How VPNs Help ProvidingSecure Mobile WorkplacesIT Security
Secure Business Connectivity2Wrestling with Mobile Workplaces: VPNs Provide the Foundation for Secure Networking			 04Bene...
Secure Business Connectivity3Creating Best Practices that Will Maximize Employee Productivity							 26	 Maximize Employee...
Secure Business Connectivity4Wrestling with Mobile Work-places: VPNs Provide the Foun-dation for Secure NetworkingIt’s har...
Secure Business Connectivity5This has to be considered when im-plementing a mobile workplace strat-egy within the company ...
Secure Business Connectivity6Benefits and Downsides ofMobile Workplaces
Secure Business Connectivity7The Benefits ofMobile WorkplacesBesides the fact that companies allowingtheir employees to wo...
Secure Business Connectivity8The Downsides ofMobile WorkplacesDownsides or potential risks have to beequally considered wh...
Secure Business Connectivity9Security Issues
10A recent survey conducted by Oster-man Research found that during a typicalmonth, 4.3 percent of network endpointsbecome...
Secure Business Connectivity11Why is it that Especially Mobi-le Devices Present Such a BigIssue for the Company IT?IT team...
Secure Business Connectivity12Modern remote access solutions protectthe company network effectively. Theycan, for example,...
Secure Business Connectivity13VPNs can allow the employee to access,work on and store their content on thelocal network wi...
Secure Business Connectivity14Figure 2:  In addition to many IT teams having lowawareness of the devices accessing their n...
15Access to Content RepositoriesWithin organizations of all sizes, emplo-yees do not only store content on bothservers and...
Secure Business Connectivity16Mobile Data AccessEmailing or opening documents in otherapplications – Allowing employees to...
Secure Business Connectivity17Application PublishingIf a company wants to provide its emplo-yees with certain applications...
Secure Business Connectivity18Developing a Strategy forMobile Workplaces
Secure Business Connectivity19In order to properly solve the issues de-scribed above, it is necessary to developa strategy...
20•	 What are the security implications 		 of connecting mobile devices to 		 the network?•	 What is the best approach for...
Secure Business Connectivity21Technical Approachto a Successful Mobile Work-place RealizationAfter having defined a strate...
Secure Business Connectivity22IPsec VPNsIPsec VPN solutions are very widely usedand for many years were the standardremote...
Secure Business Connectivity23taken to a company individual Web pageincluding several options for network ac-cess or compa...
Secure Business Connectivity24Selecting the Optimal VPN SolutionFor the most part, which solution IT teamsselect depends o...
Secure Business Connectivity25This is an effect that becomes clearly vi-sible when each user works with differentdevices t...
Secure Business Connectivity26Creating Best Practicesthat Will MaximizeEmployee Productivity
Secure Business Connectivity27Crafting and implementing an organizati-on-wide mobile workplace approach willensure manager...
Secure Business Connectivity28Maximize EmployeeParticipationFor a company where the goal isto maximize employee productivi...
Secure Business Connectivity29Free Use of Personal Appsand ServicesEmployees should be able to use theirpersonal apps and ...
Secure Business Connectivity30Broad Choice of DevicesThe mobile workplace program shouldsupport a wide range of devices,or...
Secure Business Connectivity31Avoiding the SecurityPitfalls of a MobileWorkplace Deployment
Secure Business Connectivity32There are several common problems thatoccur with mobile workplace deploy-ments and it’s impo...
Secure Business Connectivity33Assuming Users Will FollowSecurity PoliciesEmployees will resist any inconvenienceor threat ...
Secure Business Connectivity34ConclusionDespite many critical voices raced in thediscussion of mobile workplaces, the ad-v...
Secure Business Connectivity35Interested?Would you like to check out the numerousbenefits of HOB Software?Just call us or ...
Secure Business Connectivity36Footnotes(1) BYOD or Bust, Kyle Lagunas, HR Mar-ket Analyst, Software Advice, March 2012(2) ...
Secure Business Connectivity37•	 Page 27 - Orlando Rosu	 (Thinkstock)•	 Page 28 - Karin Jehle	 (Thinkstock)•	 Page 29 - R....
Upcoming SlideShare
Loading in …5
×

How VPNs Help Providing Secure Mobile Workplaces

686 views
608 views

Published on

Mobile workplaces are a trend and whether companies like it or not – employees demand this work concept. Do you also struggle making mobile yet highly secure workplaces come true? Download our latest e-book and see how VPNs can help you with this matter!

