Security Best Practices for the Mobile Enterprise

  • 899 views
Uploaded on

As mobile device usage grows, IT must as well. This presentation provides security best practices and checklists to help you prepare your network.

As mobile device usage grows, IT must as well. This presentation provides security best practices and checklists to help you prepare your network.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
899
On Slideshare
0
From Embeds
0
Number of Embeds
2

Actions

Shares
Downloads
27
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. SECURITY BEST PRACTICES FOR THE MOBILE ENTERPRISE
  • 2. 2 Copyright © 2013 Juniper Networks, Inc. www.juniper.net SECURITY BEST PRACTICES FOR THE MOBILE ENTERPRISE As Connected Device Use Grows, IT Must:  Build manageable, scalable and secure ways to provide access to enterprise resources via employees’ mobile devices  Enforce a new set of policies for provisioning, managing and securing mobile apps, users and devices, regardless of location, device type and network entry point  Correlate users with devices to allow authorized and automated access to corporate networks, apps and data
  • 3. 3 Copyright © 2013 Juniper Networks, Inc. www.juniper.net SECURITY BEST PRACTICES FOR THE MOBILE ENTERPRISE IT Needs to:  Enable enterprise networks and apps for mobile devices from any location  Mitigate security liabilities by wiping sensitive enterprise data from an employee- owned device if users leak data or the smart device is lost or stolen  Segment device using virtualization techniques or with different profiles or personalities, to separate personal and enterprise data and apps Mobile Security Requires:  Corporate management and security tools to address multiple mobile operating systems  Multimodal access to enterprise apps, which are critical because the use of employee-owned smart devices is outpacing use of corporate smartphones in enterprise networks The next two checklists give you a practical approach to checking your IT policies, controls and mobile security requirements when you set mobile provisioning processes.
  • 4. 4 Copyright © 2013 Juniper Networks, Inc. www.juniper.net SECURITY BEST PRACTICES FOR THE MOBILE ENTERPRISE IT Policies and Controls Checklist For Mobile Device Provisioning: Policy / Control Owner Approach Resolved? Always-on/on-demand SSL VPN to protect data transferred between the device and corporate servers Device integrity checking to prevent compromised, infected or ill-secured devices onto the network Single Sign-On to reduce use of simple passwords to access cloud tools Anti-malware to protect against hacker threats should be integrated into on-device security Theft detection and data loss prevention are critical with sensitive data on devices Management and security policy standards to manage many devices regardless of OS, device, browser and network Granular policy for data or profile segmentation to separate personal and enterprise data and apps
  • 5. 5 Copyright © 2013 Juniper Networks, Inc. www.juniper.net SECURITY BEST PRACTICES FOR THE MOBILE ENTERPRISE Mobile Security Requirements Owner Approach Resolved? Policy creation and enforcement consistent with enterprise security Support for multiple OS, especially Android User authentication and authorization Network access control for identifying device type, checking device’s security posture and applying access controls Control usage/access based whether a device has been jailbroken or rooted Mobile VPN, integrated with identity- based authentication and device integrity checking Mobile app monitoring and control Ability to track or locate missing devices, wipe contents, or lock remotely to prevent unauthorized access Intrusion and malware prevention Data encryption and app access security Mobile Security Requirements Checklist :
  • 6. 6 Copyright © 2013 Juniper Networks, Inc. www.juniper.net SECURITY BEST PRACTICES FOR THE MOBILE ENTERPRISE To get more detailed insights and learn more about securing the mobile enterprise, read the whitepaper from IDC.