48
Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience Shanmugarajah (Shan) Director Architecture, Enterprise Mobility WSO2 Inc.

WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

  • Upload
    wso2

  • View
    353

  • Download
    0

Embed Size (px)

Citation preview

Page 1: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Shanmugarajah (Shan)Director Architecture, Enterprise Mobility

WSO2 Inc.

Page 2: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Agenda• Work- New definition• Enterprise Mobility Challenges• Different Approaches to Data

Security• BYOD• WSO2 EMM• Summary

Page 3: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

16 years back

Page 4: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Employees

Enterprise

Data

Device

Device

Work• Happens inside a place•Dependent on specific Technology• Resources Within the premise

Owned by enterprise

Page 5: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Now

Thanks to technology

Page 6: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Enterprise

Data

Employees

Device

Data Work• Independent of place• Independent of Technology•Resources Within the premise and outside

Owned by enterprise and employees

Page 7: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Enterprise Mobility ?

Page 8: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

• New trend towards a shift in work habits.

• Employees working out of the office with Mobile devices and cloud services to perform business tasks.

Enterprise Mobility

Page 9: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Challenges

Allow Mobility in your organization ?

Page 10: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Enterprise

Data

Employees

Device

COPE

BYOD

Public Store

Page 11: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

• Data Security • Remote Device Management • Enterprise Store• Enterprise Application

Development & Management

Challenges

Page 12: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Data Security How the data can be

compromised ?Device being lost or stolenMalicious App stealing the dataData Leak

What is the data ?•Email message or the attachment

•Documents like pdf,word,excel,ppt,text

•Browser accessing HTML pages,cookies

•Contact,Calendar,Notes•Application with Database

Why the data is sensitive ?

•It can be highly confidential like quotation value, salary details

•It can have a high impact if it goes to the wrong person

Who can compromise ?ExternalInternal

Page 13: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Enterprise needs some kind of Tool to solve the

enterprise Mobility challenge

EMM

Page 14: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Data Security - Approach 1

Mobile Device Management

Page 15: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

• Enforce password policy on the device

• Encrypt data when locked (AES 256 FIPS 140-2)

• Enterprise Data WIPE & Device WIPE

• iCloud Backup Disable

How MDM can solve this challenge ?

• If the password is compromised• Malware or malicious app

stealing data

• MDM has very little control over data sharing and DLP

Data Security - Approach 1 - MDM

Drawbacks

Page 16: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Vendor Apps

Enterprise Apps

Apps from Public Store

Apps in the Device Challenge

1.Need to separate enterprise apps and data 2.Able to Control it3.Limit interaction with personal apps and data.

Page 17: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Data Security - Approach 2 - Separate Apps and DataWithin

Device

Away from Device

Page 18: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Away from Device•Desktop Virtualization or VDI technology (Citrix XenDesktop,VMWare Horizon View, Dell vWorkspace, Remote Desktop Microsoft.

•Web Apps

Within Device• Virtualized OS’s on the mobile device (Hypervisor 1 and 2)

Data Security - Approach 2 - Separate Apps and Data

Page 19: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Dual persona, two separate and independent end user environments in a single device.

Mobile VirtualizationVirtualized OS’s on mobile (Hypervisor 1 and 2)

BlackBerry BalanceSamsung KNOX

Page 20: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Other Dual Persona’s Blackber

ry Z10Samsung Note 3

KNOX Container

Page 21: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Not all the devices support dual persona iOS does not support or Apple will not allow to modify the OS • Desktop virtualization• Web apps• Mobile virtualizationEach one of those options

has its flaws.

Page 22: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Data Security - Approach 3Mobile App

Management• MAM gets you a step

closer to managing what you care about

• MAM brings the perimeter closer to the corporate resources

Page 23: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Mobile App Management (MAM)1. MAM (Controlling App behavior) 1a. SDK Approach 1b. App wrapping2. OS MAM - iOS MAM through MDM3. App Store and Managing apps with MDM

Page 24: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Data security features1.Encrypt the data at transmit use app VPN

tunnel or app tunnel2.Encrypt the data at rest & decrypt only when

viewing 3.Two factor authentication 4.Data Loss prevention (Disable Cut,Copy and

Paste)5.Data at rest should be controlled (Delete)6.Policy based Data control , where policy can

be pushed and updated

MAM controlling apps behavior

Additional Features1.Enterprise Apps in the mobile should be able

to use SSO2.Data can be shared between application 3.DLP (cut,copy,paste) should be enabled

between enterprise applications

Page 25: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

MAM SDK ApproachSDK contains all the necessary API to implement the MAM featuresProvides enterprise-grade security with user authentication, single sign on, copy/paste prevention, data encryption, app-level policies, compliance monitoring and management.

