38
Telenet for Business Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager

Mobile & Security?

  • Upload
    koen

  • View
    34

  • Download
    2

Embed Size (px)

DESCRIPTION

Mobile & Security?. Brice Mees Security Services Operations Manager. Agenda. Mobile Trends Where to start? Risks and Threats Risk mitigation Conclusion. Agenda. Mobile Trends Where to start? Risks and Threats Risk mitigation Conclusion. The mobile era. The Mobile-First Era. - PowerPoint PPT Presentation

Citation preview

Page 1: Mobile & Security?

Telenet for BusinessTelenet for Business

Mobile & Security?Brice MeesSecurity Services Operations Manager

Page 2: Mobile & Security?

Agenda Mobile Trends Where to start? Risks and Threats Risk mitigation Conclusion

Page 3: Mobile & Security?

Agenda Mobile Trends Where to start? Risks and Threats Risk mitigation Conclusion

Page 4: Mobile & Security?

The mobile eraThe PC/Web Era The Post-PC EraThe Mobile-First Era

Page 5: Mobile & Security?

"Apps Storm" VS "Security"

Page 6: Mobile & Security?

Looks suspicious?

Ready to accept unmanaged deviceson your network?

Page 7: Mobile & Security?

BYOD Trend Devices become cheaper and more powerful The Generation “Y” Company owned devices are sometimes old-

fashioned Will you allow personal devices on your network ? What are the risks ?

Page 8: Mobile & Security?

Agenda Mobile Trends Where to start? Risks and Threats Risk mitigation Conclusion

Page 9: Mobile & Security?

Understand Enterprise Objectives

“If you don’t know where you are going, any road will get you there”

– Lewis Caroll

Page 10: Mobile & Security?

Start from your requirements

Your Business

Your Management

Information Technology

Page 11: Mobile & Security?

Create a Mobile Security Policy

Page 12: Mobile & Security?

Agenda Mobile Trends Where to start? Risks and Threats Risk mitigation Conclusion

Page 13: Mobile & Security?

Physical Risks

Page 14: Mobile & Security?

Increased variety and complexity

Page 15: Mobile & Security?

There is an app for that... To steal your data To steal your money (premium SMS

services) To spy on you To evade regular controls

Page 16: Mobile & Security?

Accept or Decline?

Page 17: Mobile & Security?

Apps are programs Apps act like normal programs:

They may have bugs They may be badly designed They may be altered (backdoors)

OutputInput Processing

Page 18: Mobile & Security?

Apps are programs Apps must be developed using best

practices with more focus on mobile devices specs like small keyboard not ideal to input passwords

OWASP has a top-10 mobile risks(1) that must be reviewed

(1) https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks

Page 19: Mobile & Security?

Malicious Marketplace – Social Engineering

Page 20: Mobile & Security?

Privacy risks

Page 21: Mobile & Security?

Risks related to data

Page 22: Mobile & Security?

Threats related to device

Page 23: Mobile & Security?

Agenda Mobile Trends Where to start? Risks and Threats Risk Mitigation Conclusion

Page 24: Mobile & Security?

Risk Mitigation

Governance Management

Legal and HR Mana-

gement

Technical ManagementDevice Management

Application ManagementUser & Data Management

Page 25: Mobile & Security?

General Policy and Organisation

Define appropriate usage (physical, data, application)

Create “Awareness” Monitor, detect, report Collaborate with HR/ Legal

Page 26: Mobile & Security?

MDM?

“Mobile Device Management (MDM) software secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises.”

Page 27: Mobile & Security?

Mobile Device Management Do you need MDM?

Microsoft Exchange includes ActiveSync for free

Security Vendors propose some tools to handle and manage Mobile devices

Page 28: Mobile & Security?

Mobile Device Management Enforce policy compliance Inventory Management Software/ Application Management Authentication Encrypted data Encrypted communication

Page 29: Mobile & Security?

Mobile Device Management Remote wipe Physical protection Password enforcement Audit and Reporting Cost control (Geolocalization) Access Control

Page 30: Mobile & Security?

Mobile Device Management

Enterprise Appstore

Page 31: Mobile & Security?

Mobile Device Management Data segmentation Containerization Privacy protection Backup management Data Loss Prevention

Page 32: Mobile & Security?

MDS?“Mobile Device Security(MDS) concentrates on the security of personal and business information stored on smartphones.”

Page 33: Mobile & Security?

Mobile Device Security Focus on identity, data and

availability protection using:• URL Filtering• Web Application Filtering• Malware detection: Check Traffic, Apps &

SMS• Antivirus

Page 34: Mobile & Security?

Unity Makes Strength Combine multiple technologies to

efficiently protect mobile devices Use solutions which are “open” (API, logs) Think about “Lego” blocks Telenet might help you to build your

solution

Page 35: Mobile & Security?

Unity Makes Strength

Page 36: Mobile & Security?

Solutions delivered by Telenet

Page 37: Mobile & Security?

Conclusion Combination of MDM & MDS is ideal

solution to cover most of mobile security related aspects

Invite us to discuss your requirements and define together the best solution for your business

Page 38: Mobile & Security?

Let’s have a drink!