Mobile security... The next challenge


Published on

1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Purpose of presentation: 20 slides, 20 seconds, maximum presentation time of 6 minutes Objective: visionary and innovating introduction
  • Keywords: A) Virtual; Integrated; Enterprise; Federated; Combined; Contextual; Ad hoc; Distributed; Structured; Aggregated B) Information; Data; Knowledge; Wisdom; Query; Content; Schema; Resource; Model C) Integration; Infrastructure; Base; Broker; Systems; Management; Convergence; Architecture; Solution; Federation;
  • Connect keywords with focus Keywords for Mobility: Freedom, Future, Productivity Keywords for Security: Threats, Globalisation, Competition Keywords for Virtualisation: Environment, Cost control, Financial crisis Keywords for Digitisation: Future, Sustainability, Preservation; Competition
  • Mobile security... The next challenge

    1. 1. <ul>Mobile Device Security The next challenge Jan Guldentops ( [email_address] ) BA N.V. ( ) </ul>
    2. 2. <ul>About BA </ul><ul>More information </ul>
    3. 3. <ul>I nformation I ntegration </ul><ul>i </ul>
    4. 4. <ul>Our Commitment Ask our partners </ul>
    5. 5. <ul>Our Commitment Ask our clients </ul><ul>Public Sector/Government </ul><ul>Non-profit </ul><ul>Enterprise </ul><ul>Association Vincotte Nuclear, Idewe, Handicap international, Jeugd en Stad Vzw) </ul><ul>Hamburger Mannheimer, Didak Injection, Credimo, Nollekens (PGZ International), Altrad Havico, Paratel, Sodexo, Securex </ul><ul>Vlaams Parlement, Leuven, Hasselt, Boom, Overpelt, Mortsel, Ranst, Lummen, Olen, St-Katelijne-Waver, Kasterlee, Oud-Turnhout, OCMW Kontich, PZ Noord, Balen, Schoten, Zwijndrecht, KBR </ul>
    6. 6. <ul>Information Integration BA’s infrastructure for: </ul><ul>Digitisation </ul><ul>Security </ul><ul>Mobility </ul><ul>Virtualisation </ul><ul>Data Storage and Warehousing </ul><ul>Data Protection and Integrity </ul><ul>Digital Preservation and Archiving </ul><ul>Data Access and Portability </ul>
    7. 7. Traditional Security-model is gone forever There is no perimeter anymore... Users are accessing data/app(lication)s From everywhere From all kinds of devices
    8. 8. There are no sure bets in the mobile device market King today, beggar tomorrow (e.g. RIM, Nokia) What will happen to Apple now Steve is dead ? Will Nokia rise from the grave by selling its soul to the devil ?
    9. 9. End-user rules... ICT/security has to follow not lead End-user decides which (cloud) apps/device he or she is going to use Wants to have that sexy device that fiits his personality...
    10. 10. BYOD Bring your own device Let users buy their own phone, tablet or laptop Make IT support it
    11. 11. Most secure devices 1. Blackberry 2. iOS 3. Symbian 4. Android 5. Windows Phone
    12. 12. Armsrace The security feature list is continuously evolving version by version. IOS5 and Android 4 look very promising Windows Phone is too early days Security should be in the device OS itself and not added by extra software
    13. 13. Mobile security = big business All antivirus vendors have a mobile solution Kaspersky (not for Ios), Gdata & Symantec (only android), etc. Lots of mobile device management platforms out there Mobile Iron, Zenprise, Good technologies, Kaspersky
    14. 14. Problems to fear / fix DATA LEAKAGE Encrypt / remote wipe Don't store confidential data on the device MALWARE Update your os Control the dev community / signing Walled gardens / sandboxes
    15. 15. Problems to fear / fix (2) STRONG AUTHENTICATION Password policies Better: certificates CONTROL Controll the apps/usage of your endusers BACKUPS
    16. 16. Conclusions <ul>The ghost is out of the bottle, no way back Go for a crossplatform solution Control what you can control BYOD will happen so prepare for it </ul>
    17. 17. Conclusions First you need a good policy What level of security do you want/have to accomplish? Riskanalysis – is this possible ? Plan for the worse Then find the tools to do it First tool is common sense (be smart) Look at the management solutions
    18. 18. <ul>Thank You Contact us </ul><ul>016/ 29.80.45 </ul><ul>016/ 29.80.46 </ul><ul> </ul><ul>Vaartdijk 3/501 B-3018 Wijgmaal, Belgium </ul><ul>[email_address] </ul><ul> </ul><ul> </ul><ul><li>Twitter: JanGuldentops </li></ul>