SlideShare a Scribd company logo
Mobile Device Security
Crafting a mobile device strategy that fits your organization’s
                   needs while protecting information assets
Mobile Device Trends
 Smartphone shipments in 2012 are projected to be at
  around 631 million units, up from 468 million in 2011

 Tablet sales in 2012 are expected to nearly double last
  year’s tally of 60 million, at 119 million units

 Apple’s iPad platform is expected to account for 60% of
  those tablet sales

 PC hegemony over the market as the primary computing
  device in business is being challenged
Frequently forgotten factoids
about mobile devices
 They’re little computers; processor, memory and
  storage, just like the desktop or laptop PC in your office

 A would-be thief is more likely to steal a smartphone or
  tablet than a laptop

 If your device is stolen, and lacks both a passcode/PIN
  and data encryption, whatever’s on the device might as
  well be posted on Facebook

 Without a means to remotely manage a device, you
  have NO recourse in protecting/erasing sensitive data,
  should the device be lost or stolen
Mobile Device Security:
Key Considerations
 Will my company furnish the devices, or will we allow
  BYOD (Bring Your Own Device)? What about both?

 Where will sensitive data reside? On the server(s) or on
  the device itself?

 How is the information accessed?
Company-furnished devices
 Cost for cellular service and repair/replacement of
  lost/damaged phones is generally borne by the company

 Makes sense for organizations that publish the mobile
  phone number of these devices in the phonebook, on
  websites or in marketing materials

 Be as draconian as you’d like in managing these devices
  (they’re property of the company). No Facebook,
  Twitter, YouTube, etc.; just business. Erase at will if
  necessary.
BYOD (Bring Your Own Device)
 employees use their personal smartphones/tablets to
  access email and applications, which they're already
  familiar with (little to no training)

 employees bear the cost of service and
  repair/replacement when necessary

 a more measured approach to governing the encryption
  of information stored on the device, and the recourse
  with which to protect the data should the device
  become lost or stolen
BYOD cont’d
Example: An employee uses his/her personal device to
access company email, where sensitive information
sometimes crosses. Whereas a company-provided device
could be erased without question, an employee's BYOD
likely has personal contacts, personal email, music, etc. A
mobile device strategy should outline clear boundaries as
to how far a company can go to protect its data. In this
case, a mobile device policy could be designed in such a
way, that only the company email access for that device is
revoked, and the data removed, with no impact to other
apps/services on the device.
Company-furnished device versus
BYOD conclusion
 Different levels of device management can be applied
  to both classifications of device, whether you want to
  completely lock the device down, or you want the user
  to freely use the device as he/she wishes, as long as the
  device meets security requirements
Where the data resides
 Server: This is always preferable to any sensitive
  information residing on the device. Risks of data
  compromise are mitigated through PIN/password
  enforcement, and revocation of access to applications,
  services and data can be easily revoked on the server.
  More on this later.
 Device: We strongly discourage saving sensitive
  information on mobile devices, but if it can't be
  avoided, more stringent password/PIN requirements and
  encryption, coupled with the ability to erase the device
  in the event it's lost or stolen, protects against losses on
  this front.
How the information is accessed
 Email: Through mobile device management, we can encrypt
  data as it's stored on the device, revoke email access when
  warranted, and protect access to the device with passcodes
  or PINs.

 Desktop applications: Using technologies such as Citrix
  XenApp or Microsoft RemoteApp/Remote Desktop, we can
  provide secure access to programs and data residing on the
  server, without any of that information actually being stored
  on the mobile device. This is the preferred method for
  accessing your line-of-business apps. The actual processing of
  data resides on the server at all times, and you're simply
  viewing/interacting with it on your tablet or smartphone.
How the information is accessed
cont’d
 Web applications/webclips look and act like apps, but
  are really websites that are optimized for viewing on
  your mobile device. Similar to the Citrix/Terminal
  Services method for accessing apps and data, the data
  does not get stored on the mobile device, but instead
  just viewed. Transactions still take place on the server.
Wrap-up
Though the rapid adoption of mobile devices had initially
provided flexibility and opportunities for businesses, it's
also opened up businesses to old fashioned computer
security risks, just on a newer class of devices. The
methodology for securely incorporating these devices,
whether company-owned or personally owned, is taking
shape and should become a part of your overall IT
strategy, in the same way you'd secure a desktop or laptop
computer.

