SlideShare a Scribd company logo
1 of 8
The SIMS Partnership
Transforming health care delivery
The SIMS Partnership
Transforming health care delivery
The SIMS Partnership
Transforming health care delivery
MAC Evaluation
Proof of Concept – Standards Review
Presenter: Kevin Tsai
Date: March 27, 2013
The SIMS Partnership
Transforming health care delivery
2
Agenda
• Summary/Background
• Critical Objectives
• Timelines/Milestones
• Findings/Testing Matrix
• Recommendations/Conclusions
• Questions
The SIMS Partnership
Transforming health care delivery
3
Summary/Background
– SIMS investigated developing standardized processes and methods for
integrating Mac computers securely into our network infrastructure
while establishing the capability to properly service a Mac population.
SIMS was looking to make the Mac an alternative platform for end
users with the intention of ensuring Mac is fully compliant with UHN’s
technology/security/privacy standards.
– The Proof of Concept focused on a single security profile with the goal
of proving security, integration, standardized security configurations
(i.e. Encryption/Antivirus/VPN), supportability, and a repeatable
provisioning process.
– This POC project involved no more than 5 users from the technology
support groups.
The SIMS Partnership
Transforming health care delivery
4
Critical Objectives
The UHN end user should be able to use their Proof of Concept Mac to.
•Use the corporate wireless network
•Meet the documented UHN Enterprise Security Policies & Standards
•Use UHN VPN
•Use Entourage or Outlook 2011 for Mac to connect to UHN’s Microsoft Exchange servers
•Use Winmagic to encrypt Mac laptop hard drive and prevent unencrypted USB storage
•Use McAfee Antivirus software including ePO agent for remote management and application
administration
•Use Citrix applications
The SIMS Partnership
Transforming health care delivery
5
Timelines/Milestones
The SIMS Partnership
Transforming health care delivery
6
Finding(s)/Testing Matrix
TestingResult
Comments
Description Tested By
UHN VPN Kevin Tsai Y Cisco Client is not required
Connecting to UHN Email using MAPI Client Kevin Tsai Y Authenticating required when launching Outlook (expected outcome for a non-domain device)
Connecting to UHN Wireless (corporate) Kevin Tsai Y No issues found
Antivirus Software (McAfee for MAC) Kevin Tsai Y The McAfee for MAC has to be purchased if needed
Standard Office Application (Office for MAC 2011) Kevin Tsai Y No issues found
Lync (Lync for MAC) Kevin Tsai Y No issues found
Standard UHN Encryption Software (WinMagic) Daniel Chen N
Tested two Macs with SecureDoc 5.3 and it appears the hard drives are fully encrypted with
SecureDoc 5.3, however the mandatory encryption policy that applies to UHN managed
Windows clients cannot be applied to these two test Macs. One of the observed issues is that
WinMagic encryption software tends to be behind the Mac OS update release. Recently
WinMagic released SecureDoc 6.1 that offers the full disk encryption that uses the built-in
FileVault 2 in Mac OS.
Standard MAC native disk encryption (filevault 2) Daniel Chen N
Encrypted the internal drive without any issues. Other issues are it does not encrypt the
removable media (USB) and the data is not recoverable if user lost the password/key. (JAMF
has the ability to insert the corporate key for this particular scenario so the data is still
recoverable if the BYOD Mac has enrolled under JAMF)
Citrix Kevin Tsai Y Citrix Recevier was tested with the ability to launch standard UHN Citrix Applications.
MAC Management/Inventory Suite (JAMF-SCCM like) Kevin/Daniel/Mario/Greg M
JAMF (Mac management/reporting/inventory tool) that is not included in the BYOD project
charter initially but we feel that it offers great value/assurance that we will need a tool to
inventory or even to manage the BYOD Mac devices if needed. Further $ ($6K - JumpStart
with the fully functional POC server) required from UHN management’s approval if we want to
investigate the product in a deeper level as we have already done the initial POC for the
duration of one month. Sunnybrook is currently using the same product to manage their
BYOD Mac devices with great success
MAC POC Testing Matrix
The SIMS Partnership
Transforming health care delivery
7
Recommendations/Conclusions
Conclusions
•MAC does not meet the requirements of our standard corporate security
policy and government regulations (Winmagic policy remote push & USB
data encryption)
•There are financial implications and a separate management infrastructure
will be needed if we want to manage MAC. (Estimated $20K CapEx for JAMF
Infrastructure, $140/yr/per devices for JAMF, $12K OpEx/yr/per server; antivirus/office & other CALs are extra)
Recommendation
•MAC should be managed as BYO guideline/corporate IT policy and will be
tested during future BYO proof of concepts (e.g. Mobile Data and
Application Platform)
The SIMS Partnership
Transforming health care delivery
8
Questions?

