how to make your security ‘aware’ in a byod world - fortinet · 2012-11-13 · 3 fortinet...

31
1 Fortinet Confidential How to Make your Security ‘Aware’ in a BYOD World Graeme Nash Director Strategic Solutions, Fortinet

Upload: others

Post on 29-Mar-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

1 Fortinet Confidential

How to Make your Security

‘Aware’ in a BYOD World Graeme Nash

Director Strategic Solutions, Fortinet

Page 2: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

2 Fortinet Confidential

Security Challenges in a BYOD world 1

What Security is Required? 2

Focus Points

Fortinet Answers Critical BYOD Questions 3

The 4 ‘Must-Have’ BYOD Security Features 4

Why Trust Fortinet? 5

Page 3: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

3 Fortinet Confidential

What Our Customers Say About BYOD

“Users want to bring in their iPads, iPhones and Galaxy S3s … but

we’re not sure how to support them”

“My CFO heard we can save money through BYOD”

“We have to allow patients and guests on our guest network – but how

do we keep the doctor’s data safe?”

“What do I do about the devices not supported by my MDM ie.ROAD?”

“How do I embrace all the potential mobile collaboration productivity and

innovation benefits whilst securing my corporate assets?”

And the most common response…

Page 4: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

4 Fortinet Confidential

What Customers Say About BYOD

Page 5: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

5 Fortinet Confidential

BYOD Challenges: Just the Tip of the Iceberg…

• Device proliferation

• Web connectivity expansion

» Gaming consoles

» Media devices (e.g. TVs)

» Next-generation devices

» “The Internet of Things”

Printers Laptops Tablets Smartphones Scanners

Web-Connected

Media

Video Game

Systems

Specialty Application

Devices

Appliances Web-Connected Toys

Who Knows…

Health & Fitness

• Many web-enabled devices

do not allow installation of

software / agents

• Security features vary from

device to device

Page 6: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

6 Fortinet Confidential

Fortinet Survey (EMEA results):

Gen-Y Workers’ Dependence/Control on Personal Devices

• 73% of respondents in EMEA are already regularly engaging in BYOD

practice

• What statement best sums up Gen-Y attitudes to device usage?

– 52% consider BYOD a right

– 48% consider BYOD a privilege

• What functions couldn’t they live without for more than a day ?

– Private calls – 42%

– SMS – 39%

– Private email – 38%

– Social Media – 23%

• Who is responsible for your device security?

– The user – 74%

– The company – 14%

Page 7: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

7 Fortinet Confidential

Fortinet Survey:

Gen-Y workers attitude towards BYOD corporate policy

Worldwide EMEA APAC US

Yes 36% 27% 47% 29%

No 64% 73% 53% 71%

1-in-3 of respondents would contravene company

policy banning the use of personal device for work purposes

If your employer has/had a policy which prohibits the use of personal

devices in the work environment or for work purposes, have you

/would you ever use a personal device in contravention of this policy?

Page 8: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

8 Fortinet Confidential

Security Challenges in a BYOD world 1

What Security is Required? 2

Focus Points

Fortinet Answers Critical BYOD Questions 3

The 4 ‘Must-Have’ BYOD Security Features 4

Why Trust Fortinet? 5

Page 9: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

9 Fortinet Confidential

Through Corporate Policy

• Complete Denial – Difficult to Enforce

• By Specifying Corporate assets only

(RIM, Citrix, VMWare)

• Endpoint Clients

• Network-based – By behavior on the

network

Page 10: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

10 Fortinet Confidential

Through Mobile Device Management

Gartner MDM Magic Quadrant MDM consists of: *

• Software Mgt.

• Config, backup, updates…

• Network Service Mgt.

• Location, usage…

• Hardware Mgt.

• Provisioning, activation…

• Security Mgt.

• Remote wipe, secure config…

* Gartner Group Magic Quadrant

For Mobile Device Management

Software May, 2012

BUT …..

