se-4060, securing the mobile world, by norman shaw and john pragnell

24
Protec’ng Mobile Data Norman Shaw CEO ExactTrak Ltd

Upload: amd-developer-central

Post on 07-Jul-2015

373 views

Category:

Technology


1 download

DESCRIPTION

Presentation SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell at the AMD Developer Summit (APU13) November 11-13, 2013.

TRANSCRIPT

Page 1: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Protec'ng  Mobile  Data

• Norman  Shaw    • CEO  

•  ExactTrak  Ltd  

Page 2: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Discussion  points

• Why  protec9ng  mobile  data  is  difficult  ?  • What  is  going  wrong  ?  • What  can  be  done  ?  • Address  the  differing  needs  of  enterprise  and  consumer  •  Some  innova9ve  solu9ons    • Maximise  the  commercial  opportuni9es    • A  glimpse  into  the  future  

Page 3: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

There  are  a  lot  of  good  solu'ons:  

but  s9ll  there  are  problems  

Page 4: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Polarised  Target  Markets  

Enterprise  

Consumer  

Restricts  freedom  of  use   Not  secure  enough  for  enterprise  

Page 5: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Just  some  of  the  problems

•  76%  have  lost  a  laptop,  tablet  or  mobile  with  sensi9ve  data      •  84%  use  personal  emails  to  send  sensi9ve  informa9on    •  50%  use  public  cloud  services  to  send  sensi9ve  files    • More  than  30%  have  lost  a  USB  drive  containing  confiden9al  informa9on      •  63%  of  IT  managers  lack  visibility  of  mobile  data  within  their  organisa9on      

Wall  Street  Journal  Aug  2013    5000  interviews    

Page 6: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

and  then  there  is  ….  

B    Y    O    D  

 50%  of  firms  with  BYOD  policies  have  had  a  security  breach    32%  do  not  have  a  BYOD  contract      40%  don’t  password-­‐protect  their  mobile  devices    51%  connect  their  devices  to  unsecured  wireless  networks    52%  enable  their  “Bluetooth  discoverable”  mode.        Dell  survey  2013    

ring  

isaster  

wn  

our  

Page 7: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Legal  issues

• Who  owns  the  data    • Who  has  control    • What  are  my  rights    • Rights  to  walk  away  

• Right  to  delete      

Page 8: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Dele'ng  data

1881  devices  lost.    680  recovered  Remote  delete  requests  

       Recovered    %  deleted  

•  iOS          317          43%  

• Android          193            57%  

• Blackberry    170          61%  

Page 9: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

What  are  we  protec'ng?

Enterprise  data    Personal  informa9on    Hardware    Reputa9ons  

all  of  the  above?  

Page 10: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

What  are  we  protec'ng  data  from?

• Employees      

• Stupidity  • Ignorance  • Loss  • Thec  • Fraud  

Page 11: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Privacy  

• We  know  what  you  are  doing  

• Who  can  see  my  files    • Prism  

Page 12: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Consumer  vs.  Enterprise

•  Twin  approach  strategy  

•  Something  for  everyone  

Page 13: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Obstacles  to  overcome

• Opera9ng  system  

• Updates  cause  problems  

• Roo9ng  

• Reset  

Page 14: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

What  is  needed

•  Easy  to  use  

•  Addresses  Enterprise  and  consumer  needs  

• Mul9  plaeorm  

• Mul9  form  factor  

•  Deployment      Secure      and  Flexible  

• Make  the  user  part  of  the  solu9on    

Page 15: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Security  Guardian

4  -­‐64  GB  memory   Secure    laptop  Access  GPS  

Ba9ery  

Data  Delete   Memory  Switch   Remote  Control  

EncrypBon  

Page 16: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Management  console

• Cloud  based  • Management  &  user  interface  •  Loca9on  via  GPS,  GSM  &  WiFi  • Geozones  •  Timed  access  • OTA  configura9on  • Remote  turn  On  and  Off  • Remote  data  destruct  • Verifiable  audit  trail  and  repor9ng  

Page 17: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Moving  forward

Page 18: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

GeJng  on  the  Route  of  Trust

Trusted  Execu9on  Environment    

Page 19: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

A  power  train

Page 20: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

The  ExactTrak  approach

Home   Work  

Enterprise  Personal  

Access  privileges  VPN  Profiles  Apps  Email  Files  etc.    

Page 21: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Ticking  the  boxes  

• Route  of  Trust  starts  at  power  On    • Opera9ng  System  independent    •  Total  separa9on  of  work  /personal  informa9on    •  Individual  keys  to  protect  privacy  

Page 22: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Commercial  opportuni'es

How  many  products  with  TrustZone            Sold  as  a  service  License  Management  Console  licenses  Corporate  /  Enterprise    user  licenses  Consumer  user  licenses  Upgrades  depending  on  service  /  func9on    White  label,  OEM  and  bespoke  customisa9on  Ac9va9on  fee  for  ODM  /  OEM  Partnership  with  exis9ng  MDM  service  providers      

300m    and  growing  ?  

Page 23: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Future

•  Embedded  GSM  modem  for  any9me    security  

•  Self  provisioning  SIM  on  chip    •  Informa9on  Lifecycle  Management    • Remote  Key  Management    • Wearable  gadgets  

 

Page 24: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell

Discussion  points

• Why  protec9ng  mobile  data  is  difficult  ?  • What  is  going  wrong  ?  • What  can  be  done  ?  • Address  the  differing  needs  of  enterprise  and  consumer  •  Some  innova9ve  solu9ons    • Maximise  the  commercial  opportuni9es    • A  glimpse  into  the  future