Mdm Byod Chop House Workshop Final

1,210 views
1,142 views

Published on

GTRI Workshop for BYOD and MDM

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,210
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Identity ManagementRole Based AccessNAC/BYOD - 802.1xDemoTroubleshootingOn boarding New DevicesEmployee ServicesDevice ProfilingWhat + Who = Access to WhereGuest ServicesSponsored or Self Registered
  • Mdm Byod Chop House Workshop Final

    1. 1. BYOD/MDM Workshop LuncheonBYOD/MDM Workshop LuncheonSponsored by Ciscoand Zenprise Hosted by Greg Hanchin Global Technology Resources, Inc. / Trusted Security Advisor July 26, 2012 ©2012 Global Technology Resources, Inc., All Rights Reserved. Contents herin contain confidential information not to be copied
    2. 2. Agenda Welcome Mobility Cisco ISE / BYOD ZenPrise / MDM Questions Breakout © 2012 GTRI
    3. 3. Who is GTRI?•$200M Systems Integrator Customers•14 years old•214 People•Profitable Employees•Scratch built•Denver - HQ Projects•$15 Million a Year in Professional Services•$70M in Commercial / $130M in Federal © 2012 GTRI
    4. 4. GTRI InfoSec Quilt © 2012 GTRI
    5. 5. Recent GTRI Security Projects © 2012 GTRI
    6. 6. © 2012 GTRI
    7. 7. iPad Sales – Just iPads © 2012 GTRI
    8. 8. MobilityMonty PetrichSA - Wireless GTRI © 2012 GTRI
    9. 9. Mobility Changes Everything Simple Secure Scalable ANY USER ANY DEVICE ANYTIMEANYWHERE © 2012 GTRI
    10. 10. Where is Wireless Going Future Technologies  802.11ac  802.11ad Wi-Fi Offload and DAS  What the carriers are doing  802.11u AnyConnect  How to prepare customers BYOD and Dynamic VLANs © 2012 GTRI
    11. 11. © 2012 GTRI
    12. 12. © 2012 GTRI
    13. 13. © 2012 GTRI
    14. 14. Bring Your Own Device Micah Montgomery SE-Information Security GTRI © 2012 GTRI
    15. 15. MDM vs BYOD/NAC MDM BYOD /NAC  Managing device WLAN/ Wired Managing Device on 3g/ 4g Access Manage Files  Role Based Access Control (RBAC) Manage APPS / Email  Concept of Device Stacking on Corp JailBreak Control  Identity Remote Wipe  Posture / Profile / Quarantine Device Encryption  Hoteling GEO Fencing  DLP – Lite on critical Files Device Recovery- LoJack  Authentication/Authorization/ Accounting -AAA © 2012 GTRI
    16. 16. Bridging the GAP © 2012 GTRI
    17. 17. © 2012 GTRI
    18. 18. The User to Device Ratio Has Changed © 2012 GTRI
    19. 19. Identity Services EngineACS • Centralized Policy Identity • RADIUS ServerNAC ServicesProfiler Engine • Posture AssessmentNAC • Guest Access ServicesGuest • Device ProfilingNAC • MonitoringManager • Troubleshooting NAC Server • Reporting © 2012 GTRI
    20. 20. BYOD Deployment Schenarios © 2012 GTRI
    21. 21. ISE Node Types © 2012 GTRI
    22. 22. ISE Platforms © 2012 GTRI
    23. 23. Gradual DeploymentMonitor Mode Low Impact High Security• Authentication Mode Mode Without Access • Minimal Impact • Logical Isolation Control to Network and of User Groups / Users Device Types © 2012 GTRI
    24. 24. What Device? © 2012 GTRI
    25. 25. ISE Profiler: 3 Steps © 2012 GTRI
    26. 26. Guest Self Service © 2012 GTRI
    27. 27. Guest User Experience © 2012 GTRI
    28. 28. Certificate Location by DeviceDevice Certificate Storage Location Access MethodiPhone/iPad Standard certificate store Settings > General > ProfileAndroid Encrypted certificate store Invisible to end users. Note Certificates can be removed using Settings > Location & Security > Clear Storage.Windows Standard certificate store Launch mmc.exe from /cmd prompt, or view in certificate snap-in.Mac Standard certificate store Application > Utilities > Keychain Access © 2012 GTRI
    29. 29. What about Accounting? Provides additional information about the session Marks end of a session (Removes endpoint from licensing count) Provides IP address Profile IOS probe © 2012 GTRI
    30. 30. MDM vs BYOD/NAC MDM BYOD /NAC  Managing device WLAN/ Wired Managing Device on 3g/ 4g Access Manage Files  Role Based Access Control (RBAC) Manage APPS / Email  Concept of Device Stacking on Corp JailBreak Control  Identity Remote Wipe  Posture / Profile / Quarantine Device Encryption  Hoteling GEO Fencing  DLP – Lite on critical Files Device Recovery- LoJack  Authentication/Authorization/ Accounting -AAA © 2012 GTRI
    31. 31. Mobile Device Management David DeCesare SE – Denver Region © 2012 GTRI
    32. 32.  Placeholder for the ZenPrise Slides © 2012 GTRI
    33. 33. Questions? © 2012 GTRI
    34. 34. BYOD/MDM Workshop LuncheonThank You! July 26, 2012 ©2012 Global Technology Resources, Inc., All Rights Reserved. Contents herin contain confidential information not to be copied

    ×