SlideShare a Scribd company logo
Securing and Monitoring BYOD Networks
             using NetFlow
  How NetFlow can help with Security Analysis,
  Application Detection and Traffic Monitoring

Don Thomas Jacob
Technical Marketing Engineer
ManageEngine NetFlow Analyzer
About ManageEngine


                  Servers &                                    Windows        Event Log &
 Network                         Desktop     ServiceDesk                                       Security
                 Applications                                Infrastructure   Compliance




  Network          Server        Desktop                         Active         Windows       Vulnerability
                                               Helpdesk
 Monitoring       Monitoring    Management                      Directory      Event Logs       Analysis




                  Application
  NetFlow                          Asset      ITIL Service                      Syslog           Patch
                     Perf                                      SQL Server
  Analysis                      Management        Desk                        Management      Management
                  Monitoring




                                               Software
   Network         End User       Remote                        Exchange       Firewall Log    Password
                                                License
 Config Mgmt      Experience      Control                        Server          Analyzer     Management
                                               Tracking




              ManageEngine is an IT management vendor focused on bringing a
                complete IT management portfolio to all types of enterprises
Today’s Agenda

     • What is BYOD

     • Audience Poll

     • Reasons for Concern

     • Limitations of BYOD Solutions

     • What is NetFlow

     • Why NetFlow for BYOD Networks

     • Questions
What is BYOD
         Define: BYOD (Bring Your Own Device)




            “ The practice of allowing employees to bring
    their own computing devices like smartphones,
    laptops or PDA to the workplace for use and
    connectivity on the corporate network. “
What is BYOD
          Define: BYOD (Bring Your Own Device)
           “ The practice of allowing employees to bring their own computing
   devices like smartphones, laptops or PDA to the workplace for use and
   connectivity on the corporate network. “
 • Cost Savings
     Device/Hardware cost transferred to employee
 • Free up your IT Team
     Ownership on the employee – Devices handled better
     Reduce the time spend by IT team on end-user device support and
      troubleshooting
 • Employee Satisfaction
     Flexibility to work when & where as needed, on ones own chosen
      device
 • Increased Productivity
     Telecommuting and flexible working hours increase productivity
What is BYOD
                                         BYOD Reach


  An Aberdeen study in July 2011 found 75% organizations are permitting
  BYOD for business purposes

  Gartner study says that by 2014, 90 percent of organizations will
  support corporate applications on personal devices
   http://www.gartner.com/it/page.jsp?id=1480514


  Cisco is adopting a "Any Service, Any Device, Anywhere" architecture
  which will evolve to a "Virtual Enterprise" – An enterprise which is
  location and service independent
  http://www.cisco.com/web/about/ciscoitatwork/downloads/ciscoitatwork/pdf/any_device_white_paper.pdf
POLL
What is your organization’s decision regarding
           BYOD implementation?
    BYOD allowed for all device types including laptops

    BYOD permitted only for smartphones/tablets

    Planning to implement

    Currently not considering
BYOD: Reasons for Concern
Reasons for Concern
                        Reasons for Concern
   Nascent Mobile Device Management (MDM)
        No established MDM policies and monitoring solutions
        No multi-platform or IPv6 support, may not be user friendly, etc.

   Different devices, Different Operating Systems
        Patch management and Compliance issues

   Lack of Visibility
        Where is the device in the network?                                 ?
        What is it accessing?

   Applications - Unverified and Untrusted
        Security issues, Malwares and Bandwidth Issues

   Vanishing Network Perimeter
        Remote connections, Security concerns
Reasons for Concern
                      Personal Work @ Work
  • Tendency to use BYOD for personal purposes



  • Exponential growth in HD Video and social media

  • Live Streaming of highly popular NCAA men's college basketball
    tournament was made available on Android devices

  • Non-business related traffic volume increases


  BANDWIDTH Issues / Poor Business Application Performance
Reasons for Concern
                      Device Loss = Data Loss
Reasons for Concern
                      Device Loss = Data Loss
  • Biggest threat is when BYOD leaves the enterprise network

  • Business data / internal emails stored on device

  • Device loss leads to sensitive information being left in the open

  • Stolen device can be used to connect to your network remotely
    for data theft or attacks


                        Major SECURITY Issues
Reasons for Concern
           Unverified and Greedy Applications

