SlideShare a Scribd company logo
1 of 8
Download to read offline
Mobile Device Security
A TechStone Soft White Paper

                 915 Highland Pointe Dr., Suite 250
                               Roseville, CA 95678
                            Phone: (916) 724-5301
                              Fax : (916) 724-5303
                        http://www.mobiwee.com/

By: Amira Samaha, Marketing Director
Contents         Introduction
                                A brief case for an end-to-end mobile device
Introduction                3   security solution.
Trends in Mobile Security   3
The MobiWee Solution        5   Trends in Mobile Security & Key Players
Implementation              6   in Mobile Security
Company Information         8   An overview of common use-cases for mobile
                                device security and their current solutions.


                                The MobiWee Solution
                                A brief overview of the common pain points
                                associated with mobile information
                                management.


                                Implementation
                                The MobiWee suite of security services in
                                detail.


                                Company Information
                                More about TechStone Soft.




2|Page
Mobile Device Security




T          here are many ways to approach
           mobile security, and in this white
           paper, we will endeavor to
explore each aspect, its current technology
and key players, and ultimately form an end-
                                                 necessary time to locate and retrieve the device.
                                                 Unfortunately, this straightforward solution has no
                                                 direct line consequence to the respective IT
                                                 department in the event of data loss. Even with
                                                 corporate policies enforcing after-loss encryption,
to-end solution that encapsulates these          the lack of IT department motivation is often
factors.                                         transferred to the IT-uneducated employee who
                                                 remains ignorant of the encryption remedy. Rather
Location services ensure the phone is simply     than implementing costly employee seminars or
misplaced rather than lost or stolen,            relying on an unmotivated IT department, the ideal
potentially saving the user time, resources,     resolution would include a simple yet effective
and in some cases unnecessary worry for          remote encryption method that the employee would
their employer.                                  administer in lieu of an IT department.

In the case of sensitive information on the      If a device is determined to be lost or stolen with no
device, there are two vulnerabilities to         hope of recovery, it becomes a veritable treasure
consider: authentication and the sensitive       trove of sensitive data that could put clients,
data itself.                                     employees, corporations, and countless others at
                                                 risk. Social security numbers, payroll data, and other
While crucial for ensuring security,             security risks are instantly made vulnerable to
authentication straddles the line between        identity theft and fraud in addition to the resulting
tedious and practical. When choosing an          hostile publicity that would be associated with any
authentication method, the importance of         corporation that allowed such a folly. Unfortunately,
simplicity cannot be stressed enough. The        this is a commonplace incident, and the first to hear
process must require minimal user input yet      of such an event are often the clients, who become
provide DNA match accuracy in return.            disillusioned at best. The best recourse under the
                                                 circumstances would be to simply wipe the device,
In the event of an authenticity breach, the      alleviating concerns all around. Even when such a
data itself is often secured by means of         solution exists free of charge, it is often difficult to
encryption. In this case, the user s             carry out, relying on a carrier, manufacturer, or
information is rendered unreadable to            advanced user knowledge. Ideally, the owner of the
anyone without the pin code that serves as a     mobile device would have the means to remotely
key to decrypt the device. While this is         wipe their mobile device with minimal effort or
likely the most thorough form of data            product knowledge (such as the device IMEI, etc).
security, this process renders the data
unsearchable to third party tools and devices    For prosumers and employers alike, access to [often
that do not use security native to the OS.       live] company data is integral to any mobile security
While this may not be drawback for those         policy. Most corporate and educational institutions
who do not intend to use the data on a daily     employ a digital signature that binds together a
basis, doctors, lawyers and professionals        public key with an identity- this is called a
alike whom habitually access sensitive data      certificate. The setup associated with a certificate
find this limiting and often choose to leave     often requires a dedicated IT staff or advanced
their device unencrypted for the sake of         knowledge of the mobile device, limiting the scope
practicality. Ideally, the option to encrypt     of such a solution. While laptops are ubiquitous and
would be most favorable after a loss or theft,   relatively invariable, other mobile devices such as
so as to give the proper authorities the         smartphones often require a unique skill-set (each




