20
© 2013 Beyond Mobile Ltd 02/07/22 THE PATH TO A PERVASIVE WIRELESS SERVICE

IT Security Forum London ballintrae 240913 final

Embed Size (px)

DESCRIPTION

Presentation on the path to pervasive wireless - An enterprise journey.

Citation preview

Page 1: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023

THE PATH TO A PERVASIVE WIRELESS SERVICE

Page 2: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 2

CUSTOMER POLL

Quick show of hands

• Does your company offer any type of Wi-Fi solution in their premises ?

Keep it up if you allow

• employees on company laptops to use it ?• guest access to the internet via it ?• employee’s to use their personal devices on it?

Page 3: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 3

AGENDA

Wireless Networking – the changing landscape

The path to a pervasive wireless service

Q&A

Page 4: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 4

INTRODUCTION

An IT infrastructure specialist with over 20 years in the financial services sector.

11 years with Credit Suisse and 6 with Chase (JP Morgan)

Earlier this year I left Director in IT role for Credit Suisse to start Beyond Mobile.

Beyond Mobile offers Strategy, Product and Sales advice to technology companies in the early stage of their business plans and firms looking to buy enterprise mobility technology.

Page 5: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 5

Enterprise 1(Financial)

Enterprise 2(Financial)

Enterprise 3(consulting)

THE ANATOMY OF AN ENTERPRISE

140,000 65,000 20,000

150,000* 80,000 2,000

35,000* 15,000 20,000

200,000+ * 120,000 2,500

Yes Yes No

“dirty network”“clean network for employees” “clean network”

Page 6: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 6

EVIL INTERNET & WIRELESS

Wi-Fi BANNED

Custom laptops with Wi-Fi cards removed

Ethernet ports and drivers locked down

Remote access restricted to dial up

Almost impossible to be productive unless in the office

Page 7: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 7

EVOLUTION NOT REVOLUTION

Page 8: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023

NETWORK PERIMETER SECURITY

8

Page 9: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 9

NETWORK STRATEGY

DEPERIMITISATION

Page 10: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 10

2007 – 1ST GEN WI-FI

CISO concedes some Wi-Fi allowed

“Managed” endpoints only

Guest internet access allowed

No employee personal devices allowed

User experience not considered

Wi-Fi Design poor

Global inconsistency

Page 11: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 11

2007 – 1ST GEN WI-FI

Page 12: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 12

2009 CHALLENGERS

“Why can’t I use the corporate Wi-Fi to sync my work email”

“Cellular coverage is so bad in my building and it’s crazy employee’s cant use the Corporate Wi-Fi on their personal devices”

Crumbling of IT Walled gardens

Page 13: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 13

2011 THE GAME CHANGED

Real estate smart strategies

Wi-Fi shifted to a core “enabling” technology and business enabler.

BYOD strategy was built demanding better services

CIO – build it quick but I wouldn’t start from there, if I was you

Poor coverage, low contention, IT vs. Business

Page 14: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 14

COMPARING ENTERPRISE APPROACHES

Projects requirements vs. long term strategy

How to define policies for different user groups

Skills you need to support the service

Page 15: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 15

PROJECT REQUIREMENTS

Guest Employee 1 Employee 2

Standard Complex

Page 16: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 16

Guest Employee 1 - Standard Employee 2 – complex

POLICIES FOR DIFFERENT GROUPS

Medium Medium High

Low Med High / Regulated

Personal Corporate or Personal Corporate

Yes Yes Yes & Corporate

None MAM MDM & MAM

No Yes Yes

Page 17: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 17

Guest Policy

Network Access Untrusted / DMZ

Authentication Username/password

Content Filtered No

Posture checked No

Accept Use policy Yes

POLICIES FOR DIFFERENT COMPANIES

Emp. Personal Policy

Network Access Untrusted / DMZ

Authentication Tied into AD

Content Filtered Yes

Posture checked None

Accept Use policy Yes & Web Redirect

Enterprise 1 Enterprise 2

Guest Policy

Network Access Untrusted / DMZ

Authentication Username/password

Content Filtered No

Posture checked No

Accept Use policy Yes

Emp. Personal Policy

Network Access Untrusted / DMZ

Authentication SSL VPN

Content Filtered Yes

Posture checked Downloadable client

Accept Use policy Re-registered 90 days

Page 18: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023 18

POLICIES FOR DIFFERENT COMPANIES

Corporate Device Policy

Network Access Secure 802.1x / EAP TLS

Authentication Mutual auth certificates

Content Filtered Yes

Posture checked Trusted build

Accept Use policy Yes / Annual IT Policy

Enterprise 1 Enterprise 2

Corporate Device Policy

Network Access Untrusted / DMZ

Authentication VPN with Smartcard

Content Filtered Yes

Posture checked Trusted build

Accept Use policy Yes /

Page 19: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023

Is your Wi-Fi initiative IT driven vs. business driven?

Do you have you a regular dialogue with stakeholders to understand their risk posture?

Does your organisation get additional funding for building Wi-Fi access?

What are the skills required to support your BYOD & wireless strategy?

What else is important?

Q & A / ROUNDTABLE

Page 20: IT Security Forum London ballintrae 240913 final

© 2013 Beyond Mobile Ltd 10 April 2023

THE PATH TO A PERVASIVE WIRELESS SERVICE