+ All Categories
Home > Documents > Mobile Security Solutions Overview - Continental …...mobile/endpoint security solutions...

Mobile Security Solutions Overview - Continental …...mobile/endpoint security solutions...

Date post: 24-May-2020
Category:
Upload: others
View: 4 times
Download: 0 times
Share this document with a friend
4
IT SOLUTIONS MOBILE SECURITY SOLUTIONS IT SOLUTIONS n 50 YEARS WBENC Certified Women Owned Business Certificate 2005111735 ISO 9001:2008 Registration #10003304 CRN Tech Elite 250 best-of-breed solution provider CRN Solution Provider 500 #65 PROFESSIONAL SERVICES Cloud Computing Data Center Data Storage Desktop Management Messaging Microsoft Consulting + MOBILE SECURITY Networking Security Unified Communications Virtualization Wireless MANAGED SERVICES Systems Monitoring 24/7 Fully Managed Services After Hours Support Services CustomTools/RegularTools Mobile endpoints enhance productivity but add risk to infrastructure and intellectual property. Mobile Security Solutions Secure Communications with Confidence Mobile Security Solutions Overview Most enterprises today are comfortable with securing and managing computing endpoints such as desktop and laptops, but may not have the same processes for what is likely the fastest-growing computing platform: mobile endpoints. Like a PC, a mobile endpoint is susceptible to malware, spyware, and other threats. Some examples of mobile endpoint devices are: • BlackBerries • Androids • iPhones • iPads • HPTouchPads • Cisco Cius Not only are these devices capable of enhancing productivity, but they also open pathways to your corporate systems and data. If managed incorrectly, these devices inadvertently open up security holes and increase unauthorized access to your con- fidential data, systems and infrastructure. Continental Resources (Conres) eases your concerns of mobile consumerization including security, liability and manageability issues. To provide a productive and secure environment, all mobile endpoints must be reviewed. Remote access and data backup processes must be evaluated, and mechanisms put in place to manage stolen or lost devices (i.e. encryption and/or remote device disable).Through experience, ConRes understands how mobile devices work with enterprise environments. ConRes works with you to evaluate/create security processes to ensure your mobile devices are seamlessly integrated without excessive cost and risk. Major Concerns in Mobile Endpoint Security There are several significant technial challenges to overcome when addressing mobile security on your corporate and personal mobile devices.Your IT staff will wrestle with balancing the needs of your employee with the need to secure your corporate data. Challenges Associated with Mobile Endpoint Security • The user’s expectation for full-use (business and personal) of the device. • The prevalence of compromised data devices and applications. • The balance between privacy and security. • Consumerization of IT: Mobile devices are designed, sold and used as consumer devices, while security and manageability become secondary concerns. • Mobility: Data reaches easily across multiple trusted and untrusted networks exposing the devices to high risks. • Social networks (high traffic, real-time networks) can be exploited for attacks on enterprise infrastructure and data anywhere...instantly. • Mobile, cloud, and virtualization technologies connect enterprises to the world, and transmit information well beyond corporate firewalls.
Transcript
Page 1: Mobile Security Solutions Overview - Continental …...mobile/endpoint security solutions consistently with acceptable risk and security parameters. As mobile devices become smarter,

I T S O L U T I O N SMobile Security SolutionS

IT SOLUTIONSn 50

YEARSWBENC Certified Women Owned Business Certificate 2005111735 ISO 9001:2008 Registration #10003304

CRN Tech Elite 250 best-of-breed solution providerCRN Solution Provider 500 #65

PROFESSIONAL SERVICES• CloudComputing• DataCenter• DataStorage• DesktopManagement• Messaging• MicrosoftConsulting + Mobile Security

• Networking• Security• UnifiedCommunications• Virtualization• Wireless

MANAGED SERVICES• SystemsMonitoring• 24/7FullyManagedServices• AfterHoursSupportServices• CustomTools/RegularTools

Mobile endpoints enhance productivity but add risk to infrastructure and intellectual property.

