SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
Mobile Device Management:
Taking Containerization
to the Next Level
151002_oml_v1p | Public | © Omlis Limited 2015
1151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015
Contents
Introduction	2
How EMM has Evolved	 3
The Basic Workings of MDM	 4
Conventional MDM Security Methods and the Direction of Change	 5
Enhanced Smartphone Capability: Flaws and Possibilities 	 6
How Omlis can Help	 7
What’s Next for MDM?	 7
References	8
Contributors	8
2151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015
Introduction
After VMWare’s $1.54bn buyout of
AirWatch in 2014, it became clear
that augmenting traditional MDM
(Mobile Device Management) with
developments like MAM (Mobile
Application Management) would
become one of the trends of 2015,
and containerization strategies would
come to represent one of the year’s
fastest growing markets. As the market
matures traditional enterprise mobility
vendors will seek to cooperate with the
most innovative ‘mobile first’ security
companies such as Omlis.
In the period up to 2005, EMM (Enterprise Mobility
Management) was fairly simple; the network perimeter
was a fortress with few points of access and a majority
of locked-down fixed terminals, limiting the extent of the
client / server relationship in terms of mobile.
In the last ten years the mobile revolution has transformed
EMM to incorporate the various software defined modules
of MDM. Company resources are accessed through an
army of mobile devices with the capacity to store and
access huge amounts of valuable data. These powerful
smartphones lie in wait at a crumbling network perimeter,
each one acting as a potential vehicle ready to infiltrate
vast internal siloes of corporate data made available via a
compromised phone or MDM server.
The complexity of the current mobile ecosystem, and the
phenomenon known as BYOD (Bring Your Own Device)
has threatened the very existence of MDM in favor of
specific containerized solutions, but it’s become clear that
MDM can adapt and survive on new terms.
Modern MDM solutions need to combine potent
combinations of secure authentication, threat detection
and encryption at both device and application level. In
response to these demands a plethora of companies ready
to enhance the MDM product offering have emerged, but
few can guarantee the kinds of assurances which the
Omlis core technology can naturally provide.
3151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015
How EMM has Evolved
Device management whereby a company attempts
to control the entire OS (Operating System), has been
learning to coexist with more focused software application
management over the last couple of years, which has
encouraged the effective partitioning of a mobile device’s
OS. This increasing influence of software and enterprise
apps has placed complicated new demands on security
architecture.
In response, the lines between classic EMM and more
modern conceptions of MDM have now fully blurred,
and the classic Web Application Firewall is no longer a
comprehensive countermeasure to fraud.
MDM’s functional boundaries are also expanding to
incorporate the likes of MAM, MCM (Mobile Content
Management) and Mobile App Development Platforms.
In all of these subsectors, security remains the true value
added service and differentiator.
Consequently, MDM requires increasing input from
specialist mobile security innovators such as Omlis;
an input which has been sorely missing in previous
implementations of MDM.
The aforementioned offshoots and expanding dimensions
of modern MDM reflect the increasing influence of the
mobile platform and ‘mobile first’ business strategies.
Each variation of MDM offers different levels of control
over the mobile device and its content, with each
exhibiting different authentication methods whether it be
secure mutual authentication between client and server or
groundbreaking multi-factor authentication involving the
latest biometric and heuristic technologies.
Despite all of the developments, technology research
company ESG stated last year that only 48% of enterprises
had an actual MDM strategy,
1
and it’s clear that despite a
growing awareness, the market is still young and in many
ways naïve to the growing security issues surrounding
MDM.
Server
Mobile
Untrusted Network
Operating System
Container
Omlis
4151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015
The Basic Workings of MDM
Broadly speaking, a typical MDM scheme requires
server and client components, with the client receiving
management commands from a centrally located MDM
server, both of which represent targets for hackers.
If an MDM scheme is inadequate, an enterprise can
rightfully assume that it’s strategically wise to risk the loss
of an individual device rather than exposing the company
to a compromised MDM server. This is the equation which
MDM security needs to balance.
Sometimes the client component and server component
are supplied by different vendors, whereas other times
they’re supplied by the same vendor. Whilst each system
should be judged on its merits, when it comes to mutual
authentication, the latter method, if used correctly can
offer a certain synergy in terms of efficiencies and security.
The renowned BES (Blackberry Enterprise Server) is the
most prominent example of server / client partnership,
and until last year, the BES was restricted solely to
