Policies Enforced – Ease of Use for Employees AND Improved Security & Efficiency • What We Deployed (And Timeline) – MobileIron device (VSP) and support (Sentry) – All Smartphones – Blackberry (now gone), Apple iOS and Android Devices – Push Secure WiFi Config to Minimize Data Use On Premise – Rush To Adopt iPads – From 0 to 100’s of Devices! – More than email access! Apps for SharePoint and Data! – Manage “Allowed” and “Disallowed” Settings / Apps (DropBox) – Leverage Internal PKI and Push Webclips – Deliver Data
  16. 1616 • Where Are We Now? – BES Retired – 70% iOS, 25% Android, 5% Windows Devices – iPad is currently only supported Tablet – Testing others (Surface?) – Plans to allow Windows 8 and MAC OS/X BYOD – Colligo Briefcase for SharePoint Document Access – Two Apps Deployed on iOS with “One Tap For Data” National Gypsum Implementation
  17. 1717 National Gypsum Implementation
  18. 1818 Best practices for mobile content DLP 18 Closed-loop compliance Continuous management OS integrity OS versioning Passcode / encryption Auto-wipe Identity Secure tunnel Attachment protection Secure content hub Role of cloud Credible ecosystem MobileIron Confidential
  19. 1919 Security considerations 2013+ … “No” not a sustainable option -> provide credible alternatives Massive content ecosystem -> crowd-source but don’t lock-in Uncertain economics -> establish “help-yourself-desk” Dynamic risk at endpoint -> automate your mobile trust model Content always one-click from cloud -> co-habitate responsibly Blurring between content and app -> explore new forms
  20. 2020 Content doesn’t exist in isolation Enterprise Mobile Persona Native experience Data separation Shared policy Selective wipe Secure communications Email Apps Certs Policy Content Federated identity
  21. 2121 Journey to the Mobile First Enterprise Device Security BYOD (user choice) Email access (secure ActiveSync) Multi-OS security (BlackBerry replacement) App & Content Enablement 1st gen of mobile apps Mobile docs (SharePoint) Cloud protections Business Transformation New user & business experiences
  22. 222222 First Enterprise app store BYOD privacy Selective wipe Jailbreak detection Email attachment DLP 97% Customer support satisfaction 4500+ Customers globally (3000 in last 15 months) 8 of top 10 global automotive 7 of top 10 global pharma 5 of top 10 global banks Strongest mobile ecosystem Recognized Gartner: Leaders Quadrant IDC: #1 growth and share Deployed Security and management for mobile enterprise apps, documents, and devices Innovation and Customer Success Best mobile enterprise service
  23. Thank you Mike Brannon (mebrannon@nationalgypsum.com Ojas Rege (ojas@mobileiron.com, twitter @orege)

Notes de l'éditeur

  1. A company is Mobile First when 1 – all new applications and business processes are available to Mobile devices FirstCLICK2 – Corporate documents are securely available on any deviceCLICK3 – and most importantly, end users choose the device they want to use and security is enforced by IT without getting in the way of an outstanding user experienceThis last point is paramount. For the first time in the history of IT, we have an opportunity to allow end users to carry out business processes on a device and with a user experience that they love and they WANT to use.
  2. Lost Devices – From the beginning we could assist with trying to find devices, and we could SELECTIVELY wipe our corporate data and configuration from the devicesSome devices will appear to accept ActiveSync host directives – but then NOT actually do it! An Agent on the device, using the MFG API – does enforce our policy!Installation – Obtain the App in the store – then one very simple registration to then connect to the device and user – Interaction with Active Directory, policy engine in MI and our internal PKI – full configuration “appears” after registration!
  3. We went from more than 900 devices managed via our BES to none in 5 years.Those Blackberry devices were replaced by a much more diverse set of devices all chosen by our employees – NOT by the IT Group!We are certain that the new fleet of devices is at least as secure – if not more secure – than the old one! We have BYOD working securely!In addition the setup and management of the new fleet of diverse devices works very efficiently and delivers data people need to do their jobs better!(Old BES only delivered email / calendar – NOT Apps!)
  4. We went from more than 900 devices managed via our BES to none in 5 years.Those Blackberry devices were replaced by a much more diverse set of devices all chosen by our employees – NOT by the IT Group!We are certain that the new fleet of devices is at least as secure – if not more secure – than the old one! We have BYOD working securely!In addition the setup and management of the new fleet of diverse devices works very efficiently and delivers data people need to do their jobs better!(Old BES only delivered email / calendar – NOT Apps!)
Publicité