Mobile security... The next challenge

  • 389 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
389
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
6
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Purpose of presentation: 20 slides, 20 seconds, maximum presentation time of 6 minutes Objective: visionary and innovating introduction
  • Keywords: A) Virtual; Integrated; Enterprise; Federated; Combined; Contextual; Ad hoc; Distributed; Structured; Aggregated B) Information; Data; Knowledge; Wisdom; Query; Content; Schema; Resource; Model C) Integration; Infrastructure; Base; Broker; Systems; Management; Convergence; Architecture; Solution; Federation;
  • Connect keywords with focus Keywords for Mobility: Freedom, Future, Productivity Keywords for Security: Threats, Globalisation, Competition Keywords for Virtualisation: Environment, Cost control, Financial crisis Keywords for Digitisation: Future, Sustainability, Preservation; Competition

Transcript

  • 1.
      Mobile Device Security The next challenge Jan Guldentops ( [email_address] ) BA N.V. ( http://www.ba.be )
  • 2.
      About BA
      More information
  • 3.
      I nformation I ntegration
      i
  • 4.
      Our Commitment Ask our partners
  • 5.
      Our Commitment Ask our clients
      Public Sector/Government
      Non-profit
      Enterprise
      Association Vincotte Nuclear, Idewe, Handicap international, Jeugd en Stad Vzw)
      Hamburger Mannheimer, Didak Injection, Credimo, Nollekens (PGZ International), Altrad Havico, Paratel, Sodexo, Securex
      Vlaams Parlement, Leuven, Hasselt, Boom, Overpelt, Mortsel, Ranst, Lummen, Olen, St-Katelijne-Waver, Kasterlee, Oud-Turnhout, OCMW Kontich, PZ Noord, Balen, Schoten, Zwijndrecht, KBR
  • 6.
      Information Integration BA’s infrastructure for:
      Digitisation
      Security
      Mobility
      Virtualisation
      Data Storage and Warehousing
      Data Protection and Integrity
      Digital Preservation and Archiving
      Data Access and Portability
  • 7. Traditional Security-model is gone forever There is no perimeter anymore... Users are accessing data/app(lication)s From everywhere From all kinds of devices
  • 8. There are no sure bets in the mobile device market King today, beggar tomorrow (e.g. RIM, Nokia) What will happen to Apple now Steve is dead ? Will Nokia rise from the grave by selling its soul to the devil ?
  • 9. End-user rules... ICT/security has to follow not lead End-user decides which (cloud) apps/device he or she is going to use Wants to have that sexy device that fiits his personality...
  • 10. BYOD Bring your own device Let users buy their own phone, tablet or laptop Make IT support it
  • 11. Most secure devices 1. Blackberry 2. iOS 3. Symbian 4. Android 5. Windows Phone
  • 12. Armsrace The security feature list is continuously evolving version by version. IOS5 and Android 4 look very promising Windows Phone is too early days Security should be in the device OS itself and not added by extra software
  • 13. Mobile security = big business All antivirus vendors have a mobile solution Kaspersky (not for Ios), Gdata & Symantec (only android), etc. Lots of mobile device management platforms out there Mobile Iron, Zenprise, Good technologies, Kaspersky
  • 14. Problems to fear / fix DATA LEAKAGE Encrypt / remote wipe Don't store confidential data on the device MALWARE Update your os Control the dev community / signing Walled gardens / sandboxes
  • 15. Problems to fear / fix (2) STRONG AUTHENTICATION Password policies Better: certificates CONTROL Controll the apps/usage of your endusers BACKUPS
  • 16. Conclusions
      The ghost is out of the bottle, no way back Go for a crossplatform solution Control what you can control BYOD will happen so prepare for it
  • 17. Conclusions First you need a good policy What level of security do you want/have to accomplish? Riskanalysis – is this possible ? Plan for the worse Then find the tools to do it First tool is common sense (be smart) Look at the management solutions
  • 18.
      Thank You Contact us
      016/ 29.80.45
      016/ 29.80.46
      www.ba.be
      Vaartdijk 3/501 B-3018 Wijgmaal, Belgium
      [email_address]
      www.ba.be
      www.ba.be
    • Twitter: JanGuldentops