SlideShare a Scribd company logo
1 of 6
Download to read offline
February 2016 - 2
Introduction
Mobility and wireless communications are critical areas to an enterprise moving forward. As
enterprises become cloud, connected, and data oriented, they need to be conscience of the
rapidly changing threat landscape. Change is not limited to technology, but it also includes
business processes around business continuity/disaster recovery (BCP/DR), risk assessments,
network security, and data security.
We are seeing changes across a number of technology areas all at the same time. This puts
organizations in the situation of constantly shifting priorities.
Our intent is to guide organizations through the changes to a secure mobile enterprise by
outlining a framework for evaluating solutions.
Market Drivers
An extended enterprise is the shift in the access of corporate resources from anywhere and,
potentially, at any time. Mobility isn’t new to the enterprise; it’s just the mobile and wireless
technologies have transformed the business.
The revolution in enterprise mobility happened fast. It forced business leaders to react swiftly
to accommodate change. Three market drivers assisted in the rapid reaction.
Cloud computing
The change in computing infrastructure has allowed enterprises to adopt new technology at a
quicker pace. Now, an organization can take advantage of public, private, or hybrid clouds in
numerous ways to align IT with strategic goals.
Consumerization of enterprise mobility
With Apple iOS and Google android growing at rapid rates in the consumer market, it was only
a matter of time before employees began to require that same user experience at work. With
the explosion of mobile applications and endpoints connecting to an enterprise, employees
have essentially forced organizations to evaluate their IT infrastructure to accommodate
mobility. The irony is that, as cyber security threats continue to evolve, more emphasis on risk
management strategies are important.
February 2016 - 3
Big Data
With the growth in data being processed and analyzed, we are at a point where decisions are
more data-driven than ever. Being able to manage the volume, search, and analyze are key to
businesses maintaining competitive advantages.
Challenges
The change in enterprise mobility has led a lot of organizations going down the path of looking
for quick fixes. Applying a quick fix to a complex problem leads to issues later. The previous
approach to mobility management no longer works in a world of bring your own device (BYOD),
corporately owned, personally enabled (COPE) and choose your own device (CYOD). We are
now in a device and platform agnostic environment that requires security end to end.
Businesses need to think about more than just the device, which has exposed other areas
within their IT environment.
1) Enterprise Mobility Management (EMM)
Initially, the thought was enterprise mobility is primarily about device management. If
we can control the device, we are secure. That’s where businesses quickly turned to
enterprise mobility management (EMM) providers to solve the problem for device
control functions and over-the-air (OTA) configurations. Mobile management now has
grown to more than securing the device. While EMM started as device management, it
now includes mobile application management, email management, and information
management. To get complete security that is needed for mobility, most EMMs leverage
a partner ecosystem. This leaves businesses evaluating a broad set of technology
options where requirements are a moving target.
2) IT Infrastructure
Think about your internal and external operating environment. The infrastructure needs
of the business are unique, and there are plenty of options.
From a computing standpoint, the number of servers and applications being used by a
business is growing. The cloud has made asset management a unique task due to the
potential location of corporate resources being in several operating environments.
From a network standpoint, mobility can leverage either wired or wireless network
access. However, the majority of the new endpoints (i.e. smartphones and tablets) that
are attaching to the network, leveraging wireless technology. However, the network
consists of more than wireless components; it also includes firewalls, switches,
February 2016 - 4
controllers, routers, intrusion detection/prevention systems (IDS/IPS), and so on.
Securing the network is typically a large task in itself, but now it includes a variety of
operating systems that need access.
Applications are a mixture of web and mobile. The issue is backend requirements for the
applications are different. Depending on your business applications (internal, pubic, or
purchased) your software development and deployment strategy might experience
changes.
3) Risk management
Enterprise mobility risk management can be categorized into three areas: understanding
threat attack vector, assess based data, and continuous monitoring. To secure your