More Related Content

What's hot

Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
CompTIA Security+ Guide
CompTIA Security+ GuideCompTIA Security+ Guide
CompTIA Security+ GuideSmithjulia33
 
Comparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalComparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalapprize360
 
Photography Company Lifetouch Safeguards IT Security for Third Party Software...
Photography Company Lifetouch Safeguards IT Security for Third Party Software...Photography Company Lifetouch Safeguards IT Security for Third Party Software...
Photography Company Lifetouch Safeguards IT Security for Third Party Software...Flexera
 
Leveraging Your Security System to Impact Your Bottom line
Leveraging Your Security System to Impact Your Bottom lineLeveraging Your Security System to Impact Your Bottom line
Leveraging Your Security System to Impact Your Bottom lineguidepostsolutions
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David RossGraeme Wood
 
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANT
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANTUNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANT
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANTMicro Focus
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldQuest
 
Cmgt 582 Enthusiastic Study / snaptutorial.com
Cmgt 582 Enthusiastic Study / snaptutorial.comCmgt 582 Enthusiastic Study / snaptutorial.com
Cmgt 582 Enthusiastic Study / snaptutorial.comStephenson032
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementQuest
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
 
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...VMworld
 
Physical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterprisePhysical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterpriseVidSys, Inc.
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 

What's hot (16)

Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
CompTIA Security+ Guide
CompTIA Security+ GuideCompTIA Security+ Guide
CompTIA Security+ Guide
 
Comparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalComparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 final
 
Photography Company Lifetouch Safeguards IT Security for Third Party Software...
Photography Company Lifetouch Safeguards IT Security for Third Party Software...Photography Company Lifetouch Safeguards IT Security for Third Party Software...
Photography Company Lifetouch Safeguards IT Security for Third Party Software...
 
Leveraging Your Security System to Impact Your Bottom line
Leveraging Your Security System to Impact Your Bottom lineLeveraging Your Security System to Impact Your Bottom line
Leveraging Your Security System to Impact Your Bottom line
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANT
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANTUNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANT
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANT
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
BigFix White Paper
BigFix White PaperBigFix White Paper
BigFix White Paper
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Cmgt 582 Enthusiastic Study / snaptutorial.com
Cmgt 582 Enthusiastic Study / snaptutorial.comCmgt 582 Enthusiastic Study / snaptutorial.com
Cmgt 582 Enthusiastic Study / snaptutorial.com
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint Management
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
 
Physical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterprisePhysical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the Enterprise
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 

Viewers also liked

Abraham maslow
Abraham maslowAbraham maslow
Abraham maslow951123
 
Folletos administracion
Folletos administracionFolletos administracion
Folletos administracion951123
 
Apache Web Server Complete Guide
Apache Web Server Complete GuideApache Web Server Complete Guide
Apache Web Server Complete GuideKazim Soomro
 
How to write a research paper
How to write a research paperHow to write a research paper
How to write a research paperehale1
 
International love.
International love.International love.
International love.FortuneRioba
 
Target Audience | Fortune/Katrina
Target Audience | Fortune/KatrinaTarget Audience | Fortune/Katrina
Target Audience | Fortune/KatrinaFortuneRioba
 
Why plants are important
Why plants are importantWhy plants are important
Why plants are importantKazim Soomro
 
Suleiman the magnificent
Suleiman the magnificentSuleiman the magnificent
Suleiman the magnificentSaira Ashraf
 

Viewers also liked (13)

Abraham maslow
Abraham maslowAbraham maslow
Abraham maslow
 
Folletos administracion
Folletos administracionFolletos administracion
Folletos administracion
 