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
686
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

How VPNs Help Providing Secure Mobile Workplaces

  1. 1. How VPNs Help ProvidingSecure Mobile WorkplacesIT Security
  2. 2. Secure Business Connectivity2Wrestling with Mobile Workplaces: VPNs Provide the Foundation for Secure Networking 04Benefits and Downsides of Mobile Workplaces 06 The Benefits of Mobile Workplaces   07 The Downsides of Mobile Workplaces 08Security Issues 09 Why is it that Especially Mobile Devices Present Such a Big Issue for the Company IT? 11 Access to Content Repositories 15 App-Security 15 Mobile Device Management 16 Mobile Data Access 16 Application Publishing 17Developing a Strategy for Mobile Workplaces 18 Technical Approach to a Successful Mobile Workplace Realization 21 Different VPN Types for Different Situations 21 IPsec VPNs 22 SSL VPNs 23 Selecting the Optimal VPN Solution 24
  3. 3. Secure Business Connectivity3Creating Best Practices that Will Maximize Employee Productivity 26 Maximize Employee Participation 28 Ensure Employees Have the Productivity Tools They Need 29 Free Use of Personal Apps and Services 29 Offer Self-Service Support for Everyday Activities 30 Broad Choice of Devices 30Avoiding the Security Pitfalls of a Mobile Workplace Deployment 31 Ignoring Common Threats 32 Taking a One-Size Fits All Aproach 32 Failing to Educate Users 33 Assuming Users Will Follow Security Policies 33Conclusion 34Interested ? 35Footnotes 36Picture Sources 37
  4. 4. Secure Business Connectivity4Wrestling with Mobile Work-places: VPNs Provide the Foun-dation for Secure NetworkingIt’s hardly a secret that mobile working isthe dominant trend among employees,in small and large businesses alike. Gart-ner predicts that by 2015, there will benearly 300 million tablets and two billionsmartphones used by workers. IT teamshave discovered that it is impossible tobuck this trend and they are learning toembrace and manage it. The emplo-yees’ main motivation to work mobile isboth the comfort level and anytime, any-where access to information from theirorganization’s databases and servers.Often, mobile working is referred to theuse of smartphones, only. However, itcomprises a lot more of scenarios thanthe use of smartphones. Generally spo-ken, mobile working just means usingany device for accessing corporate re-sources from anywhere. Thus, we are tal-king about tablets, notebooks and evendesktop PCs, as well.
  5. 5. Secure Business Connectivity5This has to be considered when im-plementing a mobile workplace strat-egy within the company since differentdevices and operating systems mightbe used – with different implicationsfor IT security. To be most effective it isadvisable to not only consider the differentscenarios and associated peculiaritiesbut also to develop a strategy that fits thecompany´s needs across all kind of de-vices. To support this, the use of modernVPN technology solutions is most benefi-cial for companies – from a managementas well as a security perspective. We willdiscuss the different types of VPNs aswell as critical aspects when choosing anappropriate VPN solution subsequently.To quantify the impact of mobile work-places on organizations of all sizes, theSoftware Advice blog surveyed organiza-tions ranging in employee count from 3 tomore than 110,000.The survey also revealed that employeesuse their mobile devices (whether com-pany or employee-owned) approximate-ly equally for business and personal use. For business purposes, 67 percent of em-ployees use devices for business emails,phone calls and other correspondence,48 percent access corporate tools andapplications and 44 percent use it for pro-fessional networking (1).Figure 1: More than 54% of employees use bothcompany-issued and personal devices.
  6. 6. Secure Business Connectivity6Benefits and Downsides ofMobile Workplaces
  7. 7. Secure Business Connectivity7The Benefits ofMobile WorkplacesBesides the fact that companies allowingtheir employees to work from anywhe-re have a competitive advantage dueto increased agility, flexibility, and abilityto respond to changing circumstances,it facilitates higher workforce produc-tivity, too. One should not forget thatwith mobile workplaces companies arealso able to decrease costs: less officespace is required and energy costs canbe decreased if employees work froma remote location; on the other hand,company IT processes can be optimizedand require less administration effort.From an employee perspective, higherproductivity especially comes from an in-creased mobility as well as the anytime/anywhere access to business-critical in-formation and applications. By this, em-ployees have more power and freedom tosuccessfully and quickly satisfy customerdemands and requests, thereby increa-sing employee motivation, too.