  • Mobile device growth has lead to an application explosion

  • New and unverified applications downloaded and installed

  • Security threats and malwares risks comes along unverified apps

  • Greedy Apps: Un-optimized, bandwidth hogging applications

  • Bottlenecks due to traffic from junk applications


          SECURITY Issues & BANDWIDTH Bottlenecks
Reasons for Concern
                      Inviting Network Threats
  • BYOD users browse from unsecured Wi-Fi networks, visits
    untrusted sites or download from untrusted vendors

  • “Dancing pigs over Security” – Users can be careless and devices
    outside the network perimeter are easier to attack and infect

  • Huge increase in number of malwares targeting mobile software
    platforms like iOS and Android

  • Infected device carried into the network – Malware enters LAN


                 Network open to MALWARE
Reasons for Concern
                      Inviting Network Threats
  • BYOD users browse from unsecured Wi-Fi networks, visits
    untrusted sites or download from untrusted vendors

  • “Dancing pigs over Security” – Users can be careless and devices
    outside the network perimeter are easier to attack and infect

  • Huge increase in number of malwares targeting mobile software
    platforms like iOS and Android

  • Infected device carried into the network – Malware enters LAN


                 Network open to MALWARE
Limitations of BYOD Solutions
Limitations of BYOD Solutions
                   Limitations of BYOD Solutions
 More Control on BYOD Devices & Web Traffic
 Limitation: As good as having company issued device - BYOD advantage lost
 Vague and impractical solution - Genuine users will be effected

 Up-to-date Patch Management
 Limitation: No multi-platform MDM or patch management solution available for
 the highly diverse mobile ecosystem

 Anti-Virus Software on Mobile Devices
 Limitation: New age malware exploits zero-day vulnerabilities

 Multi Layered Security & Internal IDS
 Limitations: Traditional, layered security solutions (firewall, proxy, content filtering,
 etc.) will fall short against new age threats
 Expensive to implement IDS/IPS in access layer to stop internal malware
What is NetFlow
What is NetFlow
                       What is NetFlow

   Technology developed by Cisco - Designed as a switching path

   Is now the Primary IP Traffic accounting technology

   Information on the WHO, WHAT, WHEN and WHERE of IP traffic

   All major vendors now support flow export:
    NetFlow       - Cisco, Adtran, 3COM
    J-Flow        - Juniper
    IPFIX         - Nortel
    sFlow         - Alcatel, HP, Brocade, Enterasys, Dell
What is NetFlow

                  7 unique fields define a flow
                    Source Interface (ifindex)

                            Protocol

                       Source IP Address
                     Destination IP Address

                           Source Port

                        Destination Port

                               ToS
What is NetFlow

                     How NetFlow Works
   Traffic passes through routing/switching device interface

   Flow created (remember the 7 fields) and stored in NetFlow cache

   Flows grouped and exported in UDP packets to collector based on
    active and inactive flow timeout
                              NetFlow Cache

                                                        Flow Analyzer
What is NetFlow


 NetFlow enabled interface

                                                             Core Network
                                 Edge Router
         NetFlow Packets
  •   Approximately 1500 bytes
  •   Each contains 20-50 flow
      records


                                               UDP NetFlow




                                                             NetFlow Collector
What is NetFlow


                                                      Source Port
                Source IP Address
   Who ?                                            Destination Port           What ?
              Destination IP Address
                                                       Protocol



   When ?                                            Packet Count              Usage ?
              Flow Start and End time
                                                      Octet count



                                          ToS
               QoS ?                    TCP Flags                      QoS ?
                                        Protocol


                                                       NextHop
            Input and Output Interface
 Path ?                                         Source AS Information          Route ?
                     (ifindex)
                                              Destination AS Information
Why NetFlow for BYOD Networks
Why NetFlow for BYOD
                       In-Depth Tracking

  • NetFlow provides real-time information about network traffic

  • BYOD monitoring begins at the access layer - Closer to traffic
    source

  • Flow export supported on most enterprise devices including
    core and access layer switches

  • No impact on the network and devices due to flow export
         3COM                 Brocade            HP ProCurve
Why NetFlow for BYOD
                       In-Depth Tracking

  • NetFlow provides real-time information about network traffic

  • BYOD monitoring begins at the access layer - Closer to traffic
    source

  • Flow export supported on most enterprise devices including
    core and access layer switches

  • No impact on the network and devices due to flow export
Why NetFlow for BYOD
                         In-Depth Tracking
 • NetFlow provides real-time information about network traffic