enterprise allocating resources to security management is essential. There isn’t a simple
answer to this, as each organization and industry is different.
 Threats – a complex environment that includes advance persistent threat (APT) attacks, zero
day attacks, various mobile platforms, etc.
 Data – data breaches are happening frequently. Data management strategies include
understanding data at rest, data in transit, DLP, etc.
 Continuous monitoring – threats changes, strategies change and processes need to be re-
evaluated
Threats
Data
Continous
Monitoring
February 2016 - 5
4) Lifecycle Management
Enterprise infrastructure, devices, applications, and security risks all have different
lifecycles. The approach to managing and supporting each one is different. Dealing with
the lifecycle individually, will lead to problems that can harm your business.
Securing the mobile enterprise
Knowing the potential challenges, an integrated end to end solution is needed. This is defined
as a bi-directional experience from users all the way to the data source. To begin securing your
enterprise think about what your mobile IT operating environment looks like. Documenting this
operation allows a business to understand users, devices, applications, and data within their
organization.
Now, we have the data to start identifying technical solutions solve your problems. Frame your
requirements around these 10 areas.
1. Security – The threat landscape for mobility consists of insider and external threats. A
solution needs to map the security policy that has been developed based on a risk
assessment. Ensure the solutions provide monitoring and management capabilities to
handle both inside and outside threats.
2. Data – Not all data is the same. Classify your data to ensure that a solution provides the
data security you need to secure your enterprise.
3. Network/Wireless – assume data, video, and voice applications will be used. In general,
a lot of smartphone or tablet traffic will be over the cellular network, but if it’s over your
WLAN, ensure your network is mobile ready.
4. Scalability – the ideal situation is that, as you grow, there are no issues related to the
operating environment. Ensure that a solution can grow as your organizational needs
develop.
5. Partnerships – right now, the majority of solution providers for mobility and wireless
have technology partnerships. Knowing this saves time in building a secure integrated
solution.
6. Architecture/Design – security is different for cloud vs on premise solutions. Understand
your options to ensure you are comfortable with the various risks.
7. Mobile device platforms – three platforms currently dominate the market: android, iOS,
and windows. Determine what your needs are and then correlate that with the
applications, enterprise security requirements, and EMM device support.
8. Support – This is something that is usually discussed after the implementation,
understand the support processes, model, etc. Then select one that suits your needs.
About us
Infrastructure Solutions International is a mobility and wireless solutions provider. With technical staff experienced in cloud,
networking, mobility, security, and wireless we have the expertise to solve your problems.
Infrastructure Solutions International
www.infra-si.com
info@infra-si.com
9. Users – not all users are the same in respect to data access. Ensure access controls and
identity management capabilities are available. Two-factor authentication would be
ideal but evaluate it carefully so it doesn’t impact user’s productivity.
10. Management –Ensure your staff has the skills to manage the systems and stays abreast
of the latest security threats.
Solution
Breaking down your mobile IT environment now puts you a unique place to adapt to enterprise
mobility and wireless. Solving the problem end to end allows you to classify the operating
environment around three activities: Assessment, Implementation, and Management. You can
jump around to each area, but a holistic approach is being used to secure your business.
The value in this approach is that, as a business, you have control of this moving target, but it
also enables you to benefit from a controlled vendor selection process, risk management
process for a large threat environment, data intelligence, scalable processes, and
governance/compliance strategy.
Conclusion
As we mentioned at the beginning, adapting is important in this new era of enterprise mobility.
Now, it’s time to reflect on where you are as an organization. There will be a mobile component
that is associated with your business. There will be new systems, migration of legacy systems,
and more. However, organizations need to get proactive in securing it, to prepare for the next
phase of enterprise transformation. The internet of things (IOT)/industrial internet of things
(IIoT) efficiencies that will be realized will also include mobility. Securing the mobile-oriented
enterprise now with this framework allows you to explore future opportunities in a structured
manner.