  8. 8. Secure Business Connectivity8The Downsides ofMobile WorkplacesDownsides or potential risks have to beequally considered when discussing amobile workforce strategy, of course.However, although it is important to knowabout these issues, it has to be statedthat most of the issues can be comple-tely solved by applying the right strategyand technology. In the following we pre-sent the most common risks, followedby guidelines and tips how to overcomethese obstacles.
  9. 9. Secure Business Connectivity9Security Issues
  10. 10. 10A recent survey conducted by Oster-man Research found that during a typicalmonth, 4.3 percent of network endpointsbecome infected with viruses or mal-ware, which translates to 52.1 percentof endpoints over the course of a year.Secure Business ConnectivityThe average time to remediate a singleendpoint is 72 minutes and 5.2 percent ofIT staff time during a typical week is spenton email security management alone, thestudy found (2).
  11. 11. Secure Business Connectivity11Why is it that Especially Mobi-le Devices Present Such a BigIssue for the Company IT?IT teams are unable to implement pre-existing security policies across all de-vices and platforms. New security po-licies, which take this into account, areavailable, but have to be implemented.Innovative remote access solutions alrea-dy resolve a large part of the problem onthe technical level, so that the user neednot be too strongly restricted.For small and medium businesses, andenterprises alike, where employees mustconnect to a local network, VPN is thecritical technology. Tunneling into LANsacross a VPN enables users to accessfiles and/or control the applications onin-office equipment that are requiredto complete daily projects regardlessof device or location. Only an Internetconnection is required.
  12. 12. Secure Business Connectivity12Modern remote access solutions protectthe company network effectively. Theycan, for example, check files for viruses,and if necessary, remove them, while the-se files are being downloaded. Anotherpart of this initial step is ensuring that em-ployees can only connect to a networkvia a VPN versus a direct connection,even when the user is on site. IT teamscan also prevent a user from opening asecond, parallel Internet connection aslong as the user is connected with thecompany network.Allowing employees to work from any-where introduces vulnerabilities at manylayers within the network, and as a re-sult, there are many ways IT teams mustaddress these risks. The first step is to re-duce the risk of a device becoming infec-ted and transmitting the malware into thecompany network. Some organizationsrequire that a device has specific antivi-rus and management software installedbefore it is allowed to connect toa network.
  13. 13. Secure Business Connectivity13VPNs can allow the employee to access,work on and store their content on thelocal network without any data ever beingstored on the used end device.It is interesting to note that in a recentSANS Institute survey (3), fewer than 50percent of IT team respondents had a“fairly” or less confident level of knowingwhat types of devices are accessingtheir networks:This effectively prevents malware fromusing this way to enter the companynetwork. The secure tunnel of a VPN isa must since it prevents cyber thievesfrom gaining access to any informationas it travels between locations. Emplo-yees working with mobile devices maybe tempted to email documents, but thesecurity of this email can never be gua-ranteed. Emailing documents also requi-res employees to store content on thedevice, exposing that material to theft.
  14. 14. Secure Business Connectivity14Figure 2: In addition to many IT teams having lowawareness of the devices accessing their net-works, just 52 percent believe their security po-licies are “thorough” or “very thorough,” while 17percent believe their policies are “insufficient evenfor basics,” or that they should go “back to thedrawing board.”
  15. 15. 15Access to Content RepositoriesWithin organizations of all sizes, emplo-yees do not only store content on bothservers and other repositories but theyare increasingly accessing this contenton their smartphones, tablets and othermobile devices, too. Security solutionsshould enable employees to access thesame content on their mobile devices asthey can on their PCs. They should alsobe able to begin to work on content onone device and then later finish workingon it on another device.App-SecurityNot all apps are alike when it comes tosecurity – There is a huge amount of appsin several official App Stores, with hund-reds added daily. Just a few errors in thecode for an app can make it, and the restof the content on an employee’s device,and thereby the entire corporate network,vulnerable. Moreover, it has been foundout that many apps unwantedly catch allcontact data from the smartphone.Many related securityissues are occurringwith mobile devices aswell. HOB notes a fewof these subsequently.Secure Business Connectivity
  16. 16. Secure Business Connectivity16Mobile Data AccessEmailing or opening documents in otherapplications – Allowing employees toemail content or open them in other ap-plications can result in potential dataleakage. IT teams wrestle with the degreeof control they should exert, includingcompletely disabling the ability to email oropen content in other applications, markcertain folders as “allowed” or “disallo-wed” to be emailed, or maintaining an au-dit log of which documents the employeeemailed and to whom.Mobile Device ManagementRegulation of content on devices can betricky – There can be limited options forcorporate IT teams to manage contentlocally (on a device). This includes mana-ging functions such as having the optionto disable caching of all data on a device,to mark certain folders as “permitted” or“not permitted” to be cached, or to deletedocuments from the cache after a speci-fic time period.