3|Page
Mobile Device Security




phone has a slightly different UI) and IT        their device logged in, eliminating a significant
support is often requested to carry out          portion of its functionality.
proper configuration. The capability to
easily import and export certificates directly   To eliminate any user interference, offer maximum
to the employee s phone would eliminate          security and realistically address business continuity,
costly IT assistance and assure proper           a digital badge in lieu of more complex solutions
configuration.                                   would be ideal. A digital badge is easy to provision,
                                                 install, and can be linked back to corporate
Additional security measures that would          infrastructures such as active directory/LDAP
drastically boost security such as               (which also ensures that access is no longer granted
Smartcards, One Time Password devices            to former employees).
and the like are generally under-utilized due
to budgetary constraints and the simple lack     These remedies, while useful in their own right,
of legal requirement (unlike the military and    offer a disjointed and independently lacking
other government institutions). Typically,       solution. As the proverb goes, a chain is as strong
these multifactor authentication methods         as its weakest link, and a collection of disjointed
require additional physical devices,             remedies do not always create a comprehensive,
software, drivers, and an IT department          end-to-end solution.
trained to troubleshoot the security system
and its interaction with other programs and      To create a comprehensive, end to end solution, two
tools. Even with these provisions,               issues must be addressed: the components and their
employees often undermine security               individual merit, and how well they interact with one
measures for the sake of expediency by           another. For example; an authentication system
permanently gluing they smartcard into their     might not allow for remote certificates to be
computer or pasting the key code to their        installed. When these issues arise, many solutions
OTP device on the device itself.                 lack the technical support or knowledge to address
                                                 such compatibility issues. For this reason, it is
Ideally, any multifactor authentication          important to consider how the programs or solutions
standard would forego a costly physical          interact with one another before implementing a
device yet deliver the same security. Some       security system. The much simpler, more cost
2-factor authentication methods have been        effective solution is simply to look for a
created for just this purpose, requiring a       preconfigured security suite that offers all of the
username and password (first factor) and         above security components. That s where MobiWee
calling the user and asking the user to dial a   comes in: unlike other solutions, MobiWee
number or unique pass code. This                 addresses all of the above issues to provide a
authenticates the user and the device,           complete, preconfigured, end-to-end solution that is
operating on the assumption that whoever         at once cost effective and easy to use.
has found or stolen the device does not
know the username and password.
Unfortunately, many find the user name and
password to be a nuisance and simply leave




4|Page
Mobile Device Security




    The MobiWee suite of cloud services (www.mobiwee.com) is the user-centric solution to the most
    common pain points associated with mobile information management:

·     Traditional syncing tethers users to their computer

            o MobiWee provides OTA/cloud collaboration from any PC, Mac, or mobile device.

·     Mobilizing data is risky

            o MobiWee secures sensitive data with remote lock/wipe, remote data encryption (using the
              native OS security), remote certificate export/installation, and remote device location
              services- even when the mobile device is lost, stolen, or the SIM card has been replaced.

·     Business continuity

            o MobiWee is non-intrusive and easy to use; business continuity is not put at risk with complex
              security that is impossible to implement when away from the office.
                  · Ex: When a VP/Manager is away on a business trip and the Smartcard/OTP device is
                      wiped, troubleshooting is impossible without an IT department.
                  · MobiWee remote certificates can be implemented worldwide, through the IT
                      department or self-service.

·     High Cost for Services and Support

            o MobiWee reduces costs by utilizing a scalable cloud computing model (host servers do not
              require regular maintenance or a dedicated IT staff).

·     Usability & User Experience

            o MobiWee offers compelling services that require little to no technical expertise to
              personalize, collaborate, and secure mobile devices.

    Users have the freedom to remotely access, backup, sync, and secure their phone over the 3GSM or Wi-Fi
    network- no matter what phone, operating system, or computer the user is running (currently running on
    Windows 6.0 & higher with Android, Symbian, iPhone, Palm Pre, and Blackberry on the way).

    MobiWee allows users to remotely locate their lost or stolen phone, forward it to any number, retrieve
    any data, media, or contact list, then lock, wipe, encrypt, or delete certificates (for prosumers) - even if the
    SIM card has been replaced.

    MobiWee also reduces the hassle of phone upgrades by facilitating Exchange, POP3/IMAP email
    configuration. With one click on the email icon, MobiWee sends your email settings to your device over
    the 3G or Wi-Fi network.




    5|Page
Mobile Device Security




Location Service:

            Whether on the bus, at the airport, or simply left at work, with the mobile
            device location service, you re never left guessing. If your mobile device is
            out of range, the MobiWee location service will keep trying until it finds it.




Multifactor Authentication:


              MobiWee can provide automated, customized multiform authentication
              using a variety of credentials that require little to no user contribution.




Remote Encryption/Decryption:


              Ensure your sensitive information is protected against data breaches.
              MobiWee Encryption/Decryption services ensure that your data is
              safeguarded, on and off your corporate network. Encrypt your Smartphone
              from the MobiWee website before or after you lose it.




