team g-force: jason, veronica, doug and socrates multiple device authentication for the cloud msit...
TRANSCRIPT
Team G-Force: Jason, Veronica, Doug and Socrates
Multiple Device Authentication for the CloudMSIT 45811.17.12
11.17.12 2Team: G Force
Multiple Device Authentication for the Cloud
Trudy
WorkBlackberry
Personal IPhone
WorkDesktop
Personal Ipad
Personal Dell Laptop circa 2011
with Windows 2010
Work Dell Laptop circa 2009
with Windows 2007
11.17.12 3Team: G Force
When we started doing research for our project, we found that this scenario was taking place all over the world
11.17.12 4Team: G Force
The Change of Mobile Devices in the WorkplaceBS (before smartphones)The promise of productivity improvements quickly spread to the corporate world and employees were systematically armed with cell phones and PCs.Now employees could be contacted and work from anywhere Blackberries were the only game in town
AS (after smartphones)Corporations didn’t see the need to upgrade their employees to smartphonesSo people brought their personal smartphone to the office The smartphone was the new rock starA paradigm shift is taking place
BlackBerry 850 was the first BlackBerry
device introduced in 1999.
Paradigm Shift Takes Place
11.17.12 5Team: G Force
At first IT turned a blind eye to the use of personal devices in the workplace until the impact of this trend became to great to ignore
11.17.12 6Team: G Force
Personal Routers Polluting NU Wireless Network
Northwestern students are coming tocampus more tech-savvy than ever before and with more wireless-ready devices.
Students setting up unauthorized personal wireless routers and access points in the Residence Halls are impacting wireless service.
“This is creating conflicts and service challenges for others using the Northwestern Wi-Fi network,” said Wendy Woodward, director of NUIT Technology Support Services. “We strongly recommend that students access the Northwestern wireless network directly and contact the NUIT Support Center if they have questions or
11.17.12 7Team: G Force
Instead of continuing to ignore the personal devices that employees were bringing into the workplace, a trend has began to emerge called:o BYOD: Bring Your Own Deviceo BYOT : Bring Your Own Technology
BYOD means that companies allow employees to use their own personal devices in the workplace instead of those issued by their company.
It is estimated that 90% of companies will offer BYOD by 2014
Introduction of BYOD
11.17.12 8Team: G Force
The Benefits of BYOD
The biggest benefit of allowing BYOD is employee satisfaction
Exposure to cutting edge technology
No more slow technology refresh and upgrade cycles
Here are just a few benefits:
11.17.12 9Team: G Force
Problems with BYODCompanies must think and plan before they jump on the BYOD bandwagonThe modification of corporate policy is the first thing to consider out before any changes• IT will need to be present! • Which devices will be permitted?• Will individuals have to take more responsibility
for trouble shooting and support• Who pays for the device?• What about the cloud?
There are many more considerations, some of which will be covered later in the presentation.
11.17.12 10Team: G Force
Cloud Computing is the latest buzz word:It sounds sexy, new and modernIt promises cost savings in a down economyIt brings its own privacy and security concernsWhen considered in conjunction with BYOD there is much to discuss!
Current: Old School…
User IDPassword SSL
11.17.12 Team: G Force
11.17.12 12Team: G Force
Implementation ArchitectureTAC Client
TAC Client
TAC Gateway
Gateway Architecture
11.17.12 13Team: G Force
How does it work?
11.17.12 14Team: G Force
First Packet Authentication occurs BEFORE connection is established.
How do we do it?
11.17.12 15Team: G Force
11.17.12 16Team: G Force
A more elegant solution : Authenticate the device before any data is transmitted!
Can our product allow us to compete with these companies?
Should we?
11.17.12 17Team: G Force
– Acceptable use policy on personal devices is difficult to manage
– Compliance mandates must still be followed (PCI, HIPAA, GLBA) if this data is accessed on BYOD• Incident detection & breaches
– Securing corporate and personal data from malware and malicious apps
– Shared device and auto-login
* Good Technology State of BYOD Report, Jan 2011
Security Risks
11.17.12 18Team: G Force
Productivity BenefitsBenefits Using BYOD can result in savings of up to $80 / mo / user* Mobility yields higher productivity benefits
Type of Worker Activity Value
Executive Collaboration $1,300
Field Sales Customer Face Time $700
Knowledge Worker Productivity $300
* Good Technology State of BYOD Report, Jan 2011
11.17.12 19Team: G Force
Legal Risks
Privacy & LiabilityCorporate device Employers have 100% access to data per SCOTUSPersonal device Employers do not necessarily have access rights to data
Medical informationPersonal picturesYour location
Confidentiality + Trade SecretsTrade secrets are no longer secret on personal devices
E-Discovery and electronic evidenceIntegrity – destruction of personal data via remote commandIntellectual Property ownership
11.17.12 20Team: G Force
Business Benefits Operating Expenses – no more data plans on income statement
Capital Expenses – no more devices on income statementFact: This is how people want to work
Who wants to carry personal and work devices?Recruitment of young talentIncrease of mobile productivity
11.17.12 21Team: G Force
Solution that fits many different business segments
“BlackRidge is thrilled to be working with Sypris Electronics on integrating our TAC technology within the Sypris key management framework,”
- Bob Graham,
Chairman and CEO of BlackRidge Technology.
“We believe the combined solution will give government customers an unparalleled level of protection.”
- Bob Graham, Chairman and CEO of BlackRidge Technology.
11.17.12 22Team: G Force
How to manage personal devices in the enterprise…
1. Create Thy Policy Before Procuring Technology2. Seek The Flocks’ Devices3. Enrollment Shall Be Simple4. Thou Shalt Configure Devices Over the Air5. Thy Users Demand Self-Service6. Hold Sacred Personal Information7. Part the Seas of Corporate and Personal Data8. Manage Thy Data Usage9. Monitor Thy Flock—Herd Automatically10. Drink from the Fountain of ROI
By Rob Patey, art by Nathan Salla
11.17.12 23Team: G Force
Back – UpSlides
Multiple Device Authentication for the Cloud
Trend in Mobile Device Ownership
11.17.12 24Team: G Force
~235,000,000
11.17.12 25
Demographics of Smartphone Owners
11.17.12 26Team: G Force
Workplace Reality