  17. 17. Secure Business Connectivity17Application PublishingIf a company wants to provide its emplo-yees with certain applications, this wouldmean a huge effort. With a modern re-mote access solution, this effort can be-come obsolete: solutions that allow for abrowser-based access make applicationpublishing very easy for the IT administra-tor. It is sufficient to install the applicationon the company server and provide em-ployees with the link through which it canbe remotely accessed via the Internet.
  18. 18. Secure Business Connectivity18Developing a Strategy forMobile Workplaces
  19. 19. Secure Business Connectivity19In order to properly solve the issues de-scribed above, it is necessary to developa strategy of how to cope with mobile de-vices, thereby also taking company indi-vidual requirements and restrictions intoaccount. In the following we provide youwith some aspects that are essential andmission critical. For a successful strategyfirst of all objectives need to be defined.It is impossible to develop optimal secu-rity processes to protect corporate datawithout knowing what should be achie-ved with having employees accessingcompany data anywhere and at any time.The most typical goal is to boost overallproductivity and worker mobility.
  20. 20. 20• What are the security implications of connecting mobile devices to the network?• What is the best approach for securely connecting mobile de- vices to file servers, the Intranet, company specific applications or other content repositories?• How should IT teams determine if employees can store data locally, and if allowed, what types of data?• Does jail breaking a mobile device affect security?• Should the IT team prevent em- ployees from emailing corporate documents on their remote de- vices and/or opening the docu- ments in other applications?• Does support exist for multi- factor authentication that does not require passcode entry every time a device “wakes up?”As IT teams reviewtheir current securityprocesses, they mustanswer the followingquestions.Secure Business Connectivity
  21. 21. Secure Business Connectivity21Technical Approachto a Successful Mobile Work-place RealizationAfter having defined a strategy, the ques-tion arises which technical solution fitsall these needs and requirements best.Generally spoken, it is most common todeploy any kind of VPN technology forthis purpose. However, there are severalapproaches of VPN solutions which aredescribed in the following.Different VPN Types forDifferent SituationsDifferent VPN types exist that fit to dif-ferent network architectures and userneeds. Each has benefits and weak-nesses IT teams should consider beforeselection and deployment.
  22. 22. Secure Business Connectivity22IPsec VPNsIPsec VPN solutions are very widely usedand for many years were the standardremote access solution. They are espe-cially well suited for fixed connections,for example, from the enterprise networkto branch offices or suppliers and cus-tomers. They allow complete networkaccess and are considered to be secu-re and reliable. When using IPsec VPNtechnology in combination with mobi-le devices, this technology exhibits amajor drawback:an IPsec VPN client has to be installedon every end device. If the employee is toset up the client himself, then he could befaced with complex configuration work,e.g., the target networks, which may bemore than he can handle. This is why theinstallation of the VPN client has to bedone by the IT administrator, causing alot of extra work for him.
  23. 23. Secure Business Connectivity23taken to a company individual Web pageincluding several options for network ac-cess or company applications. An SSLVPN allows full network connectivity, asdoes an IPsec VPN, but can be deployedmore easily to remote users since neitherinstallation nor administrator rights on theclient are needed. This makes SSL-VPNsolutions, especially as regards to mobiledevices, attractive for enterprises.SSL VPNsSecure Socket Layer (SSL) VPNs havegained in popularity because theyare “clientless,” meaning the remo-te device doesn’t need to have a clientpre-installed to connect to the corporatenetwork. In many situations, an SSL VPNtunnel is created when a remote useropens a Web browser and connects to apre-defined URL. The VPN then promptsthe user for a user name and password.Once authenticated, the user is often
  24. 24. Secure Business Connectivity24Selecting the Optimal VPN SolutionFor the most part, which solution IT teamsselect depends on the needs remoteaccess must address. If it is a matter ofa fixed connection to branch offices, thenan IPsec VPN would be the first choice.The technology is tried and proven. Thereare appropriate gateways for all possibleamounts of users and requirements.The only prerequisite: an experiencedIT administrator must be on site to con-figure the connections and manage thedevices. Access rights and installationson the employees’ devices can be agreedupon and company-specific solutionscan be implemented. If employees don’tgive their approval for access to theirdevices or if IT teams want greaterflexibility, then SSL-VPNs are the preferredchoice. As only central administrationis required and no installation oradministrator rights on the end device arenecessary, the time and expense for IT isgreatly reduced.