communications with Blackberry phones. Blackberry’s
recent acquisition of Good Technology for $425m
reinforced the fact that the company is seeking further
device interoperability.
NIST 800-124 (Section 3.1) recognizes the advantages of
some form of client / server unity, stating that: “a product
provided by a mobile device manufacturer may have more
robust support for the mobile devices than third party
products.”
2
In reality, a combined package with client / server libraries
installed on either side may be easier for staff and
administrators to self-manage, but the security advantages
are less apparent unless unique protocols are being used
to communicate.
Omlis recognize that the principle transaction between
client and server is the basis of any authentication
mechanism and due to Omlis’ architectural potential and
unique key exchange principles, we can revolutionize how
a client verifies the identity of the MDM server.
5151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015
Conventional MDM Security Methods
and the Direction of Change
Login and authentication are vital to a successful MDM
policy, so credential caching and passing sensitive
information over the wire is no longer acceptable for the
tightest security measures. Caching passwords in the
manner of HTTP basic authentication may be good for user
convenience, as there are no repeated login requirements
but the method is very light in terms of security as logout
isn’t instigated by the user.
The same applies to the highly popular methods of form-
based authentication; as we begin to separate hybrid and
native apps from the mobile device platform to greater and
greater degrees we need to find ways of protecting data
which is at rest and in transit.
As a consequence of the app revolution, the likes of
per-app VPNs (Virtual Private Networks) have become
popular along with some highly nuanced containerization
strategies. These containerized solutions and VPNs can
provide a secure tunnel through which the user accesses
a single app, rather than a fully virtualized mobile desktop.
Containerization strategies can include sandboxing or
simple app wrapping in order to ring-fence corporate
assets on employee’s phones, authenticating to the MDM
server on less demanding terms. App wrapping is a
process whereby the app’s native libraries are injected with
dynamic libraries to incorporate new security capabilities
such as authentication, encryption or VPN.
3
In a recent Gartner survey 45% of respondents said
that: “application modernization of installed on-premises
core enterprise applications”, was a priority, and app
wrapping will represent a key part of this modernization.
App wrapping is popular due to its simplicity. It represents
a market which ABI Research predict will grow at a rate
of 28% through 2018; quicker than more complicated
containerization strategies which will see equally significant
but less impressive 23% growth rates.
4
Enterprise needs to take advantage of the latest methods
of authentication, secure containerization, and ultimately
multi-factor authentication to make the MDM proposition
worthwhile. At the same time, containerization needs to
extend its abilities beyond simple partitioning, combining
the latest methods of virtualization, cloud and key
generation.
To achieve this goal, traditional MDM vendors need to
enlist the abilities of companies like Omlis which have
harnessed the unique capabilities of the smartphone to
develop groundbreaking authentication and encryption
techniques.
6151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015
Enhanced Smartphone Capability:
Flaws and Possibilities
Over the last couple of years, the smartphone has assumed
center stage in enterprise multi-factor authentication,
sharing the burden with traditional hard tokens such as
key-fobs which generate one time passcodes. So as well
as being a workspace in its own right, the smartphone’s
ubiquity and wide ranging biometric capabilities have
led to an explosion in the soft token market acting as an
ancillary credential for secure login to a laptop or PC.
For the sake of MDM, we’ll continue to view the smartphone
as the primary workspace rather than as a means of
accessing a separate device.
Whilst offering strong opportunities in the field of
advanced authentication methods, the increased levels
of connectivity which the smartphone can offer opens
up a huge array of attack surfaces. After all, security
methodologies are only as secure as the platform they’re
used on and the vulnerabilities of the modern smartphone
are well-documented.
The phone’s OS will always be an access point for criminals
looking to breach a weak MDM scheme; once the OS is
infiltrated, keylogging and screenshot theft is perfectly
achievable.
Furthermore, simple implementations of MDM mean that
the phone acts as a carrier for unencrypted login tokens
which often remain static in the fact that they don’t have an
expiry date. This leaves the phone exposed as a potential
access point if it’s lost or stolen. With that said, malicious
hacking activities are more of a concern to enterprise
than theft or device loss, so the ability of MDM vendors to
protect against hacks is paramount.
The secure container solution has been developed and
implemented in MDM and pioneered by companies such
as Mobile Iron. Containerization is a positive move but
more often than not the container is only as secure as the