 • BYOD monitoring begins at the access layer - Closer to traffic source

 • Flow export supported on most enterprise devices including core and
   access layer switches

 • No impact on the network and devices due to flow export

 • Track impact of BYOD on bandwidth, who are the top talkers for each
   interface and IP Subnet

 • What are the devices doing on your network, what application is being
   used and what is the destination of traffic
Why NetFlow for BYOD
                         In-Depth Tracking
 • NetFlow provides real-time information about network traffic

 • BYOD monitoring begins at the access layer - Closer to traffic source

 • Flow export supported on most enterprise devices including core and
   access layer switches

 • No impact on the network and devices due to flow export

 • Track impact of BYOD on bandwidth, who are the top talkers for each
   interface and IP Subnet

 • What are the devices doing on your network, what application is being
   used and what is the destination of traffic
Why NetFlow for BYOD
                         In-Depth Tracking
 • NetFlow provides real-time information about network traffic

 • BYOD monitoring begins at the access layer - Closer to traffic source

 • Flow export supported on most enterprise devices including core and
   access layer switches

 • No impact on the network and devices due to flow export

 • Track impact of BYOD on bandwidth, who are the top talkers for each
   interface and IP Subnet

 • What are the devices doing on your network, what application is being
   used and what is the destination of traffic
Why NetFlow for BYOD
                         In-Depth Tracking
 • NetFlow provides real-time information about network traffic

 • BYOD monitoring begins at the access layer - Closer to traffic source

 • Flow export supported on most enterprise devices including core and
   access layer switches

 • No impact on the network and devices due to flow export

 • Track impact of BYOD on bandwidth, who are the top talkers for each
   interface and IP Subnet

 • What are the devices doing on your network, what application is being
   used and what is the destination of traffic
Why NetFlow for BYOD
             Where is the Network Perimeter

 • Vanishing network perimeter – Increase in telecommuting and
   hence more remote connections with BYOD

 • Stolen mobile devices or malware infected devices can be used to
   connect to the enterprise network over VPN

 • Flow export supported by all major firewalls and routers

 • Use NetFlow data to see which device is connecting over tunnels
   and where the traffic is headed
Why NetFlow for BYOD
             Where is the Network Perimeter

 • Vanishing network perimeter – Increase in telecommuting and
   hence more remote connections with BYOD

 • Stolen mobile devices or malware infected devices can be used to
   connect to the enterprise network over VPN

 • Flow export supported by all major firewalls and routers

 • Use NetFlow data to see which device is connecting over tunnels
   and where the traffic is headed
Why NetFlow for BYOD
             Where is the Network Perimeter

 • Vanishing network perimeter – Increase in telecommuting and
   hence more remote connections with BYOD

 • Stolen mobile devices or malware infected devices can be used to
   connect to the enterprise network over VPN

 • Flow export supported by all major firewalls and routers

 • Use NetFlow data to see which device is connecting over tunnels
   and where the traffic is headed
Why NetFlow for BYOD
                        New-Age Malwares
   • BYOD growth = Increase in malwares targeting mobile devices

   • Most new malwares are zero day based - No signature for IDS or
     IPS to identify and stop the malwares

   • Infected devices are sometimes physically carried into the network
     after being infected from elsewhere

   • IDS and IPS in the internal network is not feasible due to costs

   • Network traffic behavior analysis can help with anomaly detection


Image Source: PCWorld
Why NetFlow for BYOD
                        New-Age Malwares
   • BYOD growth = Increase in malwares targeting mobile devices

   • Most new malwares are zero day based - No signature for IDS or
     IPS to identify and stop the malwares

   • Infected devices are sometimes physically carried into the network
     after being infected from elsewhere

   • IDS and IPS in the internal network is not feasible due to costs

   • Network traffic behavior analysis can help with anomaly detection


Image Source: PCWorld
Why NetFlow for BYOD
                       New-Age Malwares
 • NetFlow packets holds granular information on IP traffic behavior

 • ManageEngine NetFlow Analyzer’s has Advanced Security Analytics
   Module (ASAM)

 • ASAM leverages on the already exported NetFlow or sFlow data for
   behavior anomaly detection

 • Real time threat detection using Continuous Stream Mining Engine
   technology

 • Threats that surpass your IDS and other traditional security systems
   can be detected

