SlideShare a Scribd company logo
Locking Down the Risks
from Unlocked Devices
Presented by:
Troy Fulton
Director, Product Marketing
Wednesday, February 20, 2013
© 2013 Tangoe, Inc.

Thursday, February 21, 2013
Today‟s Speaker
Troy Fulton
Director, MDM Product Marketing
• 20+ years in high-tech and communications devices

• Senior product marketing and management positions
with global corporations including Motorola Mobility,
Nokia, and Compaq

• MBA from The College of William and Mary; BA from
Boston College

© 2013 Tangoe, Inc.

2
Agenda
• Definitions
• What is Illegal
• Key Takeaways
• Risk & Mitigation
• Summary
• Q&A

© 2013 Tangoe, Inc.

3
Definitions: Unlocking
• Enables a device to work on a wireless carrier other than the one device
was purchased from
•

If an AT&T iPhone were unlocked, it could be used on T-Mobile USA's network

• In October, the U.S. Library of Congress invalidated a copyright
exemption in the Digital Millennium Copyright Act for unlocking

cell phones
• Unlocking a device is potentially illegal, unless authorized
by a carrier
• Civil fines range from $200 to $2,500 per unlock
• Criminal penalties up to $500,000 and five years in jail.
• http://bits.blogs.nytimes.com/2013/01/25/cellphone-unlock-dmca/
• Unauthorized unlocking requires the device to be jailbroken

© 2013 Tangoe, Inc.

4
Definitions: Jailbreak
• Pertains to iOS devices
• Allows applications not approved by Apple to be downloaded from any
source
• Removes the security controls which prevent access to data on a device by
unauthorized people and applications
• Process of removing the sandbox protections that Apple places in its iOS
products
• Enables users to access files they normally wouldn't be permitted to, which
opens up all sorts of possibilities for customizing an iOS system

• Many technically inclined users loathe being
locked into a sandboxed device

© 2013 Tangoe, Inc.

5
Definitions: Root
• Pertains to Android devices
• Android, unlike Apple, is an open source operating system
• Android out of the box allows users to install 3rd party apps (also known as
sideloading)
• User can install themes
• Allows the install of applications directly from SD card or internal memory of
device
• Everything IOS users hope to accomplish with jailbreaking is basic functionality
within Android

• Rooting overcomes limitations carriers and OEMS put
on devices (skins, etc.)
• COMPLETELY remove and replace the entire
operating system of the device

© 2013 Tangoe, Inc.

6
What Has Been Reported to be Illegal
• Unlocking without carrier permission
• A common example….
• Use device as an Internet hotspot
• Switch to a local carrier when traveling overseas to avoid roaming charges

• In Europe, unlocked phones function as you might expect.
• You buy a phone and obtain a SIM card from the network you have chosen, and the phone
registers on that network
• Want to change networks? Get a different SIM and swap it out
• Why does this work?
•

Network operators share the same three portions of the spectrum and support GSM
(3G) and LTE (4G).

• In the U.S. carriers enable different features on their smartphones
• Support differentiated mobile experiences
• Support competing 3G and 4G wireless communication
standards at different spectrum frequencies

© 2013 Tangoe, Inc.

7
Key Takeaways: Unlocking
• New carrier = non-optimized usage rates
• Unlocking can also interfere with your phone‟s settings
• Features previously enabled will not likely function
• Phone warranty voided
• Jailbreaking attracts malware and decrypts data

• This law does not eliminate the practice of unlocking phones
• Does not prevent unlocked phones from entering corporate networks

• Organization may be held liable for an employee‟s unlocked device

© 2013 Tangoe, Inc.

8
Key Takeaways: Jailbreak vs. Rooted
• Sandbox protection for apps is removed
• Every app can get to everything
• iOS and Android apps designed not to share data

• Jailbreaking decrypts data on the device
• Bypasses device password
• Android app developers can store data in cipher text (optional)
•

If not, encrypted device data may be stored in plain text if you PC synch

• Jailbroken vs. rooted
• iOS: apps must utilize the Data Protection APIs to maintain encryption
•

Password protection enables data encryption

•

NSS Labs: possible to jailbreak an iOS device and completely bypass the passcode

•

Jailbroken phones are more vulnerable to malware

• Android: device password enables full file system encryption
•

Modifying the bootloader or OS is not sufficient to access data without the password

•

Rooting decrypts all data. Google recommends an OEM hardware solution

© 2013 Tangoe, Inc.