6|Page
Mobile Device Security




Remote Lock/Wipe:

              Defend yourself against identity theft with the remote lock/wipe service,
              no matter where you left your phone. Just log in to MobiWee.com and
              click to lock or reset your device and external memory to factory settings-
              from any computer.




Remote Certificate/Digital Badge:


              Take the work out of security while securing your work by exporting and
              installing certificates remotely from any PC. With MobiWee, your
              identity is verified every time, from any mobile device, PC, or Mac.




7|Page
Mobile Device Security




About the Company:

       TechStone Soft was established with a vision to serve the global business and technology
needs. We provide a sophisticated suite of solutions for achieving superior business results and
enable our clients to rapidly lead technology markets, and enhance customer services and
experience.


       Our applications portfolio includes automation solutions which has the ability to extend
the enterprise capabilities beyond boundaries through state-of-art technology collaboration.
TechStone also has a workflow collaboration framework that can enable customers to have full
control of their personal devices and data stored and accessed within these devices.



TechStone Soft
915 Highland Pointe Dr., Suite 250
Roseville, CA 95678
Phone: (916) 724-5301
Fax : (916) 724-5303
e-Mail: admin@techstonesolutions.com




8|Page

More Related Content

What's hot

Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security SuiteCharles McNeil
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingIvanti
 
IT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesIT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesRichard Cole
 
CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1Ian Sommerville
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Securityeircom
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...researchinventy
 
I Series User Management
I Series User ManagementI Series User Management
I Series User ManagementSJeffrey23
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionFindWhitePapers
 
Defense Foundation Product Brief
Defense Foundation Product BriefDefense Foundation Product Brief
Defense Foundation Product Briefwdjohnson1
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Arrow ECS UK
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 

What's hot (20)

Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security Suite
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
 
IT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesIT Security for Oil and Gas Companies
IT Security for Oil and Gas Companies
 
CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
 
I Series User Management
I Series User ManagementI Series User Management
I Series User Management
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
 
Defense Foundation Product Brief
Defense Foundation Product BriefDefense Foundation Product Brief
Defense Foundation Product Brief
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 

Viewers also liked

Financial Solutions in a Troubling Economy
Financial Solutions in a Troubling EconomyFinancial Solutions in a Troubling Economy
Financial Solutions in a Troubling EconomyStuart Little
 
日本花道 靜觀、典雅、美學
日本花道 靜觀、典雅、美學日本花道 靜觀、典雅、美學
日本花道 靜觀、典雅、美學Josephine C
 
Mindful Living Photo Art
Mindful Living Photo ArtMindful Living Photo Art
Mindful Living Photo Arttessajol
 
MyWorkSearch Presentation on Student Employability for Further Education
MyWorkSearch Presentation on Student Employability for Further EducationMyWorkSearch Presentation on Student Employability for Further Education
MyWorkSearch Presentation on Student Employability for Further EducationMyWorkSearch Ltd
 
Adelman agile abridged for web
Adelman agile abridged for webAdelman agile abridged for web
Adelman agile abridged for webSTIR, LLC
 

Viewers also liked (6)

Financial Solutions in a Troubling Economy
Financial Solutions in a Troubling EconomyFinancial Solutions in a Troubling Economy
Financial Solutions in a Troubling Economy
 
日本花道 靜觀、典雅、美學
日本花道 靜觀、典雅、美學日本花道 靜觀、典雅、美學
日本花道 靜觀、典雅、美學
 
猝死
猝死猝死
猝死
 
Mindful Living Photo Art
Mindful Living Photo ArtMindful Living Photo Art
Mindful Living Photo Art
 
MyWorkSearch Presentation on Student Employability for Further Education
MyWorkSearch Presentation on Student Employability for Further EducationMyWorkSearch Presentation on Student Employability for Further Education
MyWorkSearch Presentation on Student Employability for Further Education
 
Adelman agile abridged for web
Adelman agile abridged for webAdelman agile abridged for web
Adelman agile abridged for web
 

Similar to Security White Paper

Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityarms8586
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point FinalBen Rothke
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 

Similar to Security White Paper (20)

Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Security White Paper

  • 1. Mobile Device Security A TechStone Soft White Paper 915 Highland Pointe Dr., Suite 250 Roseville, CA 95678 Phone: (916) 724-5301 Fax : (916) 724-5303 http://www.mobiwee.com/ By: Amira Samaha, Marketing Director
  • 2. Contents Introduction A brief case for an end-to-end mobile device Introduction 3 security solution. Trends in Mobile Security 3 The MobiWee Solution 5 Trends in Mobile Security & Key Players Implementation 6 in Mobile Security Company Information 8 An overview of common use-cases for mobile device security and their current solutions. The MobiWee Solution A brief overview of the common pain points associated with mobile information management. Implementation The MobiWee suite of security services in detail. Company Information More about TechStone Soft. 2|Page
  • 3. Mobile Device Security T here are many ways to approach mobile security, and in this white paper, we will endeavor to explore each aspect, its current technology and key players, and ultimately form an end- necessary time to locate and retrieve the device. Unfortunately, this straightforward solution has no direct line consequence to the respective IT department in the event of data loss. Even with corporate policies enforcing after-loss encryption, to-end solution that encapsulates these the lack of IT department motivation is often factors. transferred to the IT-uneducated employee who remains ignorant of the encryption remedy. Rather Location services ensure the phone is simply than implementing costly employee seminars or misplaced rather than lost or stolen, relying on an unmotivated IT department, the ideal potentially saving the user time, resources, resolution would include a simple yet effective and in some cases unnecessary worry for remote encryption method that the employee would their employer. administer in lieu of an IT department. In the case of sensitive information on the If a device is determined to be lost or stolen with no device, there are two vulnerabilities to hope of recovery, it becomes a veritable treasure consider: authentication and the sensitive trove of sensitive data that could put clients, data itself. employees, corporations, and countless others at risk. Social security numbers, payroll data, and other While crucial for ensuring security, security risks are instantly made vulnerable to authentication straddles the line between identity theft and fraud in addition to the resulting tedious and practical. When choosing an hostile publicity that would be associated with any authentication method, the importance of corporation that allowed such a folly. Unfortunately, simplicity cannot be stressed enough. The this is a commonplace incident, and the first to hear process must require minimal user input yet of such an event are often the clients, who become provide DNA match accuracy in return. disillusioned at best. The best recourse under the circumstances would be to simply wipe the device, In the event of an authenticity breach, the alleviating concerns all around. Even when such a data itself is often secured by means of solution exists free of charge, it is often difficult to encryption. In this case, the user s carry out, relying on a carrier, manufacturer, or information is rendered unreadable to advanced user knowledge. Ideally, the owner of the anyone without the pin code that serves as a mobile device would have the means to remotely key to decrypt the device. While this is wipe their mobile device with minimal effort or likely the most thorough form of data product knowledge (such as the device IMEI, etc). security, this process renders the data unsearchable to third party tools and devices For prosumers and employers alike, access to [often that do not use security native to the OS. live] company data is integral to any mobile security While this may not be drawback for those policy. Most corporate and educational institutions who do not intend to use the data on a daily employ a digital signature that binds together a basis, doctors, lawyers and professionals public key with an identity- this is called a alike whom habitually access sensitive data certificate. The setup associated with a certificate find this limiting and often choose to leave often requires a dedicated IT staff or advanced their device unencrypted for the sake of knowledge of the mobile device, limiting the scope practicality. Ideally, the option to encrypt of such a solution. While laptops are ubiquitous and would be most favorable after a loss or theft, relatively invariable, other mobile devices such as so as to give the proper authorities the smartphones often require a unique skill-set (each 3|Page
  • 4. Mobile Device Security phone has a slightly different UI) and IT their device logged in, eliminating a significant support is often requested to carry out portion of its functionality. proper configuration. The capability to easily import and export certificates directly To eliminate any user interference, offer maximum to the employee s phone would eliminate security and realistically address business continuity, costly IT assistance and assure proper a digital badge in lieu of more complex solutions configuration. would be ideal. A digital badge is easy to provision, install, and can be linked back to corporate Additional security measures that would infrastructures such as active directory/LDAP drastically boost security such as (which also ensures that access is no longer granted Smartcards, One Time Password devices to former employees). and the like are generally under-utilized due to budgetary constraints and the simple lack These remedies, while useful in their own right, of legal requirement (unlike the military and offer a disjointed and independently lacking other government institutions). Typically, solution. As the proverb goes, a chain is as strong these multifactor authentication methods as its weakest link, and a collection of disjointed require additional physical devices, remedies do not always create a