More Related Content

What's hot

Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
Demand Metric
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
Solix Technologies, Inc
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
Patrick Angel - MBA, CISSP(c) CISM(c) CRISC(c) CISA(c)
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
Freeform Dynamics
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
Rebecca Jones
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur gupta
Aankur Gupta
 
Intranets and Extranets
Intranets and ExtranetsIntranets and Extranets
Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!
Mike Brannon
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
cloudresearcher
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
genasun
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
Bharath Rao
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
Editor IJMTER
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
Clearnetwork
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networks
Hyker Security
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
Murray Security Services
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Xavier Mertens
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET Journal
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
Dr. Michael Agbaje
 

What's hot (19)

Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur gupta
 
Intranets and Extranets
Intranets and ExtranetsIntranets and Extranets
Intranets and Extranets
 
Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
Byod
ByodByod
Byod
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networks
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 

Similar to Mobile Device Security

Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
Icomm Technologies
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
Rihab Chebbah
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Mobiloitte
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
iValue Systech Pvt Ltd
 
Backstopp Mobile Slides
Backstopp Mobile SlidesBackstopp Mobile Slides
Backstopp Mobile SlidesRegan McCarthy
 
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
Kyron Baxter
 
Mobile Phone & Tablet Support
Mobile Phone & Tablet SupportMobile Phone & Tablet Support
Mobile Phone & Tablet SupportFelix Yanko
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
Softweb Solutions
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
Array Networks
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
Icomm Technologies
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 

Similar to Mobile Device Security (20)

Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
Backstopp Mobile Slides
Backstopp Mobile SlidesBackstopp Mobile Slides
Backstopp Mobile Slides
 
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
 
Mobile Phone & Tablet Support
Mobile Phone & Tablet SupportMobile Phone & Tablet Support
Mobile Phone & Tablet Support
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
880 st011
880 st011880 st011
880 st011
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 

More from nexxtep

Password Management Tips
Password Management TipsPassword Management Tips
Password Management Tips
nexxtep
 
5-Step Email Marketing Plan
5-Step Email Marketing Plan5-Step Email Marketing Plan
5-Step Email Marketing Plan
nexxtep
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...nexxtep
 
10 Tips and Tricks Every iPhone and iPad User Should Know
10 Tips and Tricks Every iPhone and iPad User Should Know10 Tips and Tricks Every iPhone and iPad User Should Know
10 Tips and Tricks Every iPhone and iPad User Should Know
nexxtep
 
The Modern Office
The Modern OfficeThe Modern Office
The Modern Office
nexxtep
 
iPhone and iPad Tips and Tricks
iPhone and iPad Tips and TricksiPhone and iPad Tips and Tricks
iPhone and iPad Tips and Tricks
nexxtep
 

More from nexxtep (6)

Password Management Tips
Password Management TipsPassword Management Tips
Password Management Tips
 
5-Step Email Marketing Plan
5-Step Email Marketing Plan5-Step Email Marketing Plan
5-Step Email Marketing Plan
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
 
10 Tips and Tricks Every iPhone and iPad User Should Know
10 Tips and Tricks Every iPhone and iPad User Should Know10 Tips and Tricks Every iPhone and iPad User Should Know
10 Tips and Tricks Every iPhone and iPad User Should Know
 
The Modern Office
The Modern OfficeThe Modern Office
The Modern Office
 
iPhone and iPad Tips and Tricks
iPhone and iPad Tips and TricksiPhone and iPad Tips and Tricks
iPhone and iPad Tips and Tricks
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Mobile Device Security