Apache Web Server Complete Guide
Apache Web Server Complete GuideApache Web Server Complete Guide
Apache Web Server Complete Guide
 
How to write a research paper
How to write a research paperHow to write a research paper
How to write a research paper
 
Pac rim 20013
Pac rim 20013Pac rim 20013
Pac rim 20013
 
Depression
DepressionDepression
Depression
 
International love.
International love.International love.
International love.
 
jees_Resume2
jees_Resume2jees_Resume2
jees_Resume2
 
Feel This Moment
Feel This MomentFeel This Moment
Feel This Moment
 
Target Audience | Fortune/Katrina
Target Audience | Fortune/KatrinaTarget Audience | Fortune/Katrina
Target Audience | Fortune/Katrina
 
Why plants are important
Why plants are importantWhy plants are important
Why plants are important
 
Suleiman the magnificent
Suleiman the magnificentSuleiman the magnificent
Suleiman the magnificent
 
The C4 pathway
The C4 pathwayThe C4 pathway
The C4 pathway
 

Similar to mac integration

Building DevOps in the Enterprise: Balancing Centralized and Decentralized Teams
Building DevOps in the Enterprise: Balancing Centralized and Decentralized TeamsBuilding DevOps in the Enterprise: Balancing Centralized and Decentralized Teams
Building DevOps in the Enterprise: Balancing Centralized and Decentralized TeamsDevOps.com
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld
 
Building DevOps in the enterprise: Transforming challenges into organizationa...
Building DevOps in the enterprise: Transforming challenges into organizationa...Building DevOps in the enterprise: Transforming challenges into organizationa...
Building DevOps in the enterprise: Transforming challenges into organizationa...Jonah Kowall
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Bringing collaborative test to life an example of community effort
Bringing collaborative test to life  an example of community effort Bringing collaborative test to life  an example of community effort
Bringing collaborative test to life an example of community effort Comarch
 
MidoNet Vision & Roadmap
MidoNet Vision & RoadmapMidoNet Vision & Roadmap
MidoNet Vision & RoadmapMidoNet
 
Patch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT LeadersPatch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT LeadersKaseya
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357IJMER
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd Iaetsd
 
Windows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration WhitepaperWindows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration WhitepaperLori Witzel
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services IntroCruatech
 
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...Kenny Buntinx
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...MuleSoft
 

Similar to mac integration (20)

Building DevOps in the Enterprise: Balancing Centralized and Decentralized Teams
Building DevOps in the Enterprise: Balancing Centralized and Decentralized TeamsBuilding DevOps in the Enterprise: Balancing Centralized and Decentralized Teams
Building DevOps in the Enterprise: Balancing Centralized and Decentralized Teams
 
Dual-Track Agile at Scale
Dual-Track Agile at ScaleDual-Track Agile at Scale
Dual-Track Agile at Scale
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
 
Building DevOps in the enterprise: Transforming challenges into organizationa...
Building DevOps in the enterprise: Transforming challenges into organizationa...Building DevOps in the enterprise: Transforming challenges into organizationa...
Building DevOps in the enterprise: Transforming challenges into organizationa...
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Bringing collaborative test to life an example of community effort
Bringing collaborative test to life  an example of community effort Bringing collaborative test to life  an example of community effort
Bringing collaborative test to life an example of community effort
 
MidoNet roadmap
MidoNet roadmapMidoNet roadmap
MidoNet roadmap
 
MidoNet Vision & Roadmap
MidoNet Vision & RoadmapMidoNet Vision & Roadmap
MidoNet Vision & Roadmap
 
Patch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT LeadersPatch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT Leaders
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
 
Windows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration WhitepaperWindows XP to Windows 7 Migration Whitepaper
Windows XP to Windows 7 Migration Whitepaper
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
 

Recently uploaded

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 

Recently uploaded (20)