OS it resides on.
This was highlighted by the vulnerability in Apple’s flawed
sandboxing mechanism for third party apps. Before
its discovery by Appthority, the vulnerability known as
Quicksand exposed the configuration settings of managed
applications meaning that malicious applications could
read critical information such as passwords and tokens
associated with MDM.
5
Despite the vulnerability having
been patched, the fact remains that 70% of iPhones use
older operating systems.
Android fairs little better. Aside from the PKI (Public
Key Infrastructure) and administrative complications
associated with a fragmented platform, Android malware
which can actively go undetected by MDM root detectors
has been produced, reading logs to detect when the user
has opened an email, before sending the information to a
third party account.
Not only are mobile devices susceptible to attack, the open
networks through which they communicate offer endless
opportunities to those looking to perform MitM (Man-in-
the-Middle) attacks. The enterprise mobile is predestined
for heavy Wi-Fi usage on the train to work, or in various
commercial amenities leaving the door wide open for
criminals to intercept data.
7151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015
How Omlis can Help
Whereas other MDM providers can offer a product or
container which is only as secure as the platform it’s built
on and the security of the network, Omlis’ dependency is
drastically negated due to the ways in which we exchange
keys, mutual authentication, encryption of data at rest and
in transit, and advanced malware protection based on a
high integrity approach and run time checks.
“Mobile environments are extremely heterogeneous,
therefore enterprise IT managers must ensure their devices
consistently protect data at rest and during transit. Omlis’
high integrity approach ensures that any sensitive data is
fully protected in those unsecure environments thereby
taking containerization to a new level. This is accomplished
by implementing a much more secure protocol to manage
and exchange keys, while conducting multifactor and
mutual authentication for every single transaction.”
Nirmal Misra, Senior Technical Manager at Omlis
The security of the Wi-Fi network is also less critical
because of our innovative key exchange protocols. Unique
keys are generated at the point of transaction and due to
the design of our distributed architecture, actual keys are
never sent over the network and are never stored on the
client or server side; so even if a MitM attack takes place,
the hacker will fail to retrieve any meaningful information.
This method of generating keys at both ends of the
communications channel, means that Omlis never
transmit sensitive data in plaintext and information related
to transaction keys can be erased from memory as soon
as it becomes redundant.
Unlike other secure container MDM solutions, Omlis’
high integrity development protects against side channel
attacks; SQL injections are made impossible due to
compile time and runtime checks, and keylogging is
pointless as the input we collect from the keypad is only
used for local encryption.
In line with the market for MDM moving towards software
based definitions, Omlis also have the ability to offer
lightweight SaaS (Software as a Service) options via the
cloud, or as part of an in-house setup.
What’s Next for MDM?
Ovum predict that the value of EMM software to grow
from $2.7bn in 2014, to just under $10bn in 2019.
6
We’ll
see a particular growth in industry collaborations where
traditional MDM vendors will try to beef-up their offerings
by forming alliances with niche specialists; Airwatch’s
collaboration with Pradeo is a prime example of the
synergies which MDM can leverage from the mobile sector.
MAM will inevitably gather influence on MDM in the
coming months. As well as a general adoption of the latest
network detection methods, there’s also plenty of room for
strong authentication services and advanced encryption
techniques.
This layered approach to security requires mobile
specialists such as Omlis to fill the gaps where more
conventional secure container solutions have failed. Omlis’
core technology exhibits the rare ability to combine layered
security and enhanced authentication with a streamlined
user experience. Containerization needs to move to the
next level and companies such as Omlis can provide the
technology to empower this transition.
8151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015
1.	 http://www.esg-global.com/blogs/mobile-
device-management-mdm-deployment-remains-
elementary-and-immature/
2.	 http://csrc.nist.gov/publications/PubsSPs.html
3.	 https://www.apperian.com/mam-blog/app-
wrapping-is-a-form-of-containerization/
4.	 https://www.abiresearch.com/press/app-
wrapping-and-container-technologies-to-
drive-m/
5.	 http://www.securityweek.com/attackers-can-
exploit-ios-flaw-target-companies-using-mdm
6.	 http://www.ovum.com/press_releases/ovum-
sees-enterprise-mobility-management-software-
market-nearly-quadrupling-in-four-years/
References
Contributors
The following individuals contributed to this report:
Stéphane Roule
Senior Technical Manager
Nirmal Misra
Senior Technical Manager
Paul Holland
Analyst
Jack Stuart
Assistant Analyst
Omlis
Third Floor
Tyne House
Newcastle upon Tyne
United Kingdom
NE1 3JD
+44 (0) 845 838 1308
info@omlis.com
www.omlis.com
© Omlis Limited 2015