comprehensive, software, drivers, and an IT department end-to-end solution. trained to troubleshoot the security system and its interaction with other programs and To create a comprehensive, end to end solution, two tools. Even with these provisions, issues must be addressed: the components and their employees often undermine security individual merit, and how well they interact with one measures for the sake of expediency by another. For example; an authentication system permanently gluing they smartcard into their might not allow for remote certificates to be computer or pasting the key code to their installed. When these issues arise, many solutions OTP device on the device itself. lack the technical support or knowledge to address such compatibility issues. For this reason, it is Ideally, any multifactor authentication important to consider how the programs or solutions standard would forego a costly physical interact with one another before implementing a device yet deliver the same security. Some security system. The much simpler, more cost 2-factor authentication methods have been effective solution is simply to look for a created for just this purpose, requiring a preconfigured security suite that offers all of the username and password (first factor) and above security components. That s where MobiWee calling the user and asking the user to dial a comes in: unlike other solutions, MobiWee number or unique pass code. This addresses all of the above issues to provide a authenticates the user and the device, complete, preconfigured, end-to-end solution that is operating on the assumption that whoever at once cost effective and easy to use. has found or stolen the device does not know the username and password. Unfortunately, many find the user name and password to be a nuisance and simply leave 4|Page
  • 5. Mobile Device Security The MobiWee suite of cloud services (www.mobiwee.com) is the user-centric solution to the most common pain points associated with mobile information management: · Traditional syncing tethers users to their computer o MobiWee provides OTA/cloud collaboration from any PC, Mac, or mobile device. · Mobilizing data is risky o MobiWee secures sensitive data with remote lock/wipe, remote data encryption (using the native OS security), remote certificate export/installation, and remote device location services- even when the mobile device is lost, stolen, or the SIM card has been replaced. · Business continuity o MobiWee is non-intrusive and easy to use; business continuity is not put at risk with complex security that is impossible to implement when away from the office. · Ex: When a VP/Manager is away on a business trip and the Smartcard/OTP device is wiped, troubleshooting is impossible without an IT department. · MobiWee remote certificates can be implemented worldwide, through the IT department or self-service. · High Cost for Services and Support o MobiWee reduces costs by utilizing a scalable cloud computing model (host servers do not require regular maintenance or a dedicated IT staff). · Usability & User Experience o MobiWee offers compelling services that require little to no technical expertise to personalize, collaborate, and secure mobile devices. Users have the freedom to remotely access, backup, sync, and secure their phone over the 3GSM or Wi-Fi network- no matter what phone, operating system, or computer the user is running (currently running on Windows 6.0 & higher with Android, Symbian, iPhone, Palm Pre, and Blackberry on the way). MobiWee allows users to remotely locate their lost or stolen phone, forward it to any number, retrieve any data, media, or contact list, then lock, wipe, encrypt, or delete certificates (for prosumers) - even if the SIM card has been replaced. MobiWee also reduces the hassle of phone upgrades by facilitating Exchange, POP3/IMAP email configuration. With one click on the email icon, MobiWee sends your email settings to your device over the 3G or Wi-Fi network. 5|Page
  • 6. Mobile Device Security Location Service: Whether on the bus, at the airport, or simply left at work, with the mobile device location service, you re never left guessing. If your mobile device is out of range, the MobiWee location service will keep trying until it finds it. Multifactor Authentication: MobiWee can provide automated, customized multiform authentication using a variety of credentials that require little to no user contribution. Remote Encryption/Decryption: Ensure your sensitive information is protected against data breaches. MobiWee Encryption/Decryption services ensure that your data is safeguarded, on and off your corporate network. Encrypt your Smartphone from the MobiWee website before or after you lose it. 6|Page
  • 7. Mobile Device Security Remote Lock/Wipe: Defend yourself against identity theft with the remote lock/wipe service, no matter where you left your phone. Just log in to MobiWee.com and click to lock or reset your device and external memory to factory settings- from any computer. Remote Certificate/Digital Badge: Take the work out of security while securing your work by exporting and installing certificates remotely from any PC. With MobiWee, your identity is verified every time, from any mobile device, PC, or Mac. 7|Page
  • 8. Mobile Device Security About the Company: TechStone Soft was established with a vision to serve the global business and technology needs. We provide a sophisticated suite of solutions for achieving superior business results and enable our clients to rapidly lead technology markets, and enhance customer services and experience. Our applications portfolio includes automation solutions which has the ability to extend the enterprise capabilities beyond boundaries through state-of-art technology collaboration. TechStone also has a workflow collaboration framework that can enable customers to have full control of their personal devices and data stored and accessed within these devices. TechStone Soft 915 Highland Pointe Dr., Suite 250 Roseville, CA 95678 Phone: (916) 724-5301 Fax : (916) 724-5303 e-Mail: admin@techstonesolutions.com 8|Page