Beyond BYOD: securing the data (not the device)

417 views

Published on

Bring Your Own Device; The Risk?
Malware residing on personal devices taking advantage of user rights to leak corporate data.

The Solution? Find out here with full slides presentation & video recording available on:
http://www.denyall.com/recordings_en.html

http://www.denyall.com

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
417
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Beyond BYOD: securing the data (not the device)

  1. 1. Beyond BYOD: securing the data (not the device) This event will start at 11am CET, March 19, 2013 thanks for your patienceSecuring & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 1 1
  2. 2. Logistics • You’re muted… • … but please ask your questions using the chat tool • We’ll take a few minutes at the end to answer themSecuring & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 2 2
  3. 3. Todays Presentors Stéphane de Saint Albin Tom Lysemose CMO CTO & founderSecuring & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 3 3
  4. 4. Todays’ Webinar Bring Your Own Device? The Risk. Malware residing on personal devices taking advantage of user rights to leak corporate data. The Solution. rWeb + Client Shield protect corporate data accessed via browsers and mobile apps.Securing & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 4 4
  5. 5. Content 1. Beyond BYOD: the issue with personal devices 2. Man-In-The-Browser/Mobile attacks 3. Protecting corporate data on personal devices – Browser-based apps (OWA) – Mobile Apps 4. Q&A and conclusionSecuring & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 5 5
  6. 6. Beyond BYOD: the issue with personal devicesSecuring & Accelerating Your Applications 3/15/2013 3/15/2013 All © 2012 2013 3/19/2013 Deny DenyAll & Promon © Deny All © 2012 6 6
  7. 7. Poll #1Securing & Accelerating Your Applications 3/15/2013 3/15/2013 All © 2012 2013 3/19/2013 Deny DenyAll & Promon © Deny All © 2012 7 7
  8. 8. BYOD related issues • Security policy adjusted to allow personal device connectivity – Exceptions to wifi policy, for example – Creates security ‘holes’ that can be exploited by hackers • Users access both personal and corporate data – User credentials and corporate data ‘stored’ on devices – Cracked in minutes, cf. Symantec Experiment • Personal devices are unmanaged by default – No password, no security control – No lock or remote deletion capability if lost/stolenSecuring & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 8 8
  9. 9. Beyond BYOD • Endpoint security not efficient vs. modern threats – Won’t prevent malware infection – Millions of zombie devices in spite of anti-virus software • MDM is no silver bullet – Enforcing secure configuration policy is a good but insufficient step • Compromised devices can become attack vectors – Modern malware now available on mobile platformsSecuring & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 9 9
  10. 10. Data security is the issue • The problem with personal devices is not that they – are used to play and work – can be lost or stolen – are usually unmanaged – are not well protected against malware – should be considered as unsafe • The problem is that they access, use and store sensitive data – User credentials – Corporate email – Confidential information accessed via mobile appsSecuring & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 10 10
  11. 11. Man-in-the-Browser/Mobile AttacksSecuring & Accelerating Your Applications 3/15/2013 3/15/2013 All © 2012 2013 3/19/2013 Deny DenyAll & Promon © Deny All © 2012 11 11
  12. 12. To read full slides presentation & access to thevideo recording on: Beyond BYOD: securing the data (not the device)Please click on the link available in thedescription below.
  13. 13. Thank you! info@denyall.com +33 1 46 20 96 00Securing & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 13 13

×