Mobile Security SolutionsSecureCommunicationswithConfidence

Mobile Security Solutions overviewMostenterprisestodayarecomfortablewithsecuringandmanagingcomputingendpointssuchasdesktopandlaptops,butmaynothavethesameprocessesforwhatislikelythefastest-growingcomputingplatform:mobileendpoints.LikeaPC,amobileendpointissusceptibletomalware,spyware,andotherthreats.Someexamplesofmobileendpointdevicesare:

• BlackBerries

• Androids

• iPhones

• iPads

• HPTouchPads

• CiscoCius

Notonlyarethesedevicescapableofenhancingproductivity,buttheyalsoopenpathwaystoyourcorporatesystemsanddata.Ifmanagedincorrectly,thesedevicesinadvertentlyopenupsecurityholesandincreaseunauthorizedaccesstoyourcon-fidentialdata,systemsandinfrastructure.

ContinentalResources(Conres)easesyourconcernsofmobileconsumerizationincludingsecurity,liabilityandmanageabilityissues.

Toprovideaproductiveandsecureenvironment,allmobileendpointsmustbereviewed.Remoteaccessanddatabackupprocessesmustbeevaluated,andmechanismsputinplacetomanagestolenorlostdevices(i.e.encryptionand/orremotedevicedisable).Throughexperience,ConResunderstandshowmobiledevicesworkwithenterpriseenvironments.

ConResworkswithyoutoevaluate/createsecurityprocessestoensureyourmobiledevicesareseamlesslyintegratedwithoutexcessivecostandrisk.

Major concerns in Mobile endpoint Security Thereareseveralsignificanttechnialchallengestoovercomewhenaddressingmobilesecurityonyourcorporateandpersonalmobiledevices.YourITstaffwillwrestlewithbalancingtheneedsofyour

employeewiththeneedtosecureyourcorporatedata.

challenges Associated with Mobile endpoint Security

• Theuser’sexpectationforfull-use(businessandpersonal)ofthedevice.

• Theprevalenceofcompromiseddatadevicesandapplications.

• Thebalancebetweenprivacyandsecurity.

• ConsumerizationofIT:Mobiledevicesaredesigned,soldandusedasconsumerdevices,whilesecurityandmanageabilitybecomesecondaryconcerns.

• Mobility:Datareacheseasilyacrossmultipletrustedanduntrustednetworksexposingthedevicestohighrisks.

• Socialnetworks(hightraffic,real-timenetworks)canbeexploitedforattacksonenterpriseinfrastructureanddataanywhere...instantly.

• Mobile,cloud,andvirtualizationtechnologiesconnectenterprisestotheworld,andtransmitinformationwellbeyondcorporatefirewalls.

Page 2: Mobile Security Solutions Overview - Continental …...mobile/endpoint security solutions consistently with acceptable risk and security parameters. As mobile devices become smarter,

I T S O L U T I O N S

Ifsomeofthesechallengesmatchyourcurrentenvironment,leveragetheexpertiseofConRestotaketheburdenoffyourteam.EngageConRestoreviewyourchallenges,proposeasolution...andproposeacourseofactionalignedwithyouracceptableriskthreshold.Weensuresecuremobiledeviceaccessinrelationtoyourcorporatedata.

Mobile Device Management is Key“A well-managed device is a secure device.”

Eachdevicehasuniquefunctionalcapabilitiesaswellasanidentifiablesignature.Alongwithitscorefunctionalcomponents,devicesfeatureentirelayersofenhancements,add-ons,hot-fixes,softwareandfirmwareupdates.Thesheernumberofdevicetypes,combinedwithdisparatefeatures,functionsandapplications,servestomagnifyriskandincreaseadministrationcosts.Thekeyistoconfigureandimplementmobile/endpointsecuritysolutionsconsistentlywithacceptableriskandsecurityparameters.

