Your SlideShare is downloading. ×
0
W&M 2009 – How to ensure secure application access via wireless networks without sacrificing performance or usability
W&M 2009 – How to ensure secure application access via wireless networks without sacrificing performance or usability
W&M 2009 – How to ensure secure application access via wireless networks without sacrificing performance or usability
W&M 2009 – How to ensure secure application access via wireless networks without sacrificing performance or usability
W&M 2009 – How to ensure secure application access via wireless networks without sacrificing performance or usability
W&M 2009 – How to ensure secure application access via wireless networks without sacrificing performance or usability
W&M 2009 – How to ensure secure application access via wireless networks without sacrificing performance or usability
W&M 2009 – How to ensure secure application access via wireless networks without sacrificing performance or usability
W&M 2009 – How to ensure secure application access via wireless networks without sacrificing performance or usability
W&M 2009 – How to ensure secure application access via wireless networks without sacrificing performance or usability
W&M 2009 – How to ensure secure application access via wireless networks without sacrificing performance or usability
W&M 2009 – How to ensure secure application access via wireless networks without sacrificing performance or usability
W&M 2009 – How to ensure secure application access via wireless networks without sacrificing performance or usability
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

W&M 2009 – How to ensure secure application access via wireless networks without sacrificing performance or usability

301

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
301
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Current statistics show enterprises issue laptops more often than traditional desktops. More of these laptops are mobile (taking advantage of broadband wireless and WLAN technologies) and these laptops contain significant amounts of sensitive corporate data – some estimates state as much as 60% of sensitive enterprise data resides on laptops. Mobile laptops create a blind spot for the enterprise. Since they are not always connected like desktops today, enterprise IT lacks the ability to track, manage, and secure those devices. This blind spot creates a security risk for the enterprise. When a laptop leaves the enterprise, IT cannot protect the laptop or its sensitive data A lost or stolen laptop is the “nightmare” scenario for IT. Over the last year, hardly a week would go by without hearing about another lost/stolen laptop in the press, and many of these losses go unreported. Many solutions protect the network from a corrupt endpoint. Many enterprises use solutions that check the health of a device and quarantine that device if not up to snuff to protect the network. However, these solutions only take effect when the end user connects to the enterprise. A sick laptop could leak sensitive information out over the public internet
  • In May 2005, according to research firm Current Analysis, laptop sales exceeded those of desktop and jumped to 53.3% of the total PC retail market. At the same time, over 60% of an enterprise’s confidential data resides on these laptops. For enterprise CIOs, mobile endpoints create a huge hole in their security program. While laptops are connected at the enterprise’s physical location, the laptop can be adequately managed w.r.t. policies, configuration audits, security, automatic patch updates and back-ups, etc. {Click} However, when not connected locally or via a VPN, laptops can be subjugated to data tampering, content theft, multiple types of intrusions including those that modify the OS, etc. resulting in potentially significant loss of enterprise assets or worse. {Click} Alcatel-Lucent’s InTouch – Mobile Manager, the result of what had been called “project EVROS,” has devised a unique package that plugs into the laptop and provides for a fully independent and trusted interconnection with the enterprise network. It remains active, even when the laptop is powered-off, and uses a 3G network for the interconnection. If it detects, for example that the laptop defenses have been compromised, it can turn-off the laptop’s IP access, alert the enterprise, and enable the IT group to begin remediation via InToch. If the laptop is stolen, (as were 600,000 in 2003 – according to Safeware Insurance) InTouch can determine the laptop’s location, back-up key data, wipe data from the laptop disk, and deny access to the laptop. Critical patches can be delivered during off-hours, even when the laptop is powered off. When the laptop is powered-on, the patch is immediately applied. InTouch is currently entering field trials with several enterprises and cellular service providers. The solution is currently scheduled to be publicly available to enterprises in the US in Q3 of 2007.  Dor Skuler
  • SPEAKER INSTRUCTIONS This is the last slide of EVERY presentation. No need to stress on every single topic here as a conclusion, specially if you already have a « why ALU? » slide directly linked to your solutions or services. Just highlight how the content you just delivered fits into these unique differentiators. (remove the yellow tag…)
  • Transcript