Contenu connexe

Tendances

DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013Andris Soroka
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigmKumar Gaurav
 
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1Roger Snook
 
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ssGraham Chalk
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefingNitin Gaur
 
2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration2 22955 mobile_video_collaboration
2 22955 mobile_video_collaborationSvetlana Belyaeva
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataAppear
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentationAlessandro Bottega
 
Why MBaaS Now
Why MBaaS NowWhy MBaaS Now
Why MBaaS NowCognizant
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersAjay Chebbi
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation MATT ALEXANDER
 
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...Michael Jacobsen
 
Put your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstPut your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstEd Brill
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationLeigh Williamson
 

Tendances (18)

Ahmed Banafa EMM
Ahmed Banafa EMMAhmed Banafa EMM
Ahmed Banafa EMM
 
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
DSS_Enterprise MDM MAM Mobile Security - MobileIron Overview_2013
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
MobileIron Deck
MobileIron DeckMobileIron Deck
MobileIron Deck
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigm
 
4 Stages of a Smart Mobile Strategy
4 Stages of a Smart Mobile Strategy4 Stages of a Smart Mobile Strategy
4 Stages of a Smart Mobile Strategy
 
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
 
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefing
 
2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration2 22955 mobile_video_collaboration
2 22955 mobile_video_collaboration
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise data
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentation
 
Why MBaaS Now
Why MBaaS NowWhy MBaaS Now
Why MBaaS Now
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation
 
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
 
Put your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstPut your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirst
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
 

En vedette

Dhileena powerpoint
Dhileena powerpointDhileena powerpoint
Dhileena powerpointsreechithras
 
Convincing your CEO to invest in a loyalty programme
Convincing your CEO to invest in a loyalty programmeConvincing your CEO to invest in a loyalty programme
Convincing your CEO to invest in a loyalty programmecolinjones001
 
I will add you facebook fanpage likes
I will add you facebook fanpage likesI will add you facebook fanpage likes
I will add you facebook fanpage likesRachel Shayna
 
Dinh Thự Của Các Nguyên Thủ Quốc Gia Đẹp Lộng Lẫy Ra Sao
Dinh Thự Của Các Nguyên Thủ Quốc Gia Đẹp Lộng Lẫy Ra SaoDinh Thự Của Các Nguyên Thủ Quốc Gia Đẹp Lộng Lẫy Ra Sao
Dinh Thự Của Các Nguyên Thủ Quốc Gia Đẹp Lộng Lẫy Ra SaoHa Thanh Binh
 
NUESTRO CUERPO
NUESTRO CUERPONUESTRO CUERPO
NUESTRO CUERPOEvaeli77
 
Презентация БАД АГ-Икс
Презентация БАД АГ-ИксПрезентация БАД АГ-Икс
Презентация БАД АГ-Иксbiokorektor
 
Mind over Matter Presentation Hoerskool
Mind over Matter Presentation HoerskoolMind over Matter Presentation Hoerskool
Mind over Matter Presentation HoerskoolSoretha Peach
 

En vedette (9)

Dhileena powerpoint
Dhileena powerpointDhileena powerpoint
Dhileena powerpoint
 
Convincing your CEO to invest in a loyalty programme
Convincing your CEO to invest in a loyalty programmeConvincing your CEO to invest in a loyalty programme
Convincing your CEO to invest in a loyalty programme
 