More Related Content

What's hot

The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for SuccessCitrix
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperShetal Patel
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017Merry D'souza
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...eSAT Publishing House
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityDImension Data
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...adeel hamid
 

What's hot (20)

The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices Whitepaper
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 

Viewers also liked

Framing the conversation: incident response and enterprise mobility
Framing the conversation: incident response and enterprise mobilityFraming the conversation: incident response and enterprise mobility
Framing the conversation: incident response and enterprise mobilityinfra-si
 
The 3 min Pitch - The Super Times
The 3 min Pitch - The Super TimesThe 3 min Pitch - The Super Times
The 3 min Pitch - The Super Timesabdels
 
DGR Training Certificate
DGR Training CertificateDGR Training Certificate
DGR Training CertificateMargus Mahla
 
Quinn Weber Resume 2016
Quinn Weber Resume 2016Quinn Weber Resume 2016
Quinn Weber Resume 2016Quinn Weber
 
John 4 commentary
John 4 commentaryJohn 4 commentary
John 4 commentaryGLENN PEASE
 
Genesis 32 commentary
Genesis 32 commentaryGenesis 32 commentary
Genesis 32 commentaryGLENN PEASE
 
Polymorphic Phase of RDX Report
Polymorphic Phase of RDX ReportPolymorphic Phase of RDX Report
Polymorphic Phase of RDX ReportBrittney Argirakis
 
Emergency response to_terrorism
Emergency response to_terrorismEmergency response to_terrorism
Emergency response to_terrorismzaffar abbasi
 
Disaster management
Disaster management Disaster management
Disaster management madhursejwal
 
FASTID project - FAST and efficient international disaster victim IDentification
FASTID project - FAST and efficient international disaster victim IDentificationFASTID project - FAST and efficient international disaster victim IDentification
FASTID project - FAST and efficient international disaster victim IDentificationGlobal Risk Forum GRFDavos
 

Viewers also liked (17)

Framing the conversation: incident response and enterprise mobility
Framing the conversation: incident response and enterprise mobilityFraming the conversation: incident response and enterprise mobility
Framing the conversation: incident response and enterprise mobility
 
Lectures-JCG
Lectures-JCGLectures-JCG
Lectures-JCG
 
The 3 min Pitch - The Super Times
The 3 min Pitch - The Super TimesThe 3 min Pitch - The Super Times
The 3 min Pitch - The Super Times
 
Food4 thought
Food4 thoughtFood4 thought
Food4 thought
 
Samarpita misra resume
Samarpita misra resumeSamarpita misra resume
Samarpita misra resume
 
DGR Training Certificate
DGR Training CertificateDGR Training Certificate
DGR Training Certificate
 
45 leadership quips 001
45 leadership quips 00145 leadership quips 001
45 leadership quips 001
 
ravindra singh
ravindra singhravindra singh
ravindra singh
 
Agah
AgahAgah
Agah
 
Quinn Weber Resume 2016
Quinn Weber Resume 2016Quinn Weber Resume 2016
Quinn Weber Resume 2016
 
John 4 commentary
John 4 commentaryJohn 4 commentary
John 4 commentary
 
Genesis 32 commentary
Genesis 32 commentaryGenesis 32 commentary
Genesis 32 commentary
 
Polymorphic Phase of RDX Report
Polymorphic Phase of RDX ReportPolymorphic Phase of RDX Report
Polymorphic Phase of RDX Report
 
Emergency response to_terrorism
Emergency response to_terrorismEmergency response to_terrorism
Emergency response to_terrorism
 
19.07.2013, NEWSWIRE, Issues 282 283
19.07.2013, NEWSWIRE, Issues 282 28319.07.2013, NEWSWIRE, Issues 282 283
19.07.2013, NEWSWIRE, Issues 282 283
 
Disaster management
Disaster management Disaster management
Disaster management
 
FASTID project - FAST and efficient international disaster victim IDentification
FASTID project - FAST and efficient international disaster victim IDentificationFASTID project - FAST and efficient international disaster victim IDentification
FASTID project - FAST and efficient international disaster victim IDentification
 

Similar to Securing a mobile oriented enterprise

Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeterinfra-si
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Enterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comEnterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comPhD Assistance
 
Enterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comEnterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comPhD Assistance
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...bupbechanhgmail
 
