• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Mdm Byod Chop House Workshop   Final
 

Mdm Byod Chop House Workshop Final

on

  • 1,061 views

GTRI Workshop for BYOD and MDM

GTRI Workshop for BYOD and MDM

Statistics

Views

Total Views
1,061
Views on SlideShare
1,059
Embed Views
2

Actions

Likes
0
Downloads
8
Comments
0

2 Embeds 2

http://securitycrunch.com 1
http://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Identity ManagementRole Based AccessNAC/BYOD - 802.1xDemoTroubleshootingOn boarding New DevicesEmployee ServicesDevice ProfilingWhat + Who = Access to WhereGuest ServicesSponsored or Self Registered

Mdm Byod Chop House Workshop   Final Mdm Byod Chop House Workshop Final Presentation Transcript

  • BYOD/MDM Workshop LuncheonBYOD/MDM Workshop LuncheonSponsored by Ciscoand Zenprise Hosted by Greg Hanchin Global Technology Resources, Inc. / Trusted Security Advisor July 26, 2012 ©2012 Global Technology Resources, Inc., All Rights Reserved. Contents herin contain confidential information not to be copied
  • Agenda Welcome Mobility Cisco ISE / BYOD ZenPrise / MDM Questions Breakout © 2012 GTRI
  • Who is GTRI?•$200M Systems Integrator Customers•14 years old•214 People•Profitable Employees•Scratch built•Denver - HQ Projects•$15 Million a Year in Professional Services•$70M in Commercial / $130M in Federal © 2012 GTRI
  • GTRI InfoSec Quilt © 2012 GTRI
  • Recent GTRI Security Projects © 2012 GTRI
  • © 2012 GTRI
  • iPad Sales – Just iPads © 2012 GTRI
  • MobilityMonty PetrichSA - Wireless GTRI © 2012 GTRI
  • Mobility Changes Everything Simple Secure Scalable ANY USER ANY DEVICE ANYTIMEANYWHERE © 2012 GTRI
  • Where is Wireless Going Future Technologies  802.11ac  802.11ad Wi-Fi Offload and DAS  What the carriers are doing  802.11u AnyConnect  How to prepare customers BYOD and Dynamic VLANs © 2012 GTRI
  • © 2012 GTRI
  • © 2012 GTRI
  • © 2012 GTRI
  • Bring Your Own Device Micah Montgomery SE-Information Security GTRI © 2012 GTRI
  • MDM vs BYOD/NAC MDM BYOD /NAC  Managing device WLAN/ Wired Managing Device on 3g/ 4g Access Manage Files  Role Based Access Control (RBAC) Manage APPS / Email  Concept of Device Stacking on Corp JailBreak Control  Identity Remote Wipe  Posture / Profile / Quarantine Device Encryption  Hoteling GEO Fencing  DLP – Lite on critical Files Device Recovery- LoJack  Authentication/Authorization/ Accounting -AAA © 2012 GTRI
  • Bridging the GAP © 2012 GTRI
  • © 2012 GTRI
  • The User to Device Ratio Has Changed © 2012 GTRI
  • Identity Services EngineACS • Centralized Policy Identity • RADIUS ServerNAC ServicesProfiler Engine • Posture AssessmentNAC • Guest Access ServicesGuest • Device ProfilingNAC • MonitoringManager • Troubleshooting NAC Server • Reporting © 2012 GTRI
  • BYOD Deployment Schenarios © 2012 GTRI
  • ISE Node Types © 2012 GTRI
  • ISE Platforms © 2012 GTRI
  • Gradual DeploymentMonitor Mode Low Impact High Security• Authentication Mode Mode Without Access • Minimal Impact • Logical Isolation Control to Network and of User Groups / Users Device Types © 2012 GTRI
  • What Device? © 2012 GTRI
  • ISE Profiler: 3 Steps © 2012 GTRI
  • Guest Self Service © 2012 GTRI
  • Guest User Experience © 2012 GTRI
  • Certificate Location by DeviceDevice Certificate Storage Location Access MethodiPhone/iPad Standard certificate store Settings > General > ProfileAndroid Encrypted certificate store Invisible to end users. Note Certificates can be removed using Settings > Location & Security > Clear Storage.Windows Standard certificate store Launch mmc.exe from /cmd prompt, or view in certificate snap-in.Mac Standard certificate store Application > Utilities > Keychain Access © 2012 GTRI
  • What about Accounting? Provides additional information about the session Marks end of a session (Removes endpoint from licensing count) Provides IP address Profile IOS probe © 2012 GTRI
  • MDM vs BYOD/NAC MDM BYOD /NAC  Managing device WLAN/ Wired Managing Device on 3g/ 4g Access Manage Files  Role Based Access Control (RBAC) Manage APPS / Email  Concept of Device Stacking on Corp JailBreak Control  Identity Remote Wipe  Posture / Profile / Quarantine Device Encryption  Hoteling GEO Fencing  DLP – Lite on critical Files Device Recovery- LoJack  Authentication/Authorization/ Accounting -AAA © 2012 GTRI
  • Mobile Device Management David DeCesare SE – Denver Region © 2012 GTRI
  •  Placeholder for the ZenPrise Slides © 2012 GTRI
  • Questions? © 2012 GTRI
  • BYOD/MDM Workshop LuncheonThank You! July 26, 2012 ©2012 Global Technology Resources, Inc., All Rights Reserved. Contents herin contain confidential information not to be copied