• Managing the sprawl == $$

• 3 times as many employees consider device

security to be their own responsibility **

** Fortinet Gen-Y BYOD Survey

June, 2012

Page 11: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

11 Fortinet Confidential

It’s All About Mobile Device Connectivity and its Traffic

No Client VPN VPN & 2

Factor

Virtual Desktop (incl VPN

& 2 Factor)

Employee Devices With Mobile Device Management

Corporate Owned Devices

Uncontrolled

Devices

MDM

Client • Mobile Clients

• 2-Factor Authentication

MDM

Client

• Most organizations require a spectrum of solutions

• No perfect solution for all environments

• Trade-offs for each solution

Network Security

Page 12: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

12 Fortinet Confidential

The Network Is The Common Denominator

• The network is THE core element in any approach you take

• The network handles all the traffic, secures it, logs it and reports upon it

• Regardless of what’s on the device

Network (LAN & WAN)

Enterprise Mobile Apps

Mobile Device

Management

Unmanaged Endpoint/

Device

Consumer Mobile Apps

Page 13: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

13 Fortinet Confidential

BYOD Enablement through Network Security

Emily, a customer, needs guest access to

Skype on her iPad while visiting your

headquarters

Bill’s device is infected with malware and he

brings it on the corporate network

Jill is at Starbucks and needs to communicate

and be protected as if she was at HQ.

WiFi Guest Access

Bandwidth

Management

2-Factor Authentication

VPN Tunneling

Antivirus

Page 14: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

14 Fortinet Confidential

BYOD Enablement through Network Security (Cont.)

Sue is in corporate marketing and should

have access to post non-sensitive

information to Facebook, but she should not

be playing Farmville

Joe started streaming movies while at work

through his tablet – this is against corporate

policy

Application Control

Data Leakage

Prevention

Application Control

Ed unintentionally shared a sensitive

company presentation via his personal

Gmail account on his Android Phone.

Data Leakage

Prevention

Page 15: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

15 Fortinet Confidential

Security Challenges in a BYOD world 1

What Security is Required? 2

Focus Points

Fortinet Answers Critical BYOD Questions 3

The 4 ‘Must-Have’ BYOD Security Features 4

Why Trust Fortinet? 5

Page 16: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

16 Fortinet Confidential

Enabling BYOD: The 3 Critical Questions To Ask

1. Who are you?

2. Where do you want to go?

3. What data do you need?

Page 17: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

17 Fortinet Confidential

User ID + Device ID

Identity Policies Sig./MAC Address ID

Device Identification Access Control Security Application

Security Profiles

Awareness

Who Are You? : Device Identity

Page 18: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

18 Fortinet Confidential

Who Are You?

Fortinet provides the answer:

»Connection to corporate LDAP and Radius servers

»Two Factor Authentication (hard and soft tokens) + Client Certificates

»SMS and email based two factor authentication

»Guest provisioning

»Supports range of end user platforms (iPhone, iPad, Android)

Page 19: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

19 Fortinet Confidential

Where Do You Want to Go?

Security on the LAN: • Control of wireless access and

security policies enforcement

• All data flowing to and from

the network is inspected,

logged, and managed through

FortiGate

Retail

Store Home

Coffee Shop

School

Security on the WAN: • Supports 3G, 4G, LTE, Cable

DSL, WiMax

• Connect via VPN & 2-Factor

Authentication agents

(FortiClient & FortiToken)

• All data flowing to and from the

network is inspected, logged,

and managed through FortiGate

Page 20: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

20 Fortinet Confidential

Fortinet Solution Solves BYOD challenge

Data Loss Prevention Prevent mobile users from sending sensitive

data outside the network

Application Control Prevent mobile users from accessing non-

corporate approved applications

AntiMalware Prevent propagation from infected devices

Spam Filtering Protect email regardless of receiving device

Web Filtering Protect mobile users against malicious sites

Traffic Shaping Limit mobile applications to preserve

bandwidth

What Data Do You Need?