Actionable insights
Actionable insightsActionable insights
Actionable insightsTim Youm
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsIBM Software India
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud servicesComarch_Services
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfEnterprise Insider
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itAvancercorp
 
Read the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docxRead the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docxmakdul
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docxcurwenmichaela
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 

Similar to Securing a mobile oriented enterprise (20)

Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeter
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Enterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comEnterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.com
 
Enterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comEnterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.com
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
 
Actionable insights
Actionable insightsActionable insights
Actionable insights
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid it
 
Read the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docxRead the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docx
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Securing a mobile oriented enterprise

  • 1.
  • 2. February 2016 - 2 Introduction Mobility and wireless communications are critical areas to an enterprise moving forward. As enterprises become cloud, connected, and data oriented, they need to be conscience of the rapidly changing threat landscape. Change is not limited to technology, but it also includes business processes around business continuity/disaster recovery (BCP/DR), risk assessments, network security, and data security. We are seeing changes across a number of technology areas all at the same time. This puts organizations in the situation of constantly shifting priorities. Our intent is to guide organizations through the changes to a secure mobile enterprise by outlining a framework for evaluating solutions. Market Drivers An extended enterprise is the shift in the access of corporate resources from anywhere and, potentially, at any time. Mobility isn’t new to the enterprise; it’s just the mobile and wireless technologies have transformed the business. The revolution in enterprise mobility happened fast. It forced business leaders to react swiftly to accommodate change. Three market drivers assisted in the rapid reaction. Cloud computing The change in computing infrastructure has allowed enterprises to adopt new technology at a quicker pace. Now, an organization can take advantage of public, private, or hybrid clouds in numerous ways to align IT with strategic goals. Consumerization of enterprise mobility With Apple iOS and Google android growing at rapid rates in the consumer market, it was only a matter of time before employees began to require that same user experience at work. With the explosion of mobile applications and endpoints connecting to an enterprise, employees have essentially forced organizations to evaluate their IT infrastructure to accommodate mobility. The irony is that, as cyber security threats continue to evolve, more emphasis on risk management strategies are important.
  • 3. February 2016 - 3 Big Data With the growth in data being processed and analyzed, we are at a point where decisions are more data-driven than ever. Being able to manage the volume, search, and analyze are key to businesses maintaining competitive advantages. Challenges The change in enterprise mobility has led a lot of organizations going down the path of looking for quick fixes. Applying a quick fix to a complex problem leads to issues later. The previous approach to mobility management no longer works in a world of bring your own device (BYOD), corporately owned, personally enabled (COPE) and choose your own device (CYOD). We are now in a device and platform agnostic environment that requires security end to end. Businesses need to think about more than just the device, which has exposed other areas within their IT environment. 1) Enterprise Mobility Management (EMM) Initially, the thought was enterprise mobility is primarily about device management. If we can control the device, we are secure. That’s where businesses quickly turned to enterprise mobility management (EMM) providers to solve the problem for device control functions and over-the-air (OTA) configurations. Mobile management now has grown to more than securing the device. While EMM started as device management, it now includes mobile application management, email management, and information management. To get complete security that is needed for mobility, most EMMs leverage a partner ecosystem. This leaves businesses evaluating a broad set of technology options where requirements are a moving target. 2) IT Infrastructure Think about your internal and external operating environment. The infrastructure needs of the business are unique, and there are plenty of options. From a computing standpoint, the number of servers and applications being used by a business is growing. The cloud has made asset management a unique task due to the potential location of corporate resources being in several operating environments. From a network standpoint, mobility can leverage either wired or wireless network access. However, the majority of the new endpoints (i.e. smartphones and tablets) that are attaching to the network, leveraging wireless technology. However, the network consists of more than wireless components; it also includes firewalls, switches,