  25. 25. Secure Business Connectivity25This is an effect that becomes clearly vi-sible when each user works with differentdevices to access centrally stored dataand applications. These devices don’thave to be managed anymore. Access isavailable from any device, regardless ofthe client’s OS, (e.g., Windows, OS X, Li-nux, UNIX, etc.) to any target in the enter-prise, from Windows Server with RemoteDesktop Services (RDS) to legacy sys-tems. All the user needs is a Java-capa-ble browser and an Internet connection.Modern solutions perform many securi-ty-relevant actions centrally, which thendon’t have to be implemented on the cli-ent. Mobile workplaces and the best pos-sible protection for enterprise data arethus no longer mutually exclusive.
  26. 26. Secure Business Connectivity26Creating Best Practicesthat Will MaximizeEmployee Productivity
  27. 27. Secure Business Connectivity27Crafting and implementing an organizati-on-wide mobile workplace approach willensure managers and employees alikeenjoy a positive experience. Below are sixpractices that are typically effective.
  28. 28. Secure Business Connectivity28Maximize EmployeeParticipationFor a company where the goal isto maximize employee productivity,maximizing employee participation firstis critical. As previous experience withearlier productivity tools, such as emailand IM, it is clear that limiting access tothese solutions also limits their value. While not every employee benefitsequally from productivity solutions suchas mobile workplaces, without a criticalmass of users, the benefit will be limited.It is perplexing sometimes that IT teamswant to limit solutions such as mobileworkplaces only to those supposedlyneed it. If employees are willing to workremotely and this will allow them torespond to colleagues and customersfaster, wouldn’t IT teams and managerswant as many employees as possible towork from anywhere and at any time?
  29. 29. Secure Business Connectivity29Free Use of Personal Appsand ServicesEmployees should be able to use theirpersonal apps and services, even if thedevice is owned by the company. There’sa significant difference between blockingan employee from storing their personalinformation on a cloud service and ensu-ring corporate data doesn’t end up in thepublic cloud. IT teams need to focus oncontrolling data, not devices.Ensure Employees Have theProductivity Tools They NeedEmployees are eager to use a whole ran-ge of productivity tools, that add to theIT team’s worries about securing the net-work. Unsure how to handle such em-ployee requests, IT teams often eitherdo nothing and let employees use thesetools without providing adequate security,or block use of the tools entirely. Securitysolutions exist that will allow employeesto utilize tools while concurrently preser-ving the security of the network.
  30. 30. Secure Business Connectivity30Broad Choice of DevicesThe mobile workplace program shouldsupport a wide range of devices,or the program will not be popular.There can be challenges, especiallydue to, e.g., Android’s variability regar-ding support for on-device encryptionand other enterprise-level security andmanagement controls.Offer Self-Service Support forEveryday ActivitiesThere is often a concern that mobile de-vices will increase support costs. This istypically not the case. And, if IT teamsoffer a self-service capability, especiallyfor routine activities, it can often result indecreased support costs. IT teams needto know where to draw the line. Theyshould always offer to assist with sup-porting business apps, but never offer tosupport personal apps and services.
  31. 31. Secure Business Connectivity31Avoiding the SecurityPitfalls of a MobileWorkplace Deployment
  32. 32. Secure Business Connectivity32There are several common problems thatoccur with mobile workplace deploy-ments and it’s important that IT teamsstay in front of these to protect theirorganization’s resources. These include:Ignoring Common ThreatsMost of the focus on mobile securityto date has been on malware, which isimportant, but a more common threattoday is mobile phishing. It’s harder ona mobile device for the user to identifyphony URLs, making it more likely they willsuccumb to a phishing scam.Taking a One-Size FitsAll ApproachThere are a few options for the IT teamto manage mobile device security, butthese come with a level of inconveniencefor users. For example, mobile virtualiza-tion can enable users to work remotelywithout any data on their devices, but thismay be overkill for the employee who justwants access to email.