    • 1. Securing the Mobile Blind Spot Michael Hardiman, Director of Business Development, Security Solutions, EMEA
    • 2. The Enterprise Security Challenge – A UK Phenomenon!
    • 3. The Enterprise Security Challenge More than 50% of new corporate computer purchases are laptops. “ More than 600,000 laptop thefts occur annually” (Source: Safeware Insurance) “ Average Value of Business Info on Travelers' Laptops Equals $525,000 ” (Source: CIO Magazine) “… 81% of respondents report that their organizations had one or more lost or missing laptop containing sensitive or confidential business information in the last 12 months…” (Source: Ponemon Institute, 2008) “ The average time from vulnerability announcement to exploit is now measured in hours.” (Source: Microsoft Corporation)
    • 4. <ul><ul><li>2006 London Black Cabs </li></ul></ul><ul><ul><ul><li>54,872 mobile phones </li></ul></ul></ul><ul><ul><ul><li>4,718 handheld computers </li></ul></ul></ul><ul><ul><ul><li>3,179 laptops </li></ul></ul></ul><ul><ul><ul><li>923 computer memory sticks </li></ul></ul></ul><ul><ul><ul><li>http://www.timesonline.co.uk/tol/news/uk/article652378.ece </li></ul></ul></ul><ul><ul><li>2007 UK airports </li></ul></ul><ul><ul><ul><li>8500 mobile devices lost </li></ul></ul></ul><ul><ul><ul><li>400 laptops &amp; 2500 mobile devices in London airports </li></ul></ul></ul><ul><ul><ul><li>http://www.infomaticsonline.co.uk/vnunet/news/2202920/travellers-lose-mobile-devices-airports </li></ul></ul></ul><ul><ul><li>1H 2008 London Black Cabs &amp; Airports </li></ul></ul><ul><ul><ul><li>Some 55,843 mobile phones </li></ul></ul></ul><ul><ul><ul><li>6,193 devices, such as laptops </li></ul></ul></ul><ul><ul><ul><li>900 laptops per week at Heathrow </li></ul></ul></ul><ul><ul><ul><li>http://news.bbc.co.uk/1/hi/technology/7620569.stm </li></ul></ul></ul>Portability = lose-ability !
    • 5. &nbsp;
    • 6. CIOs describe confidence levels in preventing dangerous actions by laptop users
    • 7. IS THE PERIMETER ENOUGH ?
    • 8. IT Managers Need to Eliminate the Mobile Blind Spot <ul><li>When a laptop leaves the enterprise, IT loses control : </li></ul><ul><ul><li>Secured only by local clients (Anti-virus, etc..) </li></ul></ul><ul><ul><li>Difficult to patch and backup </li></ul></ul><ul><ul><li>A lost or stolen laptop is the “nightmare” scenario for IT </li></ul></ul><ul><ul><li>No monitoring of the mobile device activity </li></ul></ul><ul><ul><li>Difficulty to enforce policies </li></ul></ul><ul><ul><li>Lack of asset inventory </li></ul></ul><ul><ul><li>Complicated for the end users </li></ul></ul>Lack of Visibility and Control over Mobile Laptops
    • 9. Securing the Mobile Blindspot – a Mobile Service Manager <ul><li>Trusted Platform / Secured Link for Wireless Devices </li></ul><ul><li>Fully Independent / Always Available </li></ul><ul><li>Open Architecture Enables 3 rd Parties to Develop and Integrate Software </li></ul>WiFi 3G WiMax Connected? Worms / Viruses / Intrusion / Disk Access / Data Tampering / Content Theft / OS Integrity Secure Corporate Enclave <ul><li>Configuration </li></ul><ul><li>Data protection </li></ul>Firewall <ul><li>Patch management </li></ul><ul><li>Policies </li></ul><ul><li>Always-on – even when laptop is off </li></ul><ul><li>Remote “kill” capability </li></ul><ul><li>Policy enforcement </li></ul><ul><li>Local Quarantine </li></ul><ul><li>Secure all networking interfaces </li></ul><ul><li>Off-hour back-ups + patching </li></ul><ul><li>Location </li></ul><ul><li>Authentication </li></ul><ul><li>Auto VPN </li></ul><ul><li>3 rd party capabilities </li></ul>Trust-based Link Worms / Viruses / Intrusion / Disk Access / Data Tampering / Content Theft / OS Integrity
    • 10. Case Study
    • 11. Case Study – Visiting Nurses Association of Northern New Jersey <ul><li>Challenges </li></ul><ul><ul><li>Multiple laptop PCs in the field </li></ul></ul><ul><ul><li>Sensitive clinical/financial data </li></ul></ul><ul><ul><li>Data vulnerable to loss/theft </li></ul></ul><ul><ul><li>No possibility to ‘lockdown’ data if PC is stolen/missing </li></ul></ul><ul><ul><li>Maintaining a reputable public image </li></ul></ul><ul><ul><li>Retain patients and employees </li></ul></ul>
    • 12. Alcatel-Lucent : partner to the Dynamic Enterprises Enabling the Dynamic Enterprise
    • 13. OEP <ul><li>Hungarian National Health Insurance Fund </li></ul><ul><li>Business drive: </li></ul><ul><ul><li>Building a countrywide customer service with about 50 locations in rented offices. </li></ul></ul><ul><ul><li>These locations are build up for short period (less than 1 year) and frequent changes/relocations are expected. </li></ul></ul><ul><ul><li>So customer did not want to build LAN and site-to-site VPN infrastructure to these rented locations. </li></ul></ul><ul><ul><li>NLG is a great solution: no need for LAN/VPN infrastructure, 3G will be used instead. </li></ul></ul><ul><li>Most important feature of NLG in this case: auto-VPN over 3G </li></ul><ul><li>Future: integrated full-disc encryption solution as NLG integration is finished. P referred solution: Checkpoint Pointsec </li></ul>

    ×