4. Why is security a concern with BYOD? Unauthorized smart phones connecting to enterprise network Mobile Wi-Fi hotspots bypassing perimeter security 3G Intrusion threats Extrusion threats Rater, Intr A sion – pun intended!
5.
6.
7.
8.
9. Wireless Intrusion Prevention Systems (WIPS) Eavesdropping Unauthorized Access WPA2 Firewall, Wired IPS Wi-Phishing Honeypots External APs Cracking External Users Rogue AP Misconfigured AP Ad hoc Connections Wireless DoS WIPS
11. With this in place, your network is protected from all types of wireless threats, vulnerabilities and attack tools! External APs Rogue APs (On Network) Authorized APs AP Classification STOP Client Classification Policy Mis-config GO STOP IGNORE DoS External Clients Authorized Clients Rogue Clients AUTOMATICALLY DETECT AND BLOCK RED PATHS! WIPS policy enforcement
18. Extrusion threats from personal smartphones Detect and block authorized clients from connecting to personal mobile hotspots (iPhone MyWi, Android Mobile AP, etc.) Mobile Honeypot Authorized Client 3G Blocked by WIPS Allowed by WIPS Authorized AP Internet
19.
Notes de l'éditeur
Take high resolution picture of this Samsung phone in Pune office. Take another picture of iPhone screen in Pune office.