Who are Sophos? - C-Cure€¦ · Sophos Mobile Control 19 A Mobile Device Management solution that...

Post on 31-May-2020

3 views 0 download

transcript

Securing Mobile DevicesAntony Gibson

Sophos Channel Manager C-Cure Mobile Security Event - 5th May 2011

Who are Sophos?

Simple + Secure

• World‟s third largest IT security vendor

• Malware, data protection and security

experts

• Over 25 years experience

• Trusted by over 100 million users

• Headquarters in Oxford and Boston

• 1500+ employees, over 600 people in

R&D

• Fastest growing of the three largest

endpoint security vendors

• Leaders in Gartner‟s Magic Quadrants

Comprehensive security & data protection

Endpoint Email Web

Encryption Mobile

Our „secret sauce‟ - a different approach

Integrated

data

control

endpoint

& gateway

Compliance

Mobile

Control

Email

AV, HIPS,

Live

Protection

Web

Protection

PatchEncryption

Managed intelligence

Eliminate complexity

Comprehensive protection

Simply Secure

Business focused support

Securing mobile devices

7

P E B K A C

Problem Exists Between Keyboard and Chair

• Confined to office

• Controlled internet

• Enforced security

Increasing demand for mobility

8

11%

29%

Increase in supporting

Android for business use

Of companies surveyed

already supporting iOS

Forrester 2010

9

unaware that smartphones can transmit

confidential payment information such as credit

card details without the user being prompted89%

51%

Enabled but unaware

do not use keypad locks or passwords

65% worry more about security on their laptop or

desktop PC

10

P E B M A C

• Truly handheld computers

• Connectivity everywhere

• Apps for everything

Problem Exists Between Mobile and Cappuccino

11

The “personal” device

“If a smartphone lives up to what it should

be then it is something, as human beings,

we will have an emotional relationship with

because it's there all the time, it's our

window on the world, it's our mouthpiece,

it's everything we are and have. „My life is

in there‟ you hear people scream.”

Stephen Fry

What are the threats

• Data theft and loss

• Rogue apps (eg Droid Dream)

• Mobile provider patching

• Browser vulnerabilities

12

To enable and secure

13

Make life easier for IT

Secure lost or

stolen devicesAllow email access

Manage

applications

14

Allow email access

• Know who‟s connecting what

• Define that access

• Secure the device

15

Secure lost or

stolen devices

• Encryption and remote lock or wipe

• Geo location and anti theft

• Stop access to the device except for it‟s owner

16

Manage applications

• Know the apps being used

• Identify rogue applications

• Consider the “kill switch” approach

17

Make life easier for IT

• A user should be able to set themselves up

• Configuration changes should cause minimal disruption

• Ease of use cuts both ways

Mobile management approaches

18

May create support

challenges

Enables tight control

Sandboxes business

access

Sandbox area Lightweight agent

Manages the entire

device

Uses built-in capabilities

and apps

May cause difficulties in

segregating data

Sophos Mobile Control

19

A Mobile Device Management solution that provides:

• Configuration of the phone

• Addresses concerns regarding loss/theft

• Supports employees‟ personal devices

• DIY device management with a self service portal

• For Apple, Android and Windows Mobile

Allow email access

Give access to exchange email knowing that the device being used is

properly secured and visible in your console

• Access only given to managed devices

• Uses Microsoft ActiveSync Exchange proxy

• Email settings sent over the air to devices

Deal with lost or stolen

devices

If a mobile goes missing , or even if the SIM card is changed you can

be sure any company data is safe

• Force passcode or password for any managed device

• Remote lock and/or wipe

• Removes all mail and calendar items downloaded from Exchange (iOS

only)

22

Manage apps

If you want to make sure people are using a specific VPN client then

deploy it from the console with the correct settings

• Prohibit installation of apps (iOS only)

• Full device inventory: Model, OS, Network, Installed apps etc

• Set policies, deploy and remove apps

23

Make life easier for IT

If people want to use their own phone for work just point them to the

portal and they can do it themselves

• Users can register, lock and wipe devices from a self service portal

• Management client and policy deployment is over the air

• Admins can send text message alerts to device groups in a couple of

clicks

Key features

iPhone/iPad Android Win Mobile 6.x

Loss/Theft

ProtectionY Y Y

Remote

ConfigurationY (Y)* Y

Controlled E-Mail

AccessY Y Y

Self Service PortalY Y Y

Device Status

ReportingY Y Y

* Additional Android features will be added in later versions

25

How does it work?

26

Using the self-service

portal

Setting your

password policyViewing device information

Managing

applications

What‟s next

• Application virtualisation

• Remote control

• The mobile as productivity aid

27

Mobile Control roadmap

Staying ahead of the curve

For the latest on Sophos products and security trends follow our experts on Twitter

@achrispace@jameslyne

http://www.sophos.com/security/

Sophos AB

+ 46 858 400 600Salessweden@sophos.com

http://nakedsecurity.sophos.com/

30

Questions