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 

mac integration

  • 1. The SIMS Partnership Transforming health care delivery The SIMS Partnership Transforming health care delivery The SIMS Partnership Transforming health care delivery MAC Evaluation Proof of Concept – Standards Review Presenter: Kevin Tsai Date: March 27, 2013
  • 2. The SIMS Partnership Transforming health care delivery 2 Agenda • Summary/Background • Critical Objectives • Timelines/Milestones • Findings/Testing Matrix • Recommendations/Conclusions • Questions
  • 3. The SIMS Partnership Transforming health care delivery 3 Summary/Background – SIMS investigated developing standardized processes and methods for integrating Mac computers securely into our network infrastructure while establishing the capability to properly service a Mac population. SIMS was looking to make the Mac an alternative platform for end users with the intention of ensuring Mac is fully compliant with UHN’s technology/security/privacy standards. – The Proof of Concept focused on a single security profile with the goal of proving security, integration, standardized security configurations (i.e. Encryption/Antivirus/VPN), supportability, and a repeatable provisioning process. – This POC project involved no more than 5 users from the technology support groups.
  • 4. The SIMS Partnership Transforming health care delivery 4 Critical Objectives The UHN end user should be able to use their Proof of Concept Mac to. •Use the corporate wireless network •Meet the documented UHN Enterprise Security Policies & Standards •Use UHN VPN •Use Entourage or Outlook 2011 for Mac to connect to UHN’s Microsoft Exchange servers •Use Winmagic to encrypt Mac laptop hard drive and prevent unencrypted USB storage •Use McAfee Antivirus software including ePO agent for remote management and application administration •Use Citrix applications
  • 5. The SIMS Partnership Transforming health care delivery 5 Timelines/Milestones
  • 6. The SIMS Partnership Transforming health care delivery 6 Finding(s)/Testing Matrix TestingResult Comments Description Tested By UHN VPN Kevin Tsai Y Cisco Client is not required Connecting to UHN Email using MAPI Client Kevin Tsai Y Authenticating required when launching Outlook (expected outcome for a non-domain device) Connecting to UHN Wireless (corporate) Kevin Tsai Y No issues found Antivirus Software (McAfee for MAC) Kevin Tsai Y The McAfee for MAC has to be purchased if needed Standard Office Application (Office for MAC 2011) Kevin Tsai Y No issues found Lync (Lync for MAC) Kevin Tsai Y No issues found Standard UHN Encryption Software (WinMagic) Daniel Chen N Tested two Macs with SecureDoc 5.3 and it appears the hard drives are fully encrypted with SecureDoc 5.3, however the mandatory encryption policy that applies to UHN managed Windows clients cannot be applied to these two test Macs. One of the observed issues is that WinMagic encryption software tends to be behind the Mac OS update release. Recently WinMagic released SecureDoc 6.1 that offers the full disk encryption that uses the built-in FileVault 2 in Mac OS. Standard MAC native disk encryption (filevault 2) Daniel Chen N Encrypted the internal drive without any issues. Other issues are it does not encrypt the removable media (USB) and the data is not recoverable if user lost the password/key. (JAMF has the ability to insert the corporate key for this particular scenario so the data is still recoverable if the BYOD Mac has enrolled under JAMF) Citrix Kevin Tsai Y Citrix Recevier was tested with the ability to launch standard UHN Citrix Applications. MAC Management/Inventory Suite (JAMF-SCCM like) Kevin/Daniel/Mario/Greg M JAMF (Mac management/reporting/inventory tool) that is not included in the BYOD project charter initially but we feel that it offers great value/assurance that we will need a tool to inventory or even to manage the BYOD Mac devices if needed. Further $ ($6K - JumpStart with the fully functional POC server) required from UHN management’s approval if we want to investigate the product in a deeper level as we have already done the initial POC for the duration of one month. Sunnybrook is currently using the same product to manage their BYOD Mac devices with great success MAC POC Testing Matrix
  • 7. The SIMS Partnership Transforming health care delivery 7 Recommendations/Conclusions Conclusions •MAC does not meet the requirements of our standard corporate security policy and government regulations (Winmagic policy remote push & USB data encryption) •There are financial implications and a separate management infrastructure will be needed if we want to manage MAC. (Estimated $20K CapEx for JAMF Infrastructure, $140/yr/per devices for JAMF, $12K OpEx/yr/per server; antivirus/office & other CALs are extra) Recommendation •MAC should be managed as BYO guideline/corporate IT policy and will be tested during future BYO proof of concepts (e.g. Mobile Data and Application Platform)
  • 8. The SIMS Partnership Transforming health care delivery 8 Questions?