Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
 

Like this? Share it with your network

Share

Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

on

  • 814 views

Take a fresh approach to IT security and management, designed specifically for mobile ...

Take a fresh approach to IT security and management, designed specifically for mobile

Overview

Twenty years ago, laptops revolutionized how the enterprise conducted business. But with the laptop came a host of new security and manageability challenges that we are arguably still trying to work out. Now, mobile computing promises to be exponentially more disruptive.

It is a mistake to think you can apply yesterday’s laptop thinking to today’s mobile devices and still maintain a secure infrastructure. Mobile devices are radically different from laptops and they are evolving at a completely different pace, so they demand a fresh approach.

Statistics

Views

Total Views
814
Views on SlideShare
814
Embed Views
0

Actions

Likes
3
Downloads
34
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Forced processInward facing, like government
  • The new enterprise web is about integration
  • The long tail is bullshitBut there is still important diversity.
  • The new enterprise web is about integration
  • The new enterprise web is about integration
  • The new enterprise web is about integration
  • The new enterprise web is about integration
  • The new enterprise web is about integration

Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise Presentation Transcript

  • 1. Beyond MDM5 Things You Must Do To SecureMobile Devices in the EnterpriseK Scott Morrison, CTONovember, 2012
  • 2. Housekeeping Questions - Chat any questions you have and we’ll answer them at the end of this call Twitter facebook.com/layer7 - Today’s event hashtag: layer7.com/linkedin - #L7webinar layer7.com/blogs - Follow us on Twitter: - @layer7 - @KScottMorrison 2
  • 3. I already have mobility…
  • 4. Change Agent
  • 5. Interest in Mobile Security is Increasing
  • 6. Old Thinking,New Technology
  • 7. Who Owns Mobile?
  • 8. Implementation falls to IT
  • 9. What is the Classic SecuritySolution?
  • 10. What can you expect fromMobile Device Management (MDM)? • Device inventory • Locate device, track device • Network settings, wifi settings • Backup management • Manage synchronization with laptop • Manage access to cloud services (eg: iCloud synchronization) • Device encryption, device wipe, selective wipe, data fading • Password policies, password resets, remote lock • Jailbreak detection, root detection • User communication (notifications, email, SMS, etc) • App inventory, blacklist/whitelist for apps • Private app stores, integration with public app stores and corporate plans • App configuration provisioning • VPN configuration provisioning, email configuration mgmt. • Roaming policy management
  • 11. Is MDM enough? No. MDM is only half.
  • 12. New Thinking,New Technology
  • 13. It’s aboutthe app
  • 14. The Challenge is toGive Mobile AppsAccess to EnterpriseData Securely Firewall Internal Server Directory Enterprise Network
  • 15. The Real Owners areApp Developers
  • 16. New Challenges
  • 17. Identity is the Crux Issue A person? A Or an app? 15458617-7813-4a37-94ac-a8e6da6f6405
  • 18. The New Roles API Client API Server Developers External Internal Developers
  • 19. A Fundamental Shift is OccurringThe Old Enterprise The New Mobile Enterprise This is the secret to achieve scale and agile federation
  • 20. What About Datain Transit? Firewall Internal Server Directory Enterprise Network
  • 21. Or Data onthe Device? App layer Persistence layer Silos
  • 22. Strategies
  • 23. Mobile Access Gateway API Client Firewall API Proxy API Server Security Admin Enterprise Network
  • 24. API Developer Portal API Client Firewall iPhone API Developer Proxy API API Server Portal Enterprise Network
  • 25. Client Libraries  Do SSL right  Make OAuth easy  Manage sessions automatically Firewall API Proxy API Server Security Admin Enterprise Network
  • 26. The 5 Things You Must Do To SecureMobile Devices In The Enterprise1. Start with MDM, but layer application security services over it.2. Integrate mobile apps and enterprise data using APIs.3. SSL everywhere.4. Authenticate users, authorize apps.5. Avoid local storage.
  • 27. For further information: K. Scott Morrison Chief Technology Officer Layer 7 Technologies 1100 Melville St, Suite 405 Vancouver, B.C. V6E 4A6 Canada (800) 681-9377 scott@layer7.com http://www.layer7.comNovember 2012
  • 28. Picture Credits New Moon Seen Through a Telescope by mkrijgsman – stock.exchg Band silhouettes by mr_basmt– stock.exchg