+ All Categories
Home > Technology > iPad-style mobility in the age of Wikileaks

iPad-style mobility in the age of Wikileaks

Date post: 13-Dec-2014
Category:
Upload: thesecureid
View: 660 times
Download: 1 times
Share this document with a friend
Description:
This is the presentation I delivered on securing mobile tablet style devices. An emerging technology area with the assoicated risks.
Popular Tags:
17
Trevor Iverach Principal Consultant, CA Technologies iPad-style mobility in the age of Wikileaks
Transcript
Page 1: iPad-style mobility in the age of Wikileaks

Trevor Iverach Principal Consultant, CA Technologies

iPad-style mobility in the age of Wikileaks

Page 2: iPad-style mobility in the age of Wikileaks

agenda

address the ‘mobilution’ challenge

3 layered security approach

establish a position

Page 3: iPad-style mobility in the age of Wikileaks

the ‘mobilution’ challenge?

Page 4: iPad-style mobility in the age of Wikileaks

why now?

Page 6: iPad-style mobility in the age of Wikileaks

contrasting mobile devices

Page 7: iPad-style mobility in the age of Wikileaks

Mitigating the risk

Page 8: iPad-style mobility in the age of Wikileaks

where to secure the risk?

device

data

enterprise

10111001100010111111010111

Page 9: iPad-style mobility in the age of Wikileaks

—passcodes/passwords

—remote wipe

—hardware based encryption

—policies−device type,

configuration

—restrictions

Securing the device

Page 10: iPad-style mobility in the age of Wikileaks

—information protection and control

— non-public information

— personally identifiable information

— intellectual property

—identity aware data loss prevention

securing the data?

Page 11: iPad-style mobility in the age of Wikileaks

Demonstration

Page 12: iPad-style mobility in the age of Wikileaks

—device authenticity is crucial−device dna

—strong authentication−two factor authentication

—different needs for different usercommunities

—client virtualisation −greater control

securing the enterprise

Page 13: iPad-style mobility in the age of Wikileaks

demonstration

Page 14: iPad-style mobility in the age of Wikileaks

putting it all together

secure the device

passwords- restrictions

- config

securethe enterprise

- device authenticity- user authenticity

secure the data

control points data in use, motion, rest

Page 15: iPad-style mobility in the age of Wikileaks

these devices are inevitableestablish a position

secure the device, data & enterprise

Summary

Page 16: iPad-style mobility in the age of Wikileaks

moving forward

Mobilution Offer

Page 17: iPad-style mobility in the age of Wikileaks

thank youtwitter.com/thesecureid


Recommended