 • Anomaly classification based on Offender, Target, Path and Problem
Why NetFlow for BYOD
                       New-Age Malwares
Why NetFlow for BYOD
                       New-Age Malwares
Why NetFlow for BYOD
                       New-Age Malwares
Conclusion
• MDM is Evolving – Hold the high-cost investment
   Not multi-platform - Apple, Android, Blackberry, Symbian
   Support for new technologies - IPv6, mobile apps
   Many solutions are basic - Need to evolve a lot more

• Security and monitoring most important aspects of BYOD

• Leverage on default or low cost technologies like NetFlow

• Most Important - Educate users
   Why security is more important than the fancy screensaver
   Why bandwidth is important for the organization
Questions?
ManageEngine NetFlow Analyzer is used by over 4000 customers worldwide

                       www.netflowanalyzer.com
NetFlow Analyzer Blogs:
https://blogs.netflowanalyzer.com

User Forums:
http://forums.netflowanalyzer.com

LinkedIn:
http://www.linkedin.com/groups?gid=4208806&trk=hb_side_g

TAC Team:
netflowanalyzer-support@manageengine.com

ManageEngine Sales:
sales@manageengine.com

More Related Content

What's hot

My cv 2
My cv 2My cv 2
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
Paul Morse
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
INSPIRIT BRASIL
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
Dan Miller
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
Global Business Events
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify Pillar
Ed Wong
 
Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...
Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...
Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...
Paweł Kowalski
 
L41 slides
L41 slidesL41 slides
L41 slides
Ann Bentley
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
Arrow ECS UK
 
IP Centric Conferencing IP Centric Conferencing IP Centric ...
IP Centric Conferencing IP Centric Conferencing IP Centric ...IP Centric Conferencing IP Centric Conferencing IP Centric ...
IP Centric Conferencing IP Centric Conferencing IP Centric ...
Videoguy
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentaw
legalservices
 
Mns Product Portfolio 050610b (2)
Mns Product Portfolio 050610b (2)Mns Product Portfolio 050610b (2)
Mns Product Portfolio 050610b (2)
AngieTocco
 
Multipoint Video Conference Over Public Internet
Multipoint Video Conference Over Public InternetMultipoint Video Conference Over Public Internet
Multipoint Video Conference Over Public Internet
Videoguy
 
Cis sem sdn
Cis sem sdnCis sem sdn
Cis sem sdn
Lino Quivén
 
Too soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessmentToo soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessment
Sergey Gordeychik
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
jmical
 
Arch Rock Overview
Arch Rock OverviewArch Rock Overview
Arch Rock Overview
pauldeng
 

What's hot (17)

My cv 2
My cv 2My cv 2
My cv 2
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify Pillar
 
Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...
Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...
Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...
 
L41 slides
L41 slidesL41 slides
L41 slides
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
 
IP Centric Conferencing IP Centric Conferencing IP Centric ...
IP Centric Conferencing IP Centric Conferencing IP Centric ...IP Centric Conferencing IP Centric Conferencing IP Centric ...
IP Centric Conferencing IP Centric Conferencing IP Centric ...
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentaw
 
Mns Product Portfolio 050610b (2)
Mns Product Portfolio 050610b (2)Mns Product Portfolio 050610b (2)
Mns Product Portfolio 050610b (2)
 
Multipoint Video Conference Over Public Internet
Multipoint Video Conference Over Public InternetMultipoint Video Conference Over Public Internet
Multipoint Video Conference Over Public Internet
 
Cis sem sdn
Cis sem sdnCis sem sdn
Cis sem sdn
 
Too soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessmentToo soft[ware defined] networks SD-Wan vulnerability assessment
Too soft[ware defined] networks SD-Wan vulnerability assessment
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
Arch Rock Overview
Arch Rock OverviewArch Rock Overview
Arch Rock Overview
 

Similar to BYOD Monitoring

Meetup 4/2/2016 - Functionele en technische architectuur IoT
Meetup  4/2/2016 - Functionele en technische architectuur IoTMeetup  4/2/2016 - Functionele en technische architectuur IoT
Meetup 4/2/2016 - Functionele en technische architectuur IoT
Digipolis Antwerpen
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
Eurotech
 
Open Source & The Internet of Things
Open Source & The Internet of ThingsOpen Source & The Internet of Things
Open Source & The Internet of Things
All Things Open
 
Azure IoT services - overview, SenZations 2015
Azure IoT services - overview, SenZations 2015Azure IoT services - overview, SenZations 2015
Azure IoT services - overview, SenZations 2015
SenZations Summer School
 