Mişcarea corpului pe verticală
Mişcarea corpului pe verticalăMişcarea corpului pe verticală
Mişcarea corpului pe verticală
 
I will add you facebook fanpage likes
I will add you facebook fanpage likesI will add you facebook fanpage likes
I will add you facebook fanpage likes
 
Dinh Thự Của Các Nguyên Thủ Quốc Gia Đẹp Lộng Lẫy Ra Sao
Dinh Thự Của Các Nguyên Thủ Quốc Gia Đẹp Lộng Lẫy Ra SaoDinh Thự Của Các Nguyên Thủ Quốc Gia Đẹp Lộng Lẫy Ra Sao
Dinh Thự Của Các Nguyên Thủ Quốc Gia Đẹp Lộng Lẫy Ra Sao
 
ON-ECO dla biznesu
ON-ECO dla biznesuON-ECO dla biznesu
ON-ECO dla biznesu
 
NUESTRO CUERPO
NUESTRO CUERPONUESTRO CUERPO
NUESTRO CUERPO
 
Презентация БАД АГ-Икс
Презентация БАД АГ-ИксПрезентация БАД АГ-Икс
Презентация БАД АГ-Икс
 
Mind over Matter Presentation Hoerskool
Mind over Matter Presentation HoerskoolMind over Matter Presentation Hoerskool
Mind over Matter Presentation Hoerskool
 

Similaire à Mobile Device Management: Taking Conainerisation to the Next Level

Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Ahmed Banafa
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The RisksBring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The RisksLogicalis
 
Bring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksBring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksLogicalis
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperShetal Patel
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudLockheed Martin
 
Why MDM Alone Falls Short
Why MDM Alone Falls ShortWhy MDM Alone Falls Short
Why MDM Alone Falls ShortKony, Inc.
 
Case4 customer relationship management heads to the cloud
Case4 customer relationship management heads to the  cloud Case4 customer relationship management heads to the  cloud
Case4 customer relationship management heads to the cloud dyadelm
 
Case : Customer Relationship Management Heads to the Cloud
Case : Customer Relationship Management Heads to the CloudCase : Customer Relationship Management Heads to the Cloud
Case : Customer Relationship Management Heads to the CloudAya Wan Idris
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
IBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionIBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionDalia Reda
 
Managed Mobility Load Off Customer Wp
Managed Mobility Load Off Customer WpManaged Mobility Load Off Customer Wp
Managed Mobility Load Off Customer Wpraghuvamsiuriti
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 

Similaire à Mobile Device Management: Taking Conainerisation to the Next Level (20)

Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM)
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The RisksBring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
 
Bring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksBring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risks
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices Whitepaper
 
Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the Cloud
 
Why MDM Alone Falls Short
Why MDM Alone Falls ShortWhy MDM Alone Falls Short
Why MDM Alone Falls Short
 
Case4 customer relationship management heads to the cloud
Case4 customer relationship management heads to the  cloud Case4 customer relationship management heads to the  cloud
Case4 customer relationship management heads to the cloud
 
Protecting Mobile
Protecting MobileProtecting Mobile
Protecting Mobile
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
 
Case : Customer Relationship Management Heads to the Cloud
Case : Customer Relationship Management Heads to the CloudCase : Customer Relationship Management Heads to the Cloud
Case : Customer Relationship Management Heads to the Cloud
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKETCLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
IBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionIBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motion
 
Managed Mobility Load Off Customer Wp
Managed Mobility Load Off Customer WpManaged Mobility Load Off Customer Wp
Managed Mobility Load Off Customer Wp
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 

Dernier

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Dernier (20)

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Mobile Device Management: Taking Conainerisation to the Next Level

