secure your mobile content!

21
Best Practices for Securing Mobile Content Mike Brannon, National Gypsum

Upload: mike-brannon

Post on 09-May-2015

265 views

Category:

Technology


5 download

DESCRIPTION

Embrace BYOD - Help your customers be more productive and use their mobile device of choice. At the same time be VERY SECURE - manage your mobile content!

TRANSCRIPT

Page 1: Secure Your Mobile Content!

Best Practices for Securing Mobile ContentMike Brannon, National Gypsum

Page 2: Secure Your Mobile Content!

National Gypsum Company is a fully integrated building products manufacturer

Headquartered in Charlotte, NC with mines and quarries, and manufacturing plants across North America

Page 3: Secure Your Mobile Content!

Charlotte Metro ISSA

Email us at [email protected]

Twitter: @cltissa

http://www.charlotteissa.org/

ISSA local chapter delivers excellent and low cost Security Training, hosts an annual Summit event and sponsors UNCC scholarships

Quarterly gatherings to share practices and network – support from sponsor / partners for meetings

Please Join Us!

Page 4: Secure Your Mobile Content!

44

Page 5: Secure Your Mobile Content!

5

Definition…Mobile First organizations

embrace mobility as their primary IT platform in order to transform

their businesses and increase their competitiveness

Content of all types is easily and securely

available on any device

CONTENT

End users choose their devices

Security is invisible to end users

User experience is the #1 design criteria

USER EXPERIENCES

New apps are developed and delivered

to mobile devices first

Core business processes can be performed on any

device

APPLICATIONS

In a Mobile First Company…

Page 6: Secure Your Mobile Content!

66

Traditional enterprise security

6

Firewall& VPN

Page 7: Secure Your Mobile Content!

77

The perimeter is gone

Copy/Paste

Open-in

Forward

Alexander Romero
To be done: Discuss with Jesse that the network permiter is gone, the problem is different.
Page 8: Secure Your Mobile Content!

88

The more the CIO says no, the less secure the organization becomes.

Vivek Kundra, Former U.S. Federal CIO

Responsible, not restrictive

Mike Brannon, National Gypsum

Page 9: Secure Your Mobile Content!

99

Securing data-at-rest

Page 10: Secure Your Mobile Content!

1010

Open In

Copy

SaveView

SharePoint documents

Open In

Copy

SaveView

Email attachments

MobileIron Confidential10

Secure your document repositories

• Solve “open in” problem • Store documents securely on device• Control cut / copy / paste actions• Selectively wipe documents• Prevent unauthorized distribution

• Control end-to-end with policy• Leverage existing content repositories• Prevent use of unauthorized tools –

– DropBox for example

Open In

Copy

SaveView

Box shared documents

Page 11: Secure Your Mobile Content!

1111

Securing email attachments

11

Email App Secure Content Viewer

Email with Attachment

REMOVE

Page 12: Secure Your Mobile Content!

1212

Colligo App Viewer

Securing SharePoint

12

REMOVE

Sharepoint

Page 13: Secure Your Mobile Content!

1313

Closed-loop actions when compromised

13

Remediation

Notify

BlockQuarantine

Closed-loop actions

• Notify user and admin• Prevent access• Remove saved files• Remove SharePoint config• Protect enterprise persona

MobileIron Confidential

Page 14: Secure Your Mobile Content!

1414

National Gypsum Implementation

• Risks / Threats Addressed:– Loss of Company Data / Lost Devices / Departing Employees– All Devices and Users Registered / Security Policies Enforced– Ease of Use for Employees AND Improved Security & Efficiency

• What We Deployed (And Timeline)– MobileIron device (VSP) and support (Sentry) – All Smartphones– Blackberry (now gone), Apple iOS and Android Devices– Push Secure WiFi Config to Minimize Data Use On Premise– Rush To Adopt iPads – From 0 to 100’s of Devices!– More than email access! Apps for SharePoint and Data!– Manage “Allowed” and “Disallowed” Settings / Apps (DropBox)– Leverage Internal PKI and Push Webclips – Deliver Data

Page 15: Secure Your Mobile Content!

1515

• Where Are We Now?– BES Retired – 70% iOS, 25% Android, 5% Windows Devices– iPad is currently only supported Tablet – Testing others (Surface?)– Plans to allow Windows 8 and MAC OS/X BYOD – Colligo Briefcase for SharePoint Document Access– BOX for External Data Sharing with Partners– Two Apps Deployed on iOS with “One Tap For Data”

• Certificates delivered to Device and to User (SCEP/MobileIron)• Invisible Authentication via Juniper Secure Access• IIS Web Server & Application Configuration – “Last Seen User State”• HTML5 / JavaScript to deliver SQL and Mainframe Data

National Gypsum Implementation

Page 16: Secure Your Mobile Content!

1616

National Gypsum Implementation

Page 17: Secure Your Mobile Content!

1717

Best practices for mobile content DLP

17

Closed-loop compliance

Continuous management

OS integrity

OS versioning

Passcode / encryption

Auto-wipe

Identity

Secure tunnel

Attachment protection

Secure content hub

Role of cloud

Credible ecosystem

MobileIron Confidential

Page 18: Secure Your Mobile Content!

1818

Security considerations 2013+ …

“No” not a sustainable option -> provide credible alternatives

Massive content ecosystem -> crowd-source but don’t lock-in

Uncertain economics -> establish “help-yourself-desk”

Dynamic risk at endpoint -> automate your mobile trust model

Content always one-click from cloud -> co-habitate responsibly

Blurring between content and app -> explore new forms

Page 19: Secure Your Mobile Content!

1919

Content doesn’t exist in isolation

Enterprise Mobile Persona

Native experience

Data separation

Shared policy Selective wipe

Secure communications

Email

Apps Certs

Policy

Content

Federated identity

Page 20: Secure Your Mobile Content!

2020

Journey to the Mobile First Enterprise

Device SecurityBYOD (user choice)Email access (secure ActiveSync)Multi-OS security (BlackBerry replacement)

App & Content Enablement

1st gen of mobile appsMobile docs (SharePoint)Cloud protections

Business Transformation

New user & business experiences

Page 21: Secure Your Mobile Content!

Thank you Mike Brannon ([email protected]

http://www.charlotteissa.org/

ISSA local chapter delivers excellent and low cost Security Training, hosts an annual Summit event and sponsors UNCC scholarships

Please Join Us!