Top Banner
Mobile Device Security The next challenge Jan Guldentops ( [email protected] ) BA N.V. ( http://www.ba.be )
18
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Mobilemonday b2b   b-asecurity

Mobile Device SecurityThe next challenge

Jan Guldentops ( [email protected] )BA N.V. ( http://www.ba.be )

Page 2: Mobilemonday b2b   b-asecurity

About BA

More information

Page 3: Mobilemonday b2b   b-asecurity

Information Integrationi

Page 4: Mobilemonday b2b   b-asecurity

Our Commitment Ask our partners

Page 5: Mobilemonday b2b   b-asecurity

Our Commitment Ask our clients

Public Sector/Government

Non-profit

Enterprise

Association Vincotte Nuclear, Idewe, Handicap international, Jeugd en Stad Vzw)

Hamburger Mannheimer, Didak Injection, Credimo, Nollekens (PGZ International), Altrad Havico, Paratel, Sodexo, Securex

Vlaams Parlement, Leuven, Hasselt, Boom, Overpelt, Mortsel, Ranst, Lummen, Olen, St-Katelijne-Waver, Kasterlee, Oud-Turnhout, OCMW Kontich, PZ Noord, Balen, Schoten, Zwijndrecht, KBR

Page 6: Mobilemonday b2b   b-asecurity

Information Integration BA’s infrastructure for:

Digitisation

SecurityMobility

VirtualisationData Storage and Warehousing

Data Protection and Integrity

Digital Preservation and Archiving

Data Access and Portability

Page 7: Mobilemonday b2b   b-asecurity

Traditional Security-model is gone forever

There is no perimeter anymore...

Users are accessing data/app(lication)sFrom everywhere

From all kinds of devices

Page 8: Mobilemonday b2b   b-asecurity

There are no sure bets in the mobile device market

King today, beggar tomorrow(e.g. RIM, Nokia)

What will happen to Apple now Steve is dead ?

Will Nokia rise from the grave by selling its soul to the devil ?

Page 9: Mobilemonday b2b   b-asecurity

End-user rules...

ICT/security has to follow not lead

End-user decides which (cloud) apps/device he or she is going to use

Wants to have that sexy device that fiits his personality...

Page 10: Mobilemonday b2b   b-asecurity

BYOD

Bring your own device

Let users buy their own phone, tablet or laptop

Make IT support it

Page 11: Mobilemonday b2b   b-asecurity

Most secure devices

1. Blackberry 2. iOS

3. Symbian 4. Android

5. Windows Phone

Page 12: Mobilemonday b2b   b-asecurity

Armsrace

The security feature list is continuously evolving version by version.

IOS5 and Android 4 look very promising

Windows Phone is too early days

Security should be in the device OS itself and not added by extra software

Page 13: Mobilemonday b2b   b-asecurity

Mobile security = big business

All antivirus vendors have a mobile solutionKaspersky (not for Ios), Gdata & Symantec (only android), etc.

Lots of mobile device management platforms out there

Mobile Iron, Zenprise, Good technologies, Kaspersky

Page 14: Mobilemonday b2b   b-asecurity

Problems to fear / fix

DATA LEAKAGEEncrypt / remote wipe

Don't store confidential data on the device

MALWAREUpdate your os

Control the dev community / signingWalled gardens / sandboxes

Page 15: Mobilemonday b2b   b-asecurity

Problems to fear / fix (2)

STRONG AUTHENTICATIONPassword policiesBetter: certificates

CONTROLControll the apps/usage of your endusers

BACKUPS

Page 16: Mobilemonday b2b   b-asecurity

Conclusions

The ghost is out of the bottle, no way back Go for a crossplatform solution

Control what you can controlBYOD will happen so prepare for it

Page 17: Mobilemonday b2b   b-asecurity

Conclusions

First you need a good policyWhat level of security do you want/have to accomplish?

Riskanalysis – is this possible ?Plan for the worse

Then find the tools to do itFirst tool is common sense (be smart)

Look at the management solutions

Page 18: Mobilemonday b2b   b-asecurity

Thank YouContact us

016/29.80.45

016/29.80.46

www.ba.be

Vaartdijk 3/501 B-3018 Wijgmaal, Belgium

[email protected]

www.ba.bewww.ba.be

Twitter: JanGuldentops