Date post: | 13-Dec-2014 |
Category: |
Technology |
Upload: | thesecureid |
View: | 660 times |
Download: | 1 times |
Trevor Iverach Principal Consultant, CA Technologies
iPad-style mobility in the age of Wikileaks
agenda
address the ‘mobilution’ challenge
3 layered security approach
establish a position
the ‘mobilution’ challenge?
why now?
understand the threat
contrasting mobile devices
Mitigating the risk
where to secure the risk?
device
data
enterprise
10111001100010111111010111
—passcodes/passwords
—remote wipe
—hardware based encryption
—policies−device type,
configuration
—restrictions
Securing the device
—information protection and control
— non-public information
— personally identifiable information
— intellectual property
—identity aware data loss prevention
securing the data?
Demonstration
—device authenticity is crucial−device dna
—strong authentication−two factor authentication
—different needs for different usercommunities
—client virtualisation −greater control
securing the enterprise
demonstration
putting it all together
secure the device
passwords- restrictions
- config
securethe enterprise
- device authenticity- user authenticity
secure the data
control points data in use, motion, rest
these devices are inevitableestablish a position
secure the device, data & enterprise
Summary
moving forward
Mobilution Offer
thank youtwitter.com/thesecureid