  • 4. February 2016 - 4 controllers, routers, intrusion detection/prevention systems (IDS/IPS), and so on. Securing the network is typically a large task in itself, but now it includes a variety of operating systems that need access. Applications are a mixture of web and mobile. The issue is backend requirements for the applications are different. Depending on your business applications (internal, pubic, or purchased) your software development and deployment strategy might experience changes. 3) Risk management Enterprise mobility risk management can be categorized into three areas: understanding threat attack vector, assess based data, and continuous monitoring. To secure your enterprise allocating resources to security management is essential. There isn’t a simple answer to this, as each organization and industry is different.  Threats – a complex environment that includes advance persistent threat (APT) attacks, zero day attacks, various mobile platforms, etc.  Data – data breaches are happening frequently. Data management strategies include understanding data at rest, data in transit, DLP, etc.  Continuous monitoring – threats changes, strategies change and processes need to be re- evaluated Threats Data Continous Monitoring
  • 5. February 2016 - 5 4) Lifecycle Management Enterprise infrastructure, devices, applications, and security risks all have different lifecycles. The approach to managing and supporting each one is different. Dealing with the lifecycle individually, will lead to problems that can harm your business. Securing the mobile enterprise Knowing the potential challenges, an integrated end to end solution is needed. This is defined as a bi-directional experience from users all the way to the data source. To begin securing your enterprise think about what your mobile IT operating environment looks like. Documenting this operation allows a business to understand users, devices, applications, and data within their organization. Now, we have the data to start identifying technical solutions solve your problems. Frame your requirements around these 10 areas. 1. Security – The threat landscape for mobility consists of insider and external threats. A solution needs to map the security policy that has been developed based on a risk assessment. Ensure the solutions provide monitoring and management capabilities to handle both inside and outside threats. 2. Data – Not all data is the same. Classify your data to ensure that a solution provides the data security you need to secure your enterprise. 3. Network/Wireless – assume data, video, and voice applications will be used. In general, a lot of smartphone or tablet traffic will be over the cellular network, but if it’s over your WLAN, ensure your network is mobile ready. 4. Scalability – the ideal situation is that, as you grow, there are no issues related to the operating environment. Ensure that a solution can grow as your organizational needs develop. 5. Partnerships – right now, the majority of solution providers for mobility and wireless have technology partnerships. Knowing this saves time in building a secure integrated solution. 6. Architecture/Design – security is different for cloud vs on premise solutions. Understand your options to ensure you are comfortable with the various risks. 7. Mobile device platforms – three platforms currently dominate the market: android, iOS, and windows. Determine what your needs are and then correlate that with the applications, enterprise security requirements, and EMM device support. 8. Support – This is something that is usually discussed after the implementation, understand the support processes, model, etc. Then select one that suits your needs.
  • 6. About us Infrastructure Solutions International is a mobility and wireless solutions provider. With technical staff experienced in cloud, networking, mobility, security, and wireless we have the expertise to solve your problems. Infrastructure Solutions International www.infra-si.com info@infra-si.com 9. Users – not all users are the same in respect to data access. Ensure access controls and identity management capabilities are available. Two-factor authentication would be ideal but evaluate it carefully so it doesn’t impact user’s productivity. 10. Management –Ensure your staff has the skills to manage the systems and stays abreast of the latest security threats. Solution Breaking down your mobile IT environment now puts you a unique place to adapt to enterprise mobility and wireless. Solving the problem end to end allows you to classify the operating environment around three activities: Assessment, Implementation, and Management. You can jump around to each area, but a holistic approach is being used to secure your business. The value in this approach is that, as a business, you have control of this moving target, but it also enables you to benefit from a controlled vendor selection process, risk management process for a large threat environment, data intelligence, scalable processes, and governance/compliance strategy. Conclusion As we mentioned at the beginning, adapting is important in this new era of enterprise mobility. Now, it’s time to reflect on where you are as an organization. There will be a mobile component that is associated with your business. There will be new systems, migration of legacy systems, and more. However, organizations need to get proactive in securing it, to prepare for the next phase of enterprise transformation. The internet of things (IOT)/industrial internet of things (IIoT) efficiencies that will be realized will also include mobility. Securing the mobile-oriented enterprise now with this framework allows you to explore future opportunities in a structured manner.