Asmobiledevicesbecomesmarter,theyprovidegreatercorporateaccessandstoremoredata,therebyincreasingtheurgencyofgreatercontrolandmanagement.ConRessharesyourconcernandworkswithyoutoprotectcorporateinformationwhilepromotingsustainedproductivity.

What is endpoint Security?Endpointsecurityisanapproachtonetworkprotectionthatrequireseachcomputingdevice(endpoint)associatedwithacorporatenetworktocomplywithcertainstandardsbeforenetworkaccessisgranted.

What is a Mobile endpoint?Amobileendpointisawirelesshandhelddevicecapableofroamingfromcelltocellwiththeabilitytogainaccesstodatathatdoesnotresidelocallyonthedevice.Thesedevicesalsohavethecapabilitytostoreinformationlocallyonthedevice.

identifying the threatSeveralmobiledevices,likesmartphones,havemanypotentialentrypointsforacompromise.Acompromisedmobiledevicecanprovideawealthofinformationtoanattacker.Duetotheirultraportability,short-rangedevicessuchasBluetooth,Infra-redandWi-fiaremoreviableavenuesofexploitation.

Potential threats from compromised Mobile Devices• SMSmessagesgiveanattackerthe

abilitytosearchforyourpasswordsand/orperformunauthorizedfinancialtransactions.

• Emailsgiveanattackertheopportunitytoaccessyourprivatecorporateinformationsuchascredentialsandpasswordresetlinks.

• Phones:Low-levelaccesstoyourhardwareallowsanattackertorecordorlistentoyourvoiceconversations.

• SocialNetworking:Attackersposeasyou,allowingtheretrievalofyourpersonalinformationandyoursocialcontacts.

• Operatingsystemvulnerabilities.

• Physicalaccesstolost,stolenand/orunattendeddevices.

• Video/Photo:Low-levelaccesstoyourhardwareprovidesanattackerwiththeabilitytoretrievevideoand/orphotosfromyourphonetoprovidedetailsofitssurroundings.

• Built-inGPSorGSMantennasallowattackerstoidentifythelocationofyourmobiledevice.

• Attackersareabletoaccessdocumentsstoredonyourdevice,includingemailattachmentssuchasPDFfiles,Microsoft®Officefiles,credentials,encryptioncertificates,internalvideosande-books.

“They[ConRes]havesomeofthebestengineersI’veeverworkedwith.They’vebeenveryflexibleandveryhelpful.Atheart,they’restillpeople.Attheendoftheday,they’reabletoworkwithyouasacompany,they’reabletoworkwiththeindividuals.They’lldowhateverhastobedone.Thatis,attheendoftheday,ofutmostimportance.Ifthisprojectneedstowork,they’llfindawaytomakeitworkforyou.” ~ Director, Network Operations, Internet and IT of a provider of healthcare information

Page 3: Mobile Security Solutions Overview - Continental …...mobile/endpoint security solutions consistently with acceptable risk and security parameters. As mobile devices become smarter,

I T S O L U T I O N S

considerations for Mobile Security Mobiledevicesworkacrossseveraldifferentenvironments,invirtualizedinfrastructuresandwithremovablemedia.Sowhendeterminingyourcorporateorpersonalneedsformobilesecurity,takethefollowingquestionsintoaccount:

• Whatkindsofdataarestoredonyourmobiledevices?

• Whatkindsofriskdoyoufaceandwhatfinancialimpactdotheseriskspose?

• Whatsecuritymeasuresareyoucurrentlyemployingonyourdevices?

• Doyouhaveanymobileapplicationsthatyourcustomersand/orpartnerscanaccess?

• Doesyourbusinessneedtocomplywithanyregulationthatgovernslossofspecifictypesofdata?

• Doyouknowifyourmobileapplicationshavebeencreatedanddeployedsecurely?

• Didyouutilizethirdpartiesinthedevelopmentofyourmobileapplications?