  33. 33. Secure Business Connectivity33Assuming Users Will FollowSecurity PoliciesEmployees will resist any inconvenienceor threat to their personal privacy whenusing their company devices for privatepurposes, too. This forces IT teams tofocus on protecting their data and not thedevices.Failing to Educate UsersAs the mobile workplace trend prolifera-tes, it becomes harder to manage howpeople use mobile technology; IT teamsmust rely on educating employees to par-ticipate in keeping corporate data secure.
  34. 34. Secure Business Connectivity34ConclusionDespite many critical voices raced in thediscussion of mobile workplaces, the ad-vantages for both, companies and em-ployees, cannot be denied. The successof a company wide mobile workplaceprogram is largely influenced by definingthe right strategy, using the right techno-logy and involving the right people.While defining the appropriate strategy,company individual policies, conventionsand requirements should not be neglec-ted. Otherwise the upcoming realizationof the strategy will fail due to impactsthat do not fit the company. In terms oftechnology, VPNs are a core componentof a comprehensive cyber defense infra-structure and have come to the fore asflexible working has taken root in manybusinesses. Despite many advances innetwork security, robust VPNs remaincritical to ensure remote employees andemployees using their own devices canenjoy the convenience of anytime, any-where connectivity and IT teams can en-sure date integrity. Finally, the results willbe best if all stakeholders are involved inan early stage of the realization process.Often, employees highly value the pos-sibility of participation and influence andtherefore observe rules more willingly.
  35. 35. Secure Business Connectivity35Interested?Would you like to check out the numerousbenefits of HOB Software?Just call us or send us a quick mail!You are welcome to contact us:HOB GmbH & Co. KGSchwadermühlstraße 390556 CadolzburgTel: +49 9103 715 0E-Mail: marketing@hob.deWebseite: www.hobsoft.comInformation in this document is subject to change without noticeHOB is not liable for any omissions or errors which may be contained in this document.Product information contained herein is from March 2013.Any trademarks in this document are the property of their owners.Layout: Maximilian Göppner
  36. 36. Secure Business Connectivity36Footnotes(1) BYOD or Bust, Kyle Lagunas, HR Mar-ket Analyst, Software Advice, March 2012(2) A Cloud-Client Architecture ProvidesIncreased Security at Lower Cost, Oster-man Research Inc., January 2012(3) SANS Institute SANS Mobility/BYODSecurity Survey, March 2012
  37. 37. Secure Business Connectivity37• Page 27 - Orlando Rosu (Thinkstock)• Page 28 - Karin Jehle (Thinkstock)• Page 29 - R. Michael Stuckey (Thinkstock)• Page 30 - Thinkstock• Page 31 - Fotolia• Page 32 - Sergey Ilin (Thinkstock)• Page 33 - R. Michael Stuckey (Thinkstock)• Page 34 - FotoliaPicture Sources• Page 1 - Goodshoot (Thinkstock)• Page 4 - Zentilia (Thinkstock)• Page 6 - Arkadi Bjarnov (Thinkstock)• Page 7 - Yuri Arcurs (Thinkstock)• Page 8 - Eyecandy Images (Thinkstock)• Page 9 - Arkadi Bojarinov & Thinkstock Photos (Thinkstock)• Page 10 - ppart (Thinkstock)• Page 11 - Pavel Pospisil (Thinkstock)• Page 12 - Maksym Kobakou (Thinkstock)• Page 13 - Maksym Yemelynov (Thinkstock)• Page 16 - Julien Grondin (Thinkstock)• Page 17 - roonstick (Thinkstock)• Page 28 - Andrej Popov & Ivgen Chepil (Thinkstock))• Page 19 - pressureUA (Thinkstock)• Page 21 - Fotolia• Page 22 - ZoonarRF (Thinkstock)• Page 23 - Thinkstock• Page 24 - pressureUA (Thinkstock)• Page 25 - Roberto Rizzo (Thinkstock)• Page 26 - Ingram Publishing & Giovanni Bertolli (Thinkstock)

×