On October 23rd, 2014, we updated our
By continuing to use LinkedIn’s SlideShare service, you agree to the revised terms, so please take a few minutes to review them.
Traditional Security-model is gone forever There is no perimeter anymore... Users are accessing data/app(lication)s From everywhere From all kinds of devices
There are no sure bets in the mobile device market King today, beggar tomorrow (e.g. RIM, Nokia) What will happen to Apple now Steve is dead ? Will Nokia rise from the grave by selling its soul to the devil ?
End-user rules... ICT/security has to follow not lead End-user decides which (cloud) apps/device he or she is going to use Wants to have that sexy device that fiits his personality...
BYOD Bring your own device Let users buy their own phone, tablet or laptop Make IT support it
Most secure devices 1. Blackberry 2. iOS 3. Symbian 4. Android 5. Windows Phone
Armsrace The security feature list is continuously evolving version by version. IOS5 and Android 4 look very promising Windows Phone is too early days Security should be in the device OS itself and not added by extra software
Mobile security = big business All antivirus vendors have a mobile solution Kaspersky (not for Ios), Gdata & Symantec (only android), etc. Lots of mobile device management platforms out there Mobile Iron, Zenprise, Good technologies, Kaspersky
Problems to fear / fix DATA LEAKAGE Encrypt / remote wipe Don't store confidential data on the device MALWARE Update your os Control the dev community / signing Walled gardens / sandboxes
Problems to fear / fix (2) STRONG AUTHENTICATION Password policies Better: certificates CONTROL Controll the apps/usage of your endusers BACKUPS
The ghost is out of the bottle, no way back Go for a crossplatform solution Control what you can control BYOD will happen so prepare for it
Conclusions First you need a good policy What level of security do you want/have to accomplish? Riskanalysis – is this possible ? Plan for the worse Then find the tools to do it First tool is common sense (be smart) Look at the management solutions