October Southern CA Road Shows - Build Safe and Secure Distributed Systems
October Southern CA Road Shows -  Build Safe and Secure Distributed SystemsOctober Southern CA Road Shows -  Build Safe and Secure Distributed Systems
October Southern CA Road Shows - Build Safe and Secure Distributed Systems
Real-Time Innovations (RTI)
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
Eurotech
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlow
NetFlow Analyzer
 
Using Node-RED for building IoT workflows
Using Node-RED for building IoT workflowsUsing Node-RED for building IoT workflows
Using Node-RED for building IoT workflows
Aniruddha Chakrabarti
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
NetworkCollaborators
 
Internet of things (IoT) with Azure
Internet of things (IoT) with AzureInternet of things (IoT) with Azure
Internet of things (IoT) with Azure
Vinoth Rajagopalan
 
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
PROIDEA
 
BKK16-500K2 CTO talk - The End to End Story
BKK16-500K2 CTO talk - The End to End StoryBKK16-500K2 CTO talk - The End to End Story
BKK16-500K2 CTO talk - The End to End Story
Linaro
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828
Mason Mei
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE
 
Webinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoTWebinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoT
Harbinger Systems - HRTech Builder of Choice
 
Going Beyond the Device Heart Beat
Going Beyond the Device Heart BeatGoing Beyond the Device Heart Beat
Going Beyond the Device Heart Beat
Balwinder Kaur
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
Arpan Pal
 
Intel IoT Edge Computing 在 AI 領域的應用與商機
Intel IoT Edge Computing 在 AI 領域的應用與商機Intel IoT Edge Computing 在 AI 領域的應用與商機
Intel IoT Edge Computing 在 AI 領域的應用與商機
Amazon Web Services
 
Role of cloud and analytics in IoT
Role of cloud and analytics in IoTRole of cloud and analytics in IoT
Role of cloud and analytics in IoT
Selvaraj Kesavan
 
IAB3948 Wiring the internet of things with Node-RED
IAB3948 Wiring the internet of things with Node-REDIAB3948 Wiring the internet of things with Node-RED
IAB3948 Wiring the internet of things with Node-RED
PeterNiblett
 

Similar to BYOD Monitoring (20)

Meetup 4/2/2016 - Functionele en technische architectuur IoT
Meetup  4/2/2016 - Functionele en technische architectuur IoTMeetup  4/2/2016 - Functionele en technische architectuur IoT
Meetup 4/2/2016 - Functionele en technische architectuur IoT
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
Open Source & The Internet of Things
Open Source & The Internet of ThingsOpen Source & The Internet of Things
Open Source & The Internet of Things
 
Azure IoT services - overview, SenZations 2015
Azure IoT services - overview, SenZations 2015Azure IoT services - overview, SenZations 2015
Azure IoT services - overview, SenZations 2015
 
October Southern CA Road Shows - Build Safe and Secure Distributed Systems
October Southern CA Road Shows -  Build Safe and Secure Distributed SystemsOctober Southern CA Road Shows -  Build Safe and Secure Distributed Systems
October Southern CA Road Shows - Build Safe and Secure Distributed Systems
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
Plugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlowPlugging Network Security Holes Using NetFlow
Plugging Network Security Holes Using NetFlow
 
Using Node-RED for building IoT workflows
Using Node-RED for building IoT workflowsUsing Node-RED for building IoT workflows
Using Node-RED for building IoT workflows
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Internet of things (IoT) with Azure
Internet of things (IoT) with AzureInternet of things (IoT) with Azure
Internet of things (IoT) with Azure
 
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
 
BKK16-500K2 CTO talk - The End to End Story
BKK16-500K2 CTO talk - The End to End StoryBKK16-500K2 CTO talk - The End to End Story
BKK16-500K2 CTO talk - The End to End Story
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
 
Webinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoTWebinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoT
 
Going Beyond the Device Heart Beat
Going Beyond the Device Heart BeatGoing Beyond the Device Heart Beat
Going Beyond the Device Heart Beat
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
 
Intel IoT Edge Computing 在 AI 領域的應用與商機
Intel IoT Edge Computing 在 AI 領域的應用與商機Intel IoT Edge Computing 在 AI 領域的應用與商機
Intel IoT Edge Computing 在 AI 領域的應用與商機
 