  • 1. Mobile Device Management: Taking Containerization to the Next Level 151002_oml_v1p | Public | © Omlis Limited 2015
  • 2. 1151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015 Contents Introduction 2 How EMM has Evolved 3 The Basic Workings of MDM 4 Conventional MDM Security Methods and the Direction of Change 5 Enhanced Smartphone Capability: Flaws and Possibilities 6 How Omlis can Help 7 What’s Next for MDM? 7 References 8 Contributors 8
  • 3. 2151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015 Introduction After VMWare’s $1.54bn buyout of AirWatch in 2014, it became clear that augmenting traditional MDM (Mobile Device Management) with developments like MAM (Mobile Application Management) would become one of the trends of 2015, and containerization strategies would come to represent one of the year’s fastest growing markets. As the market matures traditional enterprise mobility vendors will seek to cooperate with the most innovative ‘mobile first’ security companies such as Omlis. In the period up to 2005, EMM (Enterprise Mobility Management) was fairly simple; the network perimeter was a fortress with few points of access and a majority of locked-down fixed terminals, limiting the extent of the client / server relationship in terms of mobile. In the last ten years the mobile revolution has transformed EMM to incorporate the various software defined modules of MDM. Company resources are accessed through an army of mobile devices with the capacity to store and access huge amounts of valuable data. These powerful smartphones lie in wait at a crumbling network perimeter, each one acting as a potential vehicle ready to infiltrate vast internal siloes of corporate data made available via a compromised phone or MDM server. The complexity of the current mobile ecosystem, and the phenomenon known as BYOD (Bring Your Own Device) has threatened the very existence of MDM in favor of specific containerized solutions, but it’s become clear that MDM can adapt and survive on new terms. Modern MDM solutions need to combine potent combinations of secure authentication, threat detection and encryption at both device and application level. In response to these demands a plethora of companies ready to enhance the MDM product offering have emerged, but few can guarantee the kinds of assurances which the Omlis core technology can naturally provide.
  • 4. 3151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015 How EMM has Evolved Device management whereby a company attempts to control the entire OS (Operating System), has been learning to coexist with more focused software application management over the last couple of years, which has encouraged the effective partitioning of a mobile device’s OS. This increasing influence of software and enterprise apps has placed complicated new demands on security architecture. In response, the lines between classic EMM and more modern conceptions of MDM have now fully blurred, and the classic Web Application Firewall is no longer a comprehensive countermeasure to fraud. MDM’s functional boundaries are also expanding to incorporate the likes of MAM, MCM (Mobile Content Management) and Mobile App Development Platforms. In all of these subsectors, security remains the true value added service and differentiator. Consequently, MDM requires increasing input from specialist mobile security innovators such as Omlis; an input which has been sorely missing in previous implementations of MDM. The aforementioned offshoots and expanding dimensions of modern MDM reflect the increasing influence of the mobile platform and ‘mobile first’ business strategies. Each variation of MDM offers different levels of control over the mobile device and its content, with each exhibiting different authentication methods whether it be secure mutual authentication between client and server or groundbreaking multi-factor authentication involving the latest biometric and heuristic technologies. Despite all of the developments, technology research company ESG stated last year that only 48% of enterprises had an actual MDM strategy, 1 and it’s clear that despite a growing awareness, the market is still young and in many ways naïve to the growing security issues surrounding MDM. Server Mobile Untrusted Network Operating System Container Omlis
  • 5. 4151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015 The Basic Workings of MDM Broadly speaking, a typical MDM scheme requires server and client components, with the client receiving management commands from a centrally located MDM server, both of which represent targets for hackers. If an MDM scheme is inadequate, an enterprise can rightfully assume that it’s strategically wise to risk the loss of an individual device rather than exposing the company to a compromised MDM server. This is the equation which MDM security needs to balance. Sometimes the client component and server component are supplied by different vendors, whereas other times they’re supplied by the same vendor. Whilst each system should be judged on its merits, when it comes to mutual authentication, the latter method, if used correctly can offer a certain synergy in terms of efficiencies and security. The renowned BES (Blackberry Enterprise Server) is the most prominent example of server / client partnership, and until last year, the BES was restricted solely to communications with Blackberry phones. Blackberry’s recent acquisition of Good Technology for $425m reinforced the fact that the company is seeking further device interoperability. NIST 800-124 (Section 3.1) recognizes the advantages of some form of client / server unity, stating that: “a product provided by a mobile device manufacturer may have more robust support for the mobile devices than third party products.” 