9
Risks and Mitigation
• Device is lost or stolen
• Exposed data…all of it
• SMS/iMessage texts
• Address book, calendar, email….

• VPN
• Secure communication but is the device secure?

• Access to enterprise resources
• Need mobile anti-virus

• Mitigate risks
• Monitor with automatic policy response
•

Carrier and application

• Mobile content management
• Containerization

• ABQ
© 2013 Tangoe, Inc.

10
Secure Mobile Content Management
• Enforce security for
device-based

Corporate
Document
Stores

access
• Manage distribution
authority
• Enforce DLP via
cut/paste features
• Manage document

Native, 3rd
Party
Editing
Tools

Mobile
Content
Management

version control &
redundancy

Device
Continuum

© 2013 Tangoe, Inc.

Simple,
Private
File
Sharing
Mobile Device Containerization

Tap to access Divide
•
•
•

Enter passcode

Get to work!
•
•
•

Personal phone, SMS and web
Choice of device, services
Freedom & privacy

Data security
Enterprise apps & services
Easy to manage and control

• Separate corporate data from personal data
• Allow „personal data‟ to co-exist
• Provide controls over corporate data
© 2013 Tangoe, Inc.

12
Secure Network Access: THE BYOD Solution
• Real-time detection and enforcement
• Detect and quarantine unknown devices
• Self-Service Device Enrollment Modules
• Guest Access Management
• Non-Browser Device Registration

• MDM Policy Enforcement
• MDM Self-Registration process integrated with NAC-based Policy
Enforcement
• NAC-based MDM Policy Enforcement and Remediation Messaging

13
© 2013 Tangoe, Inc.
Summary
• Terms and conditions should clearly describe the penalties for unlocking

• Know your environment
• SANS Institute IT Survey: 9% are “fully aware” of all mobile devices on their network

• Lifecycle of smartphones and tablets is very short: 12 – 18 months
• Do not be fooled…if no controls, there is sensitive data on the device

• Make (sustainable) decisions
• If you do not define policy, employees will

• Never store confidential corporate data on an unencrypted device
• No corporate business through the use of personal accounts
• Prohibit sending emails from your corporate address to private email accounts

• Lock down any device assigned to an employee, including remote wipe
• Secure communication to the device

• Block device access to ActiveSync for non-compliance
• Have a recycling program
© 2013 Tangoe, Inc.

14
Questions and Contacts
Troy Fulton
Director, Product Marketing
Troy.Fulton@tangoe.com

Tangoe
203.859.9300
info@tangoe.com
www.tangoe.com

© 2013 Tangoe, Inc.

15

More Related Content

What's hot

Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
David Rogers
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
Divya Raval
 
The Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityThe Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT Security
Dr. Mohamed Torky
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phones
Ashish Sutar
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
Neeraj Aarora
 
Sample IT Policy
Sample IT PolicySample IT Policy
Sample IT Policy
Clarknuber
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
ijcsit
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Intro to information security
Intro to information securityIntro to information security
Intro to information security
Viraj Ekanayake
 
The role and impact of IT in society
The role and impact of IT in societyThe role and impact of IT in society
The role and impact of IT in society
Anjan Mahanta
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Blackberry final
Blackberry finalBlackberry final
Blackberry final
Ranjeet Rajput
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
John D. Johnson
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
RoshanMaharjan13
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
NetWatcher
 
Security is sexy again
Security is sexy againSecurity is sexy again
Security is sexy again
Vitor Domingos
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile world
Brian Katz
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
Amirul Shafiq Ahmad Zuperi
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
Bellaj Badr
 

What's hot (20)

Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
 
Security models of modern mobile systems
Security models of modern mobile systemsSecurity models of modern mobile systems
Security models of modern mobile systems
 
File000093
File000093File000093
File000093
 
The Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityThe Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT Security
 
SOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phonesSOK:An overview of data extraction techniques from mobile phones
SOK:An overview of data extraction techniques from mobile phones
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
 
