Top Banner
Beyond MDM 5 Things You Must Do To Secure Mobile Devices in the Enterprise K Scott Morrison, CTO November, 2012
28

Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

Aug 20, 2015

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

Beyond MDM5 Things You Must Do To Secure Mobile Devices in the EnterpriseK Scott Morrison, CTO

November, 2012

Page 2: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

2

Housekeeping

Questions - Chat any questions you have and we’ll answer them at the end of this call

Twitter - Today’s event hashtag:

- #L7webinar

- Follow us on Twitter:

- @layer7

- @KScottMorrison

facebook.com/layer7

layer7.com/blogs

layer7.com/linkedin

Page 3: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

I already have mobility…

Page 4: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

Change Agent

Page 5: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

Interest in Mobile Security is Increasing

Page 6: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

Old Thinking,New Technology

Page 7: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

Who Owns Mobile?

Page 8: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

Implementation falls to IT

Page 9: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

What is the Classic Security Solution?

Directory

Identity and Access Management (IAM)

VPN

Page 10: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

What can you expect fromMobile Device Management (MDM)?• Device inventory

• Locate device, track device• Network settings, wifi settings• Backup management• Manage synchronization with laptop• Manage access to cloud services (eg: iCloud synchronization)• Device encryption, device wipe, selective wipe, data fading• Password policies, password resets, remote lock• Jailbreak detection, root detection• User communication (notifications, email, SMS, etc)• App inventory, blacklist/whitelist for apps• Private app stores, integration with public app stores and

corporate plans• App configuration provisioning• VPN configuration provisioning, email configuration mgmt.• Roaming policy management

Page 11: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

Is MDM enough?

No. MDM is only half.

Page 12: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

New Thinking,New Technology

Page 13: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

It’s about the app

Page 14: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

The Challenge is to Give Mobile Apps Access to Enterprise Data Securely

Firewall

Enterprise Network

Internal Server

Directory

Page 15: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

The Real Owners are App Developers

Page 16: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

New Challenges

Page 17: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

15458617-7813-4a37-94ac-a8e6da6f6405

?

A

A person?

Or an app?

Identity is the Crux Issue

Page 18: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

The New Roles

API Client Developers

API Server DevelopersExternal Internal

Page 19: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

A Fundamental Shift is Occurring

The Old Enterprise The New Mobile Enterprise

This is the secret to achieve scale and agile federation

Page 20: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

What About Data in Transit?

Firewall

Enterprise Network

Internal Server

Directory

Page 21: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

Or Data on the Device?

Silos

App layer

Persistence layer

Page 22: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

Strategies

Page 23: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

Mobile Access Gateway

Firewall

Enterprise Network

API Server

API Client

API Proxy

Security Admin

Page 24: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

API Developer Portal

Firewall

Enterprise Network

API Server

API Client

iPhone Developer

API Portal

API Proxy

Page 25: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

Client Libraries

Firewall

Enterprise Network

API Server

API Proxy

Security Admin

Do SSL right Make OAuth easy Manage sessions automatically

Page 26: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

The 5 Things You Must Do To Secure Mobile Devices In The Enterprise

1. Start with MDM, but layer application security services over it.

2. Integrate mobile apps and enterprise data using APIs.

3. SSL everywhere.

4. Authenticate users, authorize apps.

5. Avoid local storage.

Page 27: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

November 2012

K. Scott MorrisonChief Technology Officer

Layer 7 Technologies1100 Melville St, Suite 405Vancouver, B.C. V6E 4A6Canada(800) 681-9377

[email protected]://www.layer7.com

For further information:

Page 28: Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise

Picture Credits

New Moon Seen Through a Telescope by mkrijgsman – stock.exchg

Band silhouettes by mr_basmt– stock.exchg