2 In reality, a combined package with client / server libraries installed on either side may be easier for staff and administrators to self-manage, but the security advantages are less apparent unless unique protocols are being used to communicate. Omlis recognize that the principle transaction between client and server is the basis of any authentication mechanism and due to Omlis’ architectural potential and unique key exchange principles, we can revolutionize how a client verifies the identity of the MDM server.
  • 6. 5151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015 Conventional MDM Security Methods and the Direction of Change Login and authentication are vital to a successful MDM policy, so credential caching and passing sensitive information over the wire is no longer acceptable for the tightest security measures. Caching passwords in the manner of HTTP basic authentication may be good for user convenience, as there are no repeated login requirements but the method is very light in terms of security as logout isn’t instigated by the user. The same applies to the highly popular methods of form- based authentication; as we begin to separate hybrid and native apps from the mobile device platform to greater and greater degrees we need to find ways of protecting data which is at rest and in transit. As a consequence of the app revolution, the likes of per-app VPNs (Virtual Private Networks) have become popular along with some highly nuanced containerization strategies. These containerized solutions and VPNs can provide a secure tunnel through which the user accesses a single app, rather than a fully virtualized mobile desktop. Containerization strategies can include sandboxing or simple app wrapping in order to ring-fence corporate assets on employee’s phones, authenticating to the MDM server on less demanding terms. App wrapping is a process whereby the app’s native libraries are injected with dynamic libraries to incorporate new security capabilities such as authentication, encryption or VPN. 3 In a recent Gartner survey 45% of respondents said that: “application modernization of installed on-premises core enterprise applications”, was a priority, and app wrapping will represent a key part of this modernization. App wrapping is popular due to its simplicity. It represents a market which ABI Research predict will grow at a rate of 28% through 2018; quicker than more complicated containerization strategies which will see equally significant but less impressive 23% growth rates. 4 Enterprise needs to take advantage of the latest methods of authentication, secure containerization, and ultimately multi-factor authentication to make the MDM proposition worthwhile. At the same time, containerization needs to extend its abilities beyond simple partitioning, combining the latest methods of virtualization, cloud and key generation. To achieve this goal, traditional MDM vendors need to enlist the abilities of companies like Omlis which have harnessed the unique capabilities of the smartphone to develop groundbreaking authentication and encryption techniques.
  • 7. 6151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015 Enhanced Smartphone Capability: Flaws and Possibilities Over the last couple of years, the smartphone has assumed center stage in enterprise multi-factor authentication, sharing the burden with traditional hard tokens such as key-fobs which generate one time passcodes. So as well as being a workspace in its own right, the smartphone’s ubiquity and wide ranging biometric capabilities have led to an explosion in the soft token market acting as an ancillary credential for secure login to a laptop or PC. For the sake of MDM, we’ll continue to view the smartphone as the primary workspace rather than as a means of accessing a separate device. Whilst offering strong opportunities in the field of advanced authentication methods, the increased levels of connectivity which the smartphone can offer opens up a huge array of attack surfaces. After all, security methodologies are only as secure as the platform they’re used on and the vulnerabilities of the modern smartphone are well-documented. The phone’s OS will always be an access point for criminals looking to breach a weak MDM scheme; once the OS is infiltrated, keylogging and screenshot theft is perfectly achievable. Furthermore, simple implementations of MDM mean that the phone acts as a carrier for unencrypted login tokens which often remain static in the fact that they don’t have an expiry date. This leaves the phone exposed as a potential access point if it’s lost or stolen. With that said, malicious hacking activities are more of a concern to enterprise than theft or device loss, so the ability of MDM vendors to protect against hacks is paramount. The secure container solution has been developed and implemented in MDM and pioneered by companies such as Mobile Iron. Containerization is a positive move but more often than not the container is only as secure as the OS it resides on. This