How BYOD will shape wireless network security in 2012? Dr. Hemant Chaskar Vice President of Technology AirTight Networks ©...
BYOD! BYOD!
Security? Security?
Why is security a concern with BYOD? Unauthorized smart phones connecting to enterprise network Mobile Wi-Fi hotspots bypa...
<ul><ul><li>Enterprise Wi-Fi:  Not a barrier for employee smartphones </li></ul></ul><ul><li>Two-steps to connect your sma...
<ul><ul><li>Intrusion threats from personal smartphones Let us start with malware! </li></ul></ul>Android malware grew 472...
<ul><ul><li>Intrusion threats from personal smartphones </li></ul></ul>Android malware grew 472% in 2H2011 – says PCMag Ev...
Limitations of common security practices  <ul><li>MAC ACL </li></ul><ul><ul><li>Lot of initial work, tedious to manage </l...
Wireless Intrusion Prevention Systems (WIPS) Eavesdropping Unauthorized Access WPA2 Firewall, Wired IPS Wi-Phishing Honeyp...
WIPS architecture Building A Building B Sensor Sensor Server
With this in place, your network is protected from all types of wireless threats, vulnerabilities and attack tools! Extern...
Smartphone monitoring with WIPS
Authorized  APs Authorized Clients Users Smartphone policy enforcement with WIPS User Authentication  + Machine Identifica...
Smart device identification Device type Approved/unapproved  status Device/user name MAC address
Drill down on device details
Accurate location tracking
Block policy for unapproved smart devices
Extrusion threats from personal smartphones Detect and block authorized clients from connecting to personal mobile hotspot...
Key takeaways <ul><li>BYOD revolution creates new security risks due to use of  personal smart devices on enterprise premi...
Upcoming SlideShare
Loading in …5
×

How BYOD Will Shape Wireless Network Security in 2012

1,258 views

Published on

Presents enterprise network security implications of BYOD (Bring Your Own Device) revolution.

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,258
On SlideShare
0
From Embeds
0
Number of Embeds
13
Actions
Shares
0
Downloads
54
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Take high resolution picture of this Samsung phone in Pune office. Take another picture of iPhone screen in Pune office.
  • How BYOD Will Shape Wireless Network Security in 2012

    1. 1. How BYOD will shape wireless network security in 2012? Dr. Hemant Chaskar Vice President of Technology AirTight Networks © 2011 AirTight Networks. All Rights Reserved.
    2. 2. BYOD! BYOD!
    3. 3. Security? Security?
    4. 4. Why is security a concern with BYOD? Unauthorized smart phones connecting to enterprise network Mobile Wi-Fi hotspots bypassing perimeter security 3G Intrusion threats Extrusion threats Rater, Intr A sion – pun intended!
    5. 5. <ul><ul><li>Enterprise Wi-Fi: Not a barrier for employee smartphones </li></ul></ul><ul><li>Two-steps to connect your smartphone to WPA2, 802.1x Wi-Fi? </li></ul><ul><li>Look up username and password in Wi-Fi utility on laptop. </li></ul><ul><li>Enter those in your personal smartphone. </li></ul>
    6. 6. <ul><ul><li>Intrusion threats from personal smartphones Let us start with malware! </li></ul></ul>Android malware grew 472% in 2H2011 – says PCMag
    7. 7. <ul><ul><li>Intrusion threats from personal smartphones </li></ul></ul>Android malware grew 472% in 2H2011 – says PCMag Even iOS is not safe once “Jailbroken” Your sensitive corporate data could finally end up here! Personal apps reduce productivity, increase risk of data leakage
    8. 8. Limitations of common security practices <ul><li>MAC ACL </li></ul><ul><ul><li>Lot of initial work, tedious to manage </li></ul></ul><ul><li>Mobile Device Management (MDM) </li></ul><ul><ul><li>Required for IT assigned smartphone devices </li></ul></ul><ul><ul><li>But, no visibility into or control over personal devices </li></ul></ul>IT Assigned Smartphones Personal Smartphones
    9. 9. Wireless Intrusion Prevention Systems (WIPS) Eavesdropping Unauthorized Access WPA2 Firewall, Wired IPS Wi-Phishing Honeypots External APs Cracking External Users Rogue AP Misconfigured AP Ad hoc Connections Wireless DoS WIPS
    10. 10. WIPS architecture Building A Building B Sensor Sensor Server
    11. 11. With this in place, your network is protected from all types of wireless threats, vulnerabilities and attack tools! External APs Rogue APs (On Network) Authorized APs AP Classification STOP Client Classification Policy Mis-config GO STOP IGNORE DoS External Clients Authorized Clients Rogue Clients AUTOMATICALLY DETECT AND BLOCK RED PATHS! WIPS policy enforcement
    12. 12. Smartphone monitoring with WIPS
    13. 13. Authorized APs Authorized Clients Users Smartphone policy enforcement with WIPS User Authentication + Machine Identification Flag/block unapproved devices! GO STOP External APs Mobile Hotspots STOP
    14. 14. Smart device identification Device type Approved/unapproved status Device/user name MAC address
    15. 15. Drill down on device details
    16. 16. Accurate location tracking
    17. 17. Block policy for unapproved smart devices
    18. 18. Extrusion threats from personal smartphones Detect and block authorized clients from connecting to personal mobile hotspots (iPhone MyWi, Android Mobile AP, etc.) Mobile Honeypot Authorized Client 3G Blocked by WIPS Allowed by WIPS Authorized AP Internet
    19. 19. Key takeaways <ul><li>BYOD revolution creates new security risks due to use of personal smart devices on enterprise premises </li></ul><ul><li>WIPS uses combination of device fingerprinting and policy framework to automatically detect and flag/block unapproved personal smart devices in the network </li></ul><ul><li>WIPS continues to provide comprehensive protection from traditional Wi-Fi security threats such as Rogue APs, Wi-Phishing, ad hoc networks, DoS attacks, device mis-configurations, etc. </li></ul>

    ×