Addressing Mobile Security Now ConResrecommendsaddressingthesecurityconcernsofyourmobiledevicesassoonaspossible.Attentiontosecuritywhileatechnologyisdevelopingisthekeytoensuringthetechnologygrowsintoareliableresource.ConResrecommendsyou:

1.Addressthesecurityaspectsofcellphonesandsmartphonesusedbyemployeesand/orcontractors.

2.Ensureyourmobiledevicesareconfigured,deployed,andmanagedtomeetyoursecurityrequirements.

3.Employtheappropriatesecuritymanagement.

4.Ensureanongoingprocessofmaintainingthesecurityofyourmobiledevicesthroughouttheirlives.

9 recommended Mobile Security PracticesConResrecommendsthefollowingmobilesecuritypractices(ataminimum):

• Forcingencryptionofdataatrestonyourmobiledevices.

• Forcingsecureconnectivityonunsecuredpublicnetworks.

• ConfirmingunauthorizedmobiledevicesdonothaveaccesstoyourcorporateLAN.

• Confirmingmobileuserspendingalignswiththemobilepolicy.

• Authentication:Settingyourdevicetoauto-lockandlimitsforunauthorizedloginattempts.

• Havingaclearpolicyonremotedatadeletion.

• Classifyingdataaccordingtoitssensitivity.

• Allowingonlydigitallysignedapplications.

• Beingawareandabletoadapttotheever-changingmobilelandscape.

.

Statistically Speaking...• By2017,therewillbecloseto9billionmobilesubscriptionsand85%ofthe

world’spopulationwillhaveInternetcoveragevia3G.

~Traffic and Market Report, 2012

• TheworldwidemobilemessagingmarketwasworthUSD202billionin2011.ThisnumberisforecasttorisetoUSD310.2billionbyend-2016.

~Mobile Factbook, April 2012

• Attheendof2011,therewere6billionmobilesubscriptions.Thatisequivalentto87%oftheworldpopulation.Andisahugeincreasefrom5.4billionin2010and4.7billionmobilesubscriptionsin2009.

~The International Telecommunication Union, 2011

“Asenterprisesstartconsideringhowtheywillbuildtheirmobilesecuritystrategy,theymustbepreparedtoinvestincross-platformsolutionsthatcanprovideprotectionforthedataonthedeviceaswellastheenterprisenetwork.” ~Senior Research Analyst, IDC’s Mobile Enterprise

Page 4: Mobile Security Solutions Overview - Continental …...mobile/endpoint security solutions consistently with acceptable risk and security parameters. As mobile devices become smarter,

I T S O L U T I O N S Mobile Security SolutionS

continental resources, inc. | 800.937.4688LocalContacts:Boston|Chicago|Connecticut|NewJersey|NewYorkPhiladelphia|WashingtonD.C.Headquarters:175MiddlesexTurnpike,Ste1|Bedford,MA01730-9137ITsolutions.conres.com© 2012 Continental Resources, Inc. Specifications subject to change without notice. Continental Resources not responsible for typographical errors. All product and manufacturer names are trademarks or registered trademarks of their respective companies. Printed in U.S.A. ConRes 10035-1209 (Replaces 10035-1110)

IT SOLUTIONSn 50

YEARS

1. BUSINESSDISCOVERY2. ASSESSCURRENTSTATE3. GAPANALYSIS4. SOLUTIONDESIGN5. PLAN&TEST6. IMPLEMENT7. SUPPORT/TRANSITION8. MONITOR

PROVEN ENAbLING MEthODOLOGy®

To provide the most secure and useful solutions, ConRes follows a Proven Enabling Methodology, a structured approach and framework to plan, design, implement and optimize unique solutions.

21

3

456

8

links to related online content:• FullResourceLibrary• Partnerships&SolutionsOverview• ProfessionalServicesOverview• SecuritySolutionsOverview

21

3

456

8

benefits of Working with