  • 1. Mobile Device Security Crafting a mobile device strategy that fits your organization’s needs while protecting information assets
  • 2. Mobile Device Trends  Smartphone shipments in 2012 are projected to be at around 631 million units, up from 468 million in 2011  Tablet sales in 2012 are expected to nearly double last year’s tally of 60 million, at 119 million units  Apple’s iPad platform is expected to account for 60% of those tablet sales  PC hegemony over the market as the primary computing device in business is being challenged
  • 3. Frequently forgotten factoids about mobile devices  They’re little computers; processor, memory and storage, just like the desktop or laptop PC in your office  A would-be thief is more likely to steal a smartphone or tablet than a laptop  If your device is stolen, and lacks both a passcode/PIN and data encryption, whatever’s on the device might as well be posted on Facebook  Without a means to remotely manage a device, you have NO recourse in protecting/erasing sensitive data, should the device be lost or stolen
  • 4. Mobile Device Security: Key Considerations  Will my company furnish the devices, or will we allow BYOD (Bring Your Own Device)? What about both?  Where will sensitive data reside? On the server(s) or on the device itself?  How is the information accessed?
  • 5. Company-furnished devices  Cost for cellular service and repair/replacement of lost/damaged phones is generally borne by the company  Makes sense for organizations that publish the mobile phone number of these devices in the phonebook, on websites or in marketing materials  Be as draconian as you’d like in managing these devices (they’re property of the company). No Facebook, Twitter, YouTube, etc.; just business. Erase at will if necessary.
  • 6. BYOD (Bring Your Own Device)  employees use their personal smartphones/tablets to access email and applications, which they're already familiar with (little to no training)  employees bear the cost of service and repair/replacement when necessary  a more measured approach to governing the encryption of information stored on the device, and the recourse with which to protect the data should the device become lost or stolen
  • 7. BYOD cont’d Example: An employee uses his/her personal device to access company email, where sensitive information sometimes crosses. Whereas a company-provided device could be erased without question, an employee's BYOD likely has personal contacts, personal email, music, etc. A mobile device strategy should outline clear boundaries as to how far a company can go to protect its data. In this case, a mobile device policy could be designed in such a way, that only the company email access for that device is revoked, and the data removed, with no impact to other apps/services on the device.
  • 8. Company-furnished device versus BYOD conclusion  Different levels of device management can be applied to both classifications of device, whether you want to completely lock the device down, or you want the user to freely use the device as he/she wishes, as long as the device meets security requirements
  • 9. Where the data resides  Server: This is always preferable to any sensitive information residing on the device. Risks of data compromise are mitigated through PIN/password enforcement, and revocation of access to applications, services and data can be easily revoked on the server. More on this later.  Device: We strongly discourage saving sensitive information on mobile devices, but if it can't be avoided, more stringent password/PIN requirements and encryption, coupled with the ability to erase the device in the event it's lost or stolen, protects against losses on this front.
  • 10. How the information is accessed  Email: Through mobile device management, we can encrypt data as it's stored on the device, revoke email access when warranted, and protect access to the device with passcodes or PINs.  Desktop applications: Using technologies such as Citrix XenApp or Microsoft RemoteApp/Remote Desktop, we can provide secure access to programs and data residing on the server, without any of that information actually being stored on the mobile device. This is the preferred method for accessing your line-of-business apps. The actual processing of data resides on the server at all times, and you're simply viewing/interacting with it on your tablet or smartphone.
  • 11. How the information is accessed cont’d  Web applications/webclips look and act like apps, but are really websites that are optimized for viewing on your mobile device. Similar to the Citrix/Terminal Services method for accessing apps and data, the data does not get stored on the mobile device, but instead just viewed. Transactions still take place on the server.
  • 12. Wrap-up Though the rapid adoption of mobile devices had initially provided flexibility and opportunities for businesses, it's also opened up businesses to old fashioned computer security risks, just on a newer class of devices. The methodology for securely incorporating these devices, whether company-owned or personally owned, is taking shape and should become a part of your overall IT strategy, in the same way you'd secure a desktop or laptop computer.