Page 21: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

21 Fortinet Confidential

Security Challenges in a BYOD world 1

What Security is Required? 2

Focus Points

Fortinet Answers Critical BYOD Questions 3

The 4 ‘Must-Have’ BYOD Security Features 4

Why Trust Fortinet? 5

Page 22: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

22 Fortinet Confidential

Critical Technology No.1:

Integrating the Wireless Controller into the UTM Gateway

Page 23: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

23 Fortinet Confidential

Critical Technology No.2:

Stronger, BYOD Specific Technical Controls

• Define security controls by:

» Traditional IP address

» Self-learning device identity

» User identity

• Allow (deny) by device type,

username, IP or MAC address

» What you use dictates where you go

• Take your device home

Page 24: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

24 Fortinet Confidential

Critical Technology No.3:

Client Reputation Management

• Find the Bad Guy, avoid the Bad Server

• Reputation built by activity

»What you do, Where you go,

How you get there

»Hosted content

• Drill down report for those with the

worst reputations

»What did they do, Where did they go

»What applications did they run

»Administrator defined thresholds

Page 25: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

25 Fortinet Confidential

Enterprise Authentication Server Identity Management and User Access Control

Critical Technology No.4:

Enterprise Authentication Server

LDAP

User Database

Issuing CA

FortiToken

FortiAuthenticator

Authentication and Authorization

RADIUS, LDAP, 802.1X, EAP-TLS

Two Factor Authentication

FortiToken

Tokenless, via SMS and email

Certificate Management

X.509 Certificate Signing, Certificate Revocation,

SCEP

Remote Device / Unattended Authentication

Fortinet Single Sign on

Active Directory Polling

RADIUS Integration

Page 26: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

26 Fortinet Confidential

Pulling it Together … BYOD’s Core Moving Parts

CLIENT

Wired &

Wireless

Devices

MANAGEMENT &

REPORTING

All data flowing to and from

the network is inspected,

logged, and managed

through the UTM

WIRELESS CONTROL

SECURITY SERVICES

UTM : Unified Threat

Management

ACCESS

POINT

Wired &

Wireless

AUTHENTICATION

SERVICES

Infrastructure-wide

2-Factor Tokens

Token-less

Page 27: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

27 Fortinet Confidential

Summary & Action Plan

Today:

Receive your ‘Yes to BYOD’ and Gen-Y Survey whitepapers at

stand S5 in the ITExpo!

Back at the office:

Validate your BYOD drivers and (fully) quantify benefit!

Review your security infrastructure’s ‘BYOD Core Moving Parts’

Longer Term:

Enhance your BYOD project ‘bang-for-buck’ by securing network

traffic from all sources/clients

Deliver the required granularity of security controls for BYOD

Page 28: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

28 Fortinet Confidential

Security Challenges in a BYOD world 1

What Security is Required? 2

Focus Points

Fortinet Answers Critical BYOD Questions 3

The 4 ‘Must-Have’ BYOD Security Features 4

Why Trust Fortinet? 5

Page 29: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

29 Fortinet Confidential

Fortinet – A Strong Security Player

$434

$39

$80

$123

$155

$212

$252

$325

FORTINET REVENUE ($M)

55% CAGR

Q2’12 Revenue $129 M 25% Y/Y Growth

$13

‘03 ‘04 ‘05 ‘06 ‘07 ‘08 ‘09 ‘10 ‘11

Market Leader

Advanced technology and products • 100+ patents; 110+ pending

Strong global footprint • 1,600+ employees; 30 offices worldwide

Blue chip customer base • 125,000 customers

(including majority of Global 100)

Exceptional financial model • FY11 revenues: $434 M

- 34% YoY growth

• Strong balance sheet: $500M+ in cash

- No debt

Page 31: How to Make your Security ‘Aware’ in a BYOD World - Fortinet · 2012-11-13 · 3 Fortinet Confidential What Our Customers Say About BYOD “Users want to bring in their iPads,

31 Fortinet Confidential

Thank You

www.fortinet.com