Role of cloud and analytics in IoT
Role of cloud and analytics in IoTRole of cloud and analytics in IoT
Role of cloud and analytics in IoT
 
IAB3948 Wiring the internet of things with Node-RED
IAB3948 Wiring the internet of things with Node-REDIAB3948 Wiring the internet of things with Node-RED
IAB3948 Wiring the internet of things with Node-RED
 

Recently uploaded

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 

Recently uploaded (20)

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 

BYOD Monitoring

  • 1. Securing and Monitoring BYOD Networks using NetFlow How NetFlow can help with Security Analysis, Application Detection and Traffic Monitoring Don Thomas Jacob Technical Marketing Engineer ManageEngine NetFlow Analyzer
  • 2. About ManageEngine Servers & Windows Event Log & Network Desktop ServiceDesk Security Applications Infrastructure Compliance Network Server Desktop Active Windows Vulnerability Helpdesk Monitoring Monitoring Management Directory Event Logs Analysis Application NetFlow Asset ITIL Service Syslog Patch Perf SQL Server Analysis Management Desk Management Management Monitoring Software Network End User Remote Exchange Firewall Log Password License Config Mgmt Experience Control Server Analyzer Management Tracking ManageEngine is an IT management vendor focused on bringing a complete IT management portfolio to all types of enterprises
  • 3. Today’s Agenda • What is BYOD • Audience Poll • Reasons for Concern • Limitations of BYOD Solutions • What is NetFlow • Why NetFlow for BYOD Networks • Questions
  • 4. What is BYOD Define: BYOD (Bring Your Own Device) “ The practice of allowing employees to bring their own computing devices like smartphones, laptops or PDA to the workplace for use and connectivity on the corporate network. “
  • 5. What is BYOD Define: BYOD (Bring Your Own Device) “ The practice of allowing employees to bring their own computing devices like smartphones, laptops or PDA to the workplace for use and connectivity on the corporate network. “ • Cost Savings  Device/Hardware cost transferred to employee • Free up your IT Team  Ownership on the employee – Devices handled better  Reduce the time spend by IT team on end-user device support and troubleshooting • Employee Satisfaction  Flexibility to work when & where as needed, on ones own chosen device • Increased Productivity  Telecommuting and flexible working hours increase productivity
  • 6. What is BYOD BYOD Reach An Aberdeen study in July 2011 found 75% organizations are permitting BYOD for business purposes Gartner study says that by 2014, 90 percent of organizations will support corporate applications on personal devices http://www.gartner.com/it/page.jsp?id=1480514 Cisco is adopting a "Any Service, Any Device, Anywhere" architecture which will evolve to a "Virtual Enterprise" – An enterprise which is location and service independent http://www.cisco.com/web/about/ciscoitatwork/downloads/ciscoitatwork/pdf/any_device_white_paper.pdf
  • 7. POLL What is your organization’s decision regarding BYOD implementation?  BYOD allowed for all device types including laptops  BYOD permitted only for smartphones/tablets  Planning to implement  Currently not considering
  • 9. Reasons for Concern Reasons for Concern Nascent Mobile Device Management (MDM)  No established MDM policies and monitoring solutions  No multi-platform or IPv6 support, may not be user friendly, etc. Different devices, Different Operating Systems  Patch management and Compliance issues Lack of Visibility  Where is the device in the network? ?  What is it accessing? Applications - Unverified and Untrusted  Security issues, Malwares and Bandwidth Issues Vanishing Network Perimeter  Remote connections, Security concerns
  • 10. Reasons for Concern Personal Work @ Work • Tendency to use BYOD for personal purposes • Exponential growth in HD Video and social media • Live Streaming of highly popular NCAA men's college basketball tournament was made available on Android devices • Non-business related traffic volume increases BANDWIDTH Issues / Poor Business Application Performance
  • 11. Reasons for Concern Device Loss = Data Loss
  • 12. Reasons for Concern Device Loss = Data Loss • Biggest threat is when BYOD leaves the enterprise network • Business data / internal emails stored on device • Device loss leads to sensitive information being left in the open • Stolen device can be used to connect to your network remotely for data theft or attacks Major SECURITY Issues
  • 13. Reasons for Concern Unverified and Greedy Applications • Mobile device growth has lead to an application explosion • New and unverified applications downloaded and installed • Security threats and malwares risks comes along unverified apps • Greedy Apps: Un-optimized, bandwidth hogging applications • Bottlenecks due to traffic from junk applications SECURITY Issues & BANDWIDTH Bottlenecks
