Beyond MDM5 Things You Must Do To SecureMobile Devices in the EnterpriseK Scott Morrison, CTONovember, 2012
Housekeeping Questions - Chat any questions you have and we’ll answer them at the end of this call Twitter              ...
I already have mobility…
Change Agent
Interest in Mobile Security is Increasing
Old Thinking,New Technology
Who Owns Mobile?
Implementation      falls to IT
What is the Classic SecuritySolution?
What can you expect fromMobile Device Management (MDM)?  • Device inventory  • Locate device, track device  • Network sett...
Is MDM enough?                 No. MDM is                  only half.
New Thinking,New Technology
It’s aboutthe app
The Challenge is toGive Mobile AppsAccess to EnterpriseData Securely                      Firewall      Internal       Ser...
The Real Owners areApp Developers
New Challenges
Identity is the Crux Issue                 A person?                                            A   Or an app?         154...
The New Roles    API Client                         API Server    Developers   External   Internal   Developers
A Fundamental Shift is OccurringThe Old Enterprise      The New Mobile Enterprise                                This is t...
What About Datain Transit?                     Firewall     Internal      Server                Directory                 ...
Or Data onthe Device?                      App layer                      Persistence                      layer          ...
Strategies
Mobile Access Gateway                                API                               Client              Firewall       ...
API Developer Portal                                     API                                    Client                   F...
Client Libraries   Do SSL right   Make OAuth easy   Manage sessions automatically                   Firewall           ...
The 5 Things You Must Do To SecureMobile Devices In The Enterprise1. Start with MDM, but layer application security servic...
For further information:                K. Scott Morrison                Chief Technology Officer                Layer 7 T...
Picture Credits   New Moon Seen Through a Telescope by mkrijgsman –    stock.exchg   Band silhouettes by mr_basmt– stock...
Upcoming SlideShare
Loading in...5
×

Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

526

Published on

Take a fresh approach to IT security and management, designed specifically for mobile

Overview

Twenty years ago, laptops revolutionized how the enterprise conducted business. But with the laptop came a host of new security and manageability challenges that we are arguably still trying to work out. Now, mobile computing promises to be exponentially more disruptive.

It is a mistake to think you can apply yesterday’s laptop thinking to today’s mobile devices and still maintain a secure infrastructure. Mobile devices are radically different from laptops and they are evolving at a completely different pace, so they demand a fresh approach.

Published in: Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
526
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
35
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide
  • Forced processInward facing, like government
  • The new enterprise web is about integration
  • The long tail is bullshitBut there is still important diversity.
  • The new enterprise web is about integration
  • The new enterprise web is about integration
  • The new enterprise web is about integration
  • The new enterprise web is about integration
  • The new enterprise web is about integration
  • Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

    1. 1. Beyond MDM5 Things You Must Do To SecureMobile Devices in the EnterpriseK Scott Morrison, CTONovember, 2012
    2. 2. Housekeeping Questions - Chat any questions you have and we’ll answer them at the end of this call Twitter facebook.com/layer7 - Today’s event hashtag: layer7.com/linkedin - #L7webinar layer7.com/blogs - Follow us on Twitter: - @layer7 - @KScottMorrison 2
    3. 3. I already have mobility…
    4. 4. Change Agent
    5. 5. Interest in Mobile Security is Increasing
    6. 6. Old Thinking,New Technology
    7. 7. Who Owns Mobile?
    8. 8. Implementation falls to IT
    9. 9. What is the Classic SecuritySolution?
    10. 10. What can you expect fromMobile Device Management (MDM)? • Device inventory • Locate device, track device • Network settings, wifi settings • Backup management • Manage synchronization with laptop • Manage access to cloud services (eg: iCloud synchronization) • Device encryption, device wipe, selective wipe, data fading • Password policies, password resets, remote lock • Jailbreak detection, root detection • User communication (notifications, email, SMS, etc) • App inventory, blacklist/whitelist for apps • Private app stores, integration with public app stores and corporate plans • App configuration provisioning • VPN configuration provisioning, email configuration mgmt. • Roaming policy management
    11. 11. Is MDM enough? No. MDM is only half.
    12. 12. New Thinking,New Technology
    13. 13. It’s aboutthe app
    14. 14. The Challenge is toGive Mobile AppsAccess to EnterpriseData Securely Firewall Internal Server Directory Enterprise Network
    15. 15. The Real Owners areApp Developers
    16. 16. New Challenges
    17. 17. Identity is the Crux Issue A person? A Or an app? 15458617-7813-4a37-94ac-a8e6da6f6405
    18. 18. The New Roles API Client API Server Developers External Internal Developers
    19. 19. A Fundamental Shift is OccurringThe Old Enterprise The New Mobile Enterprise This is the secret to achieve scale and agile federation
    20. 20. What About Datain Transit? Firewall Internal Server Directory Enterprise Network
    21. 21. Or Data onthe Device? App layer Persistence layer Silos
    22. 22. Strategies
    23. 23. Mobile Access Gateway API Client Firewall API Proxy API Server Security Admin Enterprise Network
    24. 24. API Developer Portal API Client Firewall iPhone API Developer Proxy API API Server Portal Enterprise Network
    25. 25. Client Libraries  Do SSL right  Make OAuth easy  Manage sessions automatically Firewall API Proxy API Server Security Admin Enterprise Network
    26. 26. The 5 Things You Must Do To SecureMobile Devices In The Enterprise1. Start with MDM, but layer application security services over it.2. Integrate mobile apps and enterprise data using APIs.3. SSL everywhere.4. Authenticate users, authorize apps.5. Avoid local storage.
    27. 27. For further information: K. Scott Morrison Chief Technology Officer Layer 7 Technologies 1100 Melville St, Suite 405 Vancouver, B.C. V6E 4A6 Canada (800) 681-9377 scott@layer7.com http://www.layer7.comNovember 2012
    28. 28. Picture Credits New Moon Seen Through a Telescope by mkrijgsman – stock.exchg Band silhouettes by mr_basmt– stock.exchg
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×