AirTight Survey – April 2012                What’s Your Approach to BYOD - Love it/Hate it?The BYOD trend is causing new s...
BYOD Security Threats and Mitigation Strategies    The deluge of personal devices in the enterprise makes it critical to c...
Upcoming SlideShare
Loading in …5
×

BYOD (Bring your own device) comparison by Safetica Benelux

488 views

Published on

The BYOD trend is causing new security concerns for enterprise network and data security. Corporate users (e.g. employees, contractors) are accessing enterprise network and data, and bypassing corporate security controls using their personal Wi-Fi devices. This uncontrolled access can open wireless backdoors into the enterprise network, malicious activity, leakage of sensitive data, and exposure to malware.

A recent survey conducted by AirTight Networks among 316 IT and Security professionals revealed that while most thought that BYOD could increase productivity and lower costs, there is a high level of concern around the security challenges presented by smart devices accessing corporate networks and a real need to find solutions to address the challenges.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
488
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

BYOD (Bring your own device) comparison by Safetica Benelux

  1. 1. AirTight Survey – April 2012 What’s Your Approach to BYOD - Love it/Hate it?The BYOD trend is causing new security concerns for enterprise network and data security. Corporate users (e.g. employees,contractors) are accessing enterprise network and data, and bypassing corporate security controls using their personal Wi-Fidevices. This uncontrolled access can open wireless backdoors into the enterprise network, malicious activity, leakage of sensitivedata, and exposure to malware.A recent survey conducted by AirTight Networks among 316 IT and Security professionals revealed that while most thought thatBYOD could increase productivity and lower costs, there is a high level of concern around the security challenges presented bysmart devices accessing corporate networks and a real need to find solutions to address the challenges. How pervasive do you think is the How do you view the BYOD trend for use of personal smart devices in your your enterprise? enterprise? A threat to enterprise security Very pervasive An opportunity to reduce IT Somewhat pervasive costs and increase employee Only among younger workers productivity Not pervasive at all Both Are iPads, iPhones and Androids If your organization allows BYOD, do sanctioned technology in your you support the applications your environment? users are accessing? Yes Yes No No Only those directly related to our For some employees only business Only when issued by the company We do not allow employee owned devices Do you see an increasing trend of Are you concerned about employees employees bringing Rogue Wi-Fi using mobile hotspots to bypass APs? corporate policies? Yes Yes No No Not sure Not sure Are you concerned about the Has BYOD affected the measures you security of data transmitted over take for network security? personal smart devices? Yes Very Yes Very Yes Somewhat Yes Somewhat Not at all Not at all How do you enforce your security Are you planning to invest in one or policy for managing BYOD? more of these security solutions in Use wireless intrusion prevention the next 6-12 months? from an infrastructure vendor Use an overlay wireless intrusion Yes prevention system (WIPS) No, I don’t think it is necessary Use MDM I have already invested in BYOD Use NACS security management A combination of several above Hope for the best
  2. 2. BYOD Security Threats and Mitigation Strategies The deluge of personal devices in the enterprise makes it critical to choose the right combination of solutions for protecting your network and managing your devices. Malware As the BYOD tide rises, organizations will need to embrace various smartphones and tablets for the enterprise applications, while at the same time tackling the security challenges from consumerization. On one hand, it is necessary to ensure that the IT assigned authorized smart mobile devices are free of malware and that these devices and the data on them can be centrally managed and monitored by IT. On the other hand, IT will be required to deal with unmanaged personal mobile devices attempting to access the corporate IT assets, since such personal mobile devices may not be within IT’s device management reach. Remote Wiping Additionally, increased consumerization of the smart mobile devices may also heighten the risk of rogue Wi-Fi connections on the enterprise premises. As a result, an all-encompassing approach to BYOD security will entail protection of IT assigned devices, gatekeeping the unmanaged mobile devices, and blocking rogue Wi-Fi connections. Security systems are available today which address different parts of the BYOD security problem. The right combination of these security systems can be useful for a comprehensive BYOD security. Network Security ControlsUnmanaged Devices Intrusion Security Control Wi-Fi WIPS NAC Enterprise Requirement Infra. Wi-Fi Gatekeeping unmanaged mobile devices Detect and block rogue access points Block extrusions thru external Wi-Fi/personal hotspots Finer inline policy enforcement on trafficAuthorized Devices Extrusion Wi-Fi Infrastructure: APs and Controllers WIPS: Wireless Intrusion Prevention NAC: Network Access Control Device and Apps Security Controls Security Control Requirement MDM + OS Device management, anti-malware, remote wiping, application securityThe Global Leader in Wireless Security SolutionsAirTight Networks, Inc. 339 N. Bernardo Avenue #200, Mountain View, CA 94043T +1.877.424.7844 T 650.961.1111 F 650.961.1169 www.airtightnetworks.com

×