  • 14. Reasons for Concern Inviting Network Threats • BYOD users browse from unsecured Wi-Fi networks, visits untrusted sites or download from untrusted vendors • “Dancing pigs over Security” – Users can be careless and devices outside the network perimeter are easier to attack and infect • Huge increase in number of malwares targeting mobile software platforms like iOS and Android • Infected device carried into the network – Malware enters LAN Network open to MALWARE
  • 15. Reasons for Concern Inviting Network Threats • BYOD users browse from unsecured Wi-Fi networks, visits untrusted sites or download from untrusted vendors • “Dancing pigs over Security” – Users can be careless and devices outside the network perimeter are easier to attack and infect • Huge increase in number of malwares targeting mobile software platforms like iOS and Android • Infected device carried into the network – Malware enters LAN Network open to MALWARE
  • 16. Limitations of BYOD Solutions
  • 17. Limitations of BYOD Solutions Limitations of BYOD Solutions More Control on BYOD Devices & Web Traffic Limitation: As good as having company issued device - BYOD advantage lost Vague and impractical solution - Genuine users will be effected Up-to-date Patch Management Limitation: No multi-platform MDM or patch management solution available for the highly diverse mobile ecosystem Anti-Virus Software on Mobile Devices Limitation: New age malware exploits zero-day vulnerabilities Multi Layered Security & Internal IDS Limitations: Traditional, layered security solutions (firewall, proxy, content filtering, etc.) will fall short against new age threats Expensive to implement IDS/IPS in access layer to stop internal malware
  • 19. What is NetFlow What is NetFlow Technology developed by Cisco - Designed as a switching path Is now the Primary IP Traffic accounting technology Information on the WHO, WHAT, WHEN and WHERE of IP traffic All major vendors now support flow export: NetFlow - Cisco, Adtran, 3COM J-Flow - Juniper IPFIX - Nortel sFlow - Alcatel, HP, Brocade, Enterasys, Dell
  • 20. What is NetFlow 7 unique fields define a flow Source Interface (ifindex) Protocol Source IP Address Destination IP Address Source Port Destination Port ToS
  • 21. What is NetFlow How NetFlow Works  Traffic passes through routing/switching device interface  Flow created (remember the 7 fields) and stored in NetFlow cache  Flows grouped and exported in UDP packets to collector based on active and inactive flow timeout NetFlow Cache Flow Analyzer
  • 22. What is NetFlow NetFlow enabled interface Core Network Edge Router NetFlow Packets • Approximately 1500 bytes • Each contains 20-50 flow records UDP NetFlow NetFlow Collector
  • 23. What is NetFlow Source Port Source IP Address Who ? Destination Port What ? Destination IP Address Protocol When ? Packet Count Usage ? Flow Start and End time Octet count ToS QoS ? TCP Flags QoS ? Protocol NextHop Input and Output Interface Path ? Source AS Information Route ? (ifindex) Destination AS Information
  • 24. Why NetFlow for BYOD Networks
  • 25. Why NetFlow for BYOD In-Depth Tracking • NetFlow provides real-time information about network traffic • BYOD monitoring begins at the access layer - Closer to traffic source • Flow export supported on most enterprise devices including core and access layer switches • No impact on the network and devices due to flow export 3COM Brocade HP ProCurve
  • 26. Why NetFlow for BYOD In-Depth Tracking • NetFlow provides real-time information about network traffic • BYOD monitoring begins at the access layer - Closer to traffic source • Flow export supported on most enterprise devices including core and access layer switches • No impact on the network and devices due to flow export
  • 27. Why NetFlow for BYOD In-Depth Tracking • NetFlow provides real-time information about network traffic • BYOD monitoring begins at the access layer - Closer to traffic source • Flow export supported on most enterprise devices including core and access layer switches • No impact on the network and devices due to flow export • Track impact of BYOD on bandwidth, who are the top talkers for each interface and IP Subnet • What are the devices doing on your network, what application is being used and what is the destination of traffic
  • 28. Why NetFlow for BYOD In-Depth Tracking • NetFlow provides real-time information about network traffic • BYOD monitoring begins at the access layer - Closer to traffic source • Flow export supported on most enterprise devices including core and access layer switches • No impact on the network and devices due to flow export • Track impact of BYOD on bandwidth, who are the top talkers for each interface and IP Subnet • What are the devices doing on your network, what application is being used and what is the destination of traffic
  • 29. Why NetFlow for BYOD In-Depth Tracking • NetFlow provides real-time information about network traffic • BYOD monitoring begins at the access layer - Closer to traffic source • Flow export supported on most enterprise devices including core and access layer switches • No impact on the network and devices due to flow export • Track impact of BYOD on bandwidth, who are the top talkers for each interface and IP Subnet • What are the devices doing on your network, what application is being used and what is the destination of traffic
  • 30. Why NetFlow for BYOD In-Depth Tracking • NetFlow provides real-time information about network traffic • BYOD monitoring begins at the access layer - Closer to traffic source • Flow export supported on most enterprise devices including core and access layer switches • No impact on the network and devices due to flow export • Track impact of BYOD on bandwidth, who are the top talkers for each interface and IP Subnet • What are the devices doing on your network, what application is being used and what is the destination of traffic
  • 31. Why NetFlow for BYOD Where is the Network Perimeter • Vanishing network perimeter – Increase in telecommuting and hence more remote connections with BYOD • Stolen mobile devices or malware infected devices can be used to connect to the enterprise network over VPN • Flow export supported by all major firewalls and routers • Use NetFlow data to see which device is connecting over tunnels and where the traffic is headed
  • 32. Why NetFlow for BYOD Where is the Network Perimeter • Vanishing network perimeter – Increase in telecommuting and hence more remote connections with BYOD • Stolen mobile devices or malware infected devices can be used to connect to the enterprise network over VPN • Flow export supported by all major firewalls and routers • Use NetFlow data to see which device is connecting over tunnels and where the traffic is headed
  • 33. Why NetFlow for BYOD Where is the Network Perimeter • Vanishing network perimeter – Increase in telecommuting and hence more remote connections with BYOD • Stolen mobile devices or malware infected devices can be used to connect to the enterprise network over VPN • Flow export supported by all major firewalls and routers • Use NetFlow data to see which device is connecting over tunnels and where the traffic is headed
  • 34. Why NetFlow for BYOD New-Age Malwares • BYOD growth = Increase in malwares targeting mobile devices • Most new malwares are zero day based - No signature for IDS or IPS to identify and stop the malwares • Infected devices are sometimes physically carried into the network after being infected from elsewhere • IDS and IPS in the internal network is not feasible due to costs • Network traffic behavior analysis can help with anomaly detection Image Source: PCWorld
  • 35. Why NetFlow for BYOD New-Age Malwares • BYOD growth = Increase in malwares targeting mobile devices • Most new malwares are zero day based - No signature for IDS or IPS to identify and stop the malwares • Infected devices are sometimes physically carried into the network after being infected from elsewhere • IDS and IPS in the internal network is not feasible due to costs • Network traffic behavior analysis can help with anomaly detection Image Source: PCWorld
  • 36. Why NetFlow for BYOD New-Age Malwares • NetFlow packets holds granular information on IP traffic behavior • ManageEngine NetFlow Analyzer’s has Advanced Security Analytics Module (ASAM) • ASAM leverages on the already exported NetFlow or sFlow data for behavior anomaly detection • Real time threat detection using Continuous Stream Mining Engine technology • Threats that surpass your IDS and other traditional security systems can be detected • Anomaly classification based on Offender, Target, Path and Problem
  • 37. Why NetFlow for BYOD New-Age Malwares
  • 38. Why NetFlow for BYOD New-Age Malwares
  • 39. Why NetFlow for BYOD New-Age Malwares
  • 40. Conclusion • MDM is Evolving – Hold the high-cost investment  Not multi-platform - Apple, Android, Blackberry, Symbian  Support for new technologies - IPv6, mobile apps  Many solutions are basic - Need to evolve a lot more • Security and monitoring most important aspects of BYOD • Leverage on default or low cost technologies like NetFlow • Most Important - Educate users  Why security is more important than the fancy screensaver  Why bandwidth is important for the organization
  • 41. Questions? ManageEngine NetFlow Analyzer is used by over 4000 customers worldwide www.netflowanalyzer.com NetFlow Analyzer Blogs: https://blogs.netflowanalyzer.com User Forums: http://forums.netflowanalyzer.com LinkedIn: http://www.linkedin.com/groups?gid=4208806&trk=hb_side_g TAC Team: netflowanalyzer-support@manageengine.com ManageEngine Sales: sales@manageengine.com