Sample IT Policy
Sample IT PolicySample IT Policy
Sample IT Policy
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Intro to information security
Intro to information securityIntro to information security
Intro to information security
 
The role and impact of IT in society
The role and impact of IT in societyThe role and impact of IT in society
The role and impact of IT in society
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Blackberry final
Blackberry finalBlackberry final
Blackberry final
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Security is sexy again
Security is sexy againSecurity is sexy again
Security is sexy again
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile world
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 

Similar to Locking down risks from unlocked devices

Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
Troy C. Fulton
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
Troy C. Fulton
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?
Miradore
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
Troy C. Fulton
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
Dr. Ahmed Al Zaidy
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
Security Innovation
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
AMD Developer Central
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
SmartCompliance
 
Android vs iOS encryption systems
Android vs iOS encryption systemsAndroid vs iOS encryption systems
Android vs iOS encryption systems
Birju Tank
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesSTO STRATEGY
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
Bitglass
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
MobileWorxs
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
Waterstons Ltd
 
Towards a Responsible Internet of Things
Towards a Responsible Internet of ThingsTowards a Responsible Internet of Things
Towards a Responsible Internet of Things
Jeff Katz
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile Device
TechWell
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
Parag Deodhar
 

Similar to Locking down risks from unlocked devices (20)

Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Android vs iOS encryption systems
Android vs iOS encryption systemsAndroid vs iOS encryption systems
Android vs iOS encryption systems
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Towards a Responsible Internet of Things
Towards a Responsible Internet of ThingsTowards a Responsible Internet of Things
Towards a Responsible Internet of Things
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile Device
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 