Page 26: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

MAM - App Wrapping App

Wrapper Tool

• For apps already built• Need unsigned app binary.• Not to apps from public app stores.• Can do basics of encryption,

authentication, or app-level VPNs.• Can intercept, block, or spoof API calls

made• Can change the app icon

Page 27: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

MAM Solution (Controlling app behavior)•Works across all versions of Android and iOS

•Native apps provide a superior user experience.

Remote desktops, web apps, and virtualized mobile devices each have their place in the EMM world, but MAM has distinct advantages.

Data Security - Best Approach

Page 28: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

• Remote Device Management (MDM)

• Enterprise Store • Enterprise Application

Development & Management(MEAP, mBaas)

Other Challenges in Enterprise

Page 29: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Embracing BYOD in Enterprise - Benefits• Cost • Device Maintenance• Improved Productivity

Page 30: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

User-Experience and Privacy in BYOD

More than one Enterprise Apps Every app needs login Desktop apps have SSO Why not give the same experienceNative App

Monitor the personal data like contact info, app info Location info of the user

User- Experience

Privacy

Page 31: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

WSO2 Enterprise Mobility Manager

WSO2 EMM

Page 32: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

WSO2 EMM Features• MDM• Enterprise Store with

Publisher• Mobile App

Management

Page 33: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Mobile Device Management• Employee / Corporate Owned• Supports Android, iOS• Identity integration • Policy Management• Containerization (Email)• Self Service Provisioning• Role Based Permission• End-User MDM Console • Enterprise Wipe• Reports & Analytics

Page 34: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Configuration

Android Features•Device Lock•User password protected WIPE•Clear Password•Send Message•Wi-Fi•Camera•Encrypt Storage•Mute•Password Policy•Change Lock Code•App Blacklisting

•Location•Battery Information•Memory Information•Operator Information•Root Detection•Application Information

Information

Page 35: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

iOS Features•Device Lock•Clear Passcode•Wi-Fi•Camera•VPN•APN•Email•Calendar•LDAP•Black - Listing Apps•Enterprise WIPE•Password Policy

•Battery Information•Memory Information•Application Information

ConfigurationInformation

Page 36: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

WSO2 EMM Screens

Page 37: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

• Supports multiple platforms• Android

• Native, Hybrid Application (.apk)• Web Application• Market Place Application (Google Play) [Free]

• iOS (iPhone, iPad)• Native, Hybrid Application (.ipa) - Need to have enterprise developer account• Web Application• Apple Store Application [Free]• VPP Application (Next Release)

Publisher

Page 38: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

WSO2 EMM – Publisher

Page 39: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Store Supports multiple platformsUser subscriptionAdvanced search optionsApp sortingSupport for existing user stores (Widgets, Gadgets, Books, Magazines , APIs).Single-Sign on

Page 40: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

WSO2 EMM – Store

Page 41: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Application Management Console• Mobile app policy

enforcement• Compliance

monitoring• Bulk app push• User App

Management• Tracking app

Installation

Page 42: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

WSO2 EMM – App Management

Page 43: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Enterprise

Data

COPE

BYOD

Public Store

Mobile Project ManagementMobile Project Management

Unified StoreBackend API, mBaaS API

Unified StoreBackend API, mBaaS API

Development IDEDevelopment IDE

MDM MDM

MEAP

Big Picture

Page 44: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Roadmap•App Containerization (SDK Approach)•Samsung KNOX Integration •Dynamic Policy •mBaaS•MEAP

Page 45: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Summary•Different approaches to BYOD problem•Based on your requirement Can be MAM , or it can be hybrid (MDM & MAM)

•End-user experience and their privacy is important

Page 46: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Consumerization is a two-way street. You need to make sure your users understand the need to keep resources safe, but you also need to make corporate resources accessible.

IT Consumerization

Page 47: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Q/A

Page 48: WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Thank you