was highlighted by the vulnerability in Apple’s flawed sandboxing mechanism for third party apps. Before its discovery by Appthority, the vulnerability known as Quicksand exposed the configuration settings of managed applications meaning that malicious applications could read critical information such as passwords and tokens associated with MDM. 5 Despite the vulnerability having been patched, the fact remains that 70% of iPhones use older operating systems. Android fairs little better. Aside from the PKI (Public Key Infrastructure) and administrative complications associated with a fragmented platform, Android malware which can actively go undetected by MDM root detectors has been produced, reading logs to detect when the user has opened an email, before sending the information to a third party account. Not only are mobile devices susceptible to attack, the open networks through which they communicate offer endless opportunities to those looking to perform MitM (Man-in- the-Middle) attacks. The enterprise mobile is predestined for heavy Wi-Fi usage on the train to work, or in various commercial amenities leaving the door wide open for criminals to intercept data.
  • 8. 7151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015 How Omlis can Help Whereas other MDM providers can offer a product or container which is only as secure as the platform it’s built on and the security of the network, Omlis’ dependency is drastically negated due to the ways in which we exchange keys, mutual authentication, encryption of data at rest and in transit, and advanced malware protection based on a high integrity approach and run time checks. “Mobile environments are extremely heterogeneous, therefore enterprise IT managers must ensure their devices consistently protect data at rest and during transit. Omlis’ high integrity approach ensures that any sensitive data is fully protected in those unsecure environments thereby taking containerization to a new level. This is accomplished by implementing a much more secure protocol to manage and exchange keys, while conducting multifactor and mutual authentication for every single transaction.” Nirmal Misra, Senior Technical Manager at Omlis The security of the Wi-Fi network is also less critical because of our innovative key exchange protocols. Unique keys are generated at the point of transaction and due to the design of our distributed architecture, actual keys are never sent over the network and are never stored on the client or server side; so even if a MitM attack takes place, the hacker will fail to retrieve any meaningful information. This method of generating keys at both ends of the communications channel, means that Omlis never transmit sensitive data in plaintext and information related to transaction keys can be erased from memory as soon as it becomes redundant. Unlike other secure container MDM solutions, Omlis’ high integrity development protects against side channel attacks; SQL injections are made impossible due to compile time and runtime checks, and keylogging is pointless as the input we collect from the keypad is only used for local encryption. In line with the market for MDM moving towards software based definitions, Omlis also have the ability to offer lightweight SaaS (Software as a Service) options via the cloud, or as part of an in-house setup. What’s Next for MDM? Ovum predict that the value of EMM software to grow from $2.7bn in 2014, to just under $10bn in 2019. 6 We’ll see a particular growth in industry collaborations where traditional MDM vendors will try to beef-up their offerings by forming alliances with niche specialists; Airwatch’s collaboration with Pradeo is a prime example of the synergies which MDM can leverage from the mobile sector. MAM will inevitably gather influence on MDM in the coming months. As well as a general adoption of the latest network detection methods, there’s also plenty of room for strong authentication services and advanced encryption techniques. This layered approach to security requires mobile specialists such as Omlis to fill the gaps where more conventional secure container solutions have failed. Omlis’ core technology exhibits the rare ability to combine layered security and enhanced authentication with a streamlined user experience. Containerization needs to move to the next level and companies such as Omlis can provide the technology to empower this transition.
  • 9. 8151002_oml_mobile_device_management_v1p | Public | © Omlis Limited 2015 1. http://www.esg-global.com/blogs/mobile- device-management-mdm-deployment-remains- elementary-and-immature/ 2. http://csrc.nist.gov/publications/PubsSPs.html 3. https://www.apperian.com/mam-blog/app- wrapping-is-a-form-of-containerization/ 4. https://www.abiresearch.com/press/app- wrapping-and-container-technologies-to- drive-m/ 5. http://www.securityweek.com/attackers-can- exploit-ios-flaw-target-companies-using-mdm 6. http://www.ovum.com/press_releases/ovum- sees-enterprise-mobility-management-software- market-nearly-quadrupling-in-four-years/ References Contributors The following individuals contributed to this report: Stéphane Roule Senior Technical Manager Nirmal Misra Senior Technical Manager Paul Holland Analyst Jack Stuart Assistant Analyst
  • 10. Omlis Third Floor Tyne House Newcastle upon Tyne United Kingdom NE1 3JD +44 (0) 845 838 1308 info@omlis.com www.omlis.com © Omlis Limited 2015