Recently uploaded

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

Locking down risks from unlocked devices

  • 1. Locking Down the Risks from Unlocked Devices Presented by: Troy Fulton Director, Product Marketing Wednesday, February 20, 2013 © 2013 Tangoe, Inc. Thursday, February 21, 2013
  • 2. Today‟s Speaker Troy Fulton Director, MDM Product Marketing • 20+ years in high-tech and communications devices • Senior product marketing and management positions with global corporations including Motorola Mobility, Nokia, and Compaq • MBA from The College of William and Mary; BA from Boston College © 2013 Tangoe, Inc. 2
  • 3. Agenda • Definitions • What is Illegal • Key Takeaways • Risk & Mitigation • Summary • Q&A © 2013 Tangoe, Inc. 3
  • 4. Definitions: Unlocking • Enables a device to work on a wireless carrier other than the one device was purchased from • If an AT&T iPhone were unlocked, it could be used on T-Mobile USA's network • In October, the U.S. Library of Congress invalidated a copyright exemption in the Digital Millennium Copyright Act for unlocking cell phones • Unlocking a device is potentially illegal, unless authorized by a carrier • Civil fines range from $200 to $2,500 per unlock • Criminal penalties up to $500,000 and five years in jail. • http://bits.blogs.nytimes.com/2013/01/25/cellphone-unlock-dmca/ • Unauthorized unlocking requires the device to be jailbroken © 2013 Tangoe, Inc. 4
  • 5. Definitions: Jailbreak • Pertains to iOS devices • Allows applications not approved by Apple to be downloaded from any source • Removes the security controls which prevent access to data on a device by unauthorized people and applications • Process of removing the sandbox protections that Apple places in its iOS products • Enables users to access files they normally wouldn't be permitted to, which opens up all sorts of possibilities for customizing an iOS system • Many technically inclined users loathe being locked into a sandboxed device © 2013 Tangoe, Inc. 5
  • 6. Definitions: Root • Pertains to Android devices • Android, unlike Apple, is an open source operating system • Android out of the box allows users to install 3rd party apps (also known as sideloading) • User can install themes • Allows the install of applications directly from SD card or internal memory of device • Everything IOS users hope to accomplish with jailbreaking is basic functionality within Android • Rooting overcomes limitations carriers and OEMS put on devices (skins, etc.) • COMPLETELY remove and replace the entire operating system of the device © 2013 Tangoe, Inc. 6
  • 7. What Has Been Reported to be Illegal • Unlocking without carrier permission • A common example…. • Use device as an Internet hotspot • Switch to a local carrier when traveling overseas to avoid roaming charges • In Europe, unlocked phones function as you might expect. • You buy a phone and obtain a SIM card from the network you have chosen, and the phone registers on that network • Want to change networks? Get a different SIM and swap it out • Why does this work? • Network operators share the same three portions of the spectrum and support GSM (3G) and LTE (4G). • In the U.S. carriers enable different features on their smartphones • Support differentiated mobile experiences • Support competing 3G and 4G wireless communication standards at different spectrum frequencies © 2013 Tangoe, Inc. 7
  • 8. Key Takeaways: Unlocking • New carrier = non-optimized usage rates • Unlocking can also interfere with your phone‟s settings • Features previously enabled will not likely function • Phone warranty voided • Jailbreaking attracts malware and decrypts data • This law does not eliminate the practice of unlocking phones • Does not prevent unlocked phones from entering corporate networks • Organization may be held liable for an employee‟s unlocked device © 2013 Tangoe, Inc. 8
  • 9. Key Takeaways: Jailbreak vs. Rooted • Sandbox protection for apps is removed • Every app can get to everything • iOS and Android apps designed not to share data • Jailbreaking decrypts data on the device • Bypasses device password • Android app developers can store data in cipher text (optional) • If not, encrypted device data may be stored in plain text if you PC synch • Jailbroken vs. rooted • iOS: apps must utilize the Data Protection APIs to maintain encryption • Password protection enables data encryption • NSS Labs: possible to jailbreak an iOS device and completely bypass the passcode • Jailbroken phones are more vulnerable to malware • Android: device password enables full file system encryption • Modifying the bootloader or OS is not sufficient to access data without the password • Rooting decrypts all data. Google recommends an OEM hardware solution © 2013 Tangoe, Inc. 9
  • 10. Risks and Mitigation • Device is lost or stolen • Exposed data…all of it • SMS/iMessage texts • Address book, calendar, email…. • VPN • Secure communication but is the device secure? • Access to enterprise resources • Need mobile anti-virus • Mitigate risks • Monitor with automatic policy response • Carrier and application • Mobile content management • Containerization • ABQ © 2013 Tangoe, Inc. 10
  • 11. Secure Mobile Content Management • Enforce security for device-based Corporate Document Stores access • Manage distribution authority • Enforce DLP via cut/paste features • Manage document Native, 3rd Party Editing Tools Mobile Content Management version control & redundancy Device Continuum © 2013 Tangoe, Inc. Simple, Private File Sharing
  • 12. Mobile Device Containerization Tap to access Divide • • • Enter passcode Get to work! • • • Personal phone, SMS and web Choice of device, services Freedom & privacy Data security Enterprise apps & services Easy to manage and control • Separate corporate data from personal data • Allow „personal data‟ to co-exist • Provide controls over corporate data © 2013 Tangoe, Inc. 12
  • 13. Secure Network Access: THE BYOD Solution • Real-time detection and enforcement • Detect and quarantine unknown devices • Self-Service Device Enrollment Modules • Guest Access Management • Non-Browser Device Registration • MDM Policy Enforcement • MDM Self-Registration process integrated with NAC-based Policy Enforcement • NAC-based MDM Policy Enforcement and Remediation Messaging 13 © 2013 Tangoe, Inc.
  • 14. Summary • Terms and conditions should clearly describe the penalties for unlocking • Know your environment • SANS Institute IT Survey: 9% are “fully aware” of all mobile devices on their network • Lifecycle of smartphones and tablets is very short: 12 – 18 months • Do not be fooled…if no controls, there is sensitive data on the device • Make (sustainable) decisions • If you do not define policy, employees will • Never store confidential corporate data on an unencrypted device • No corporate business through the use of personal accounts • Prohibit sending emails from your corporate address to private email accounts • Lock down any device assigned to an employee, including remote wipe • Secure communication to the device • Block device access to ActiveSync for non-compliance • Have a recycling program © 2013 Tangoe, Inc. 14
  • 15. Questions and Contacts Troy Fulton Director, Product Marketing Troy.Fulton@tangoe.com Tangoe 203.859.9300 info@tangoe.com www.tangoe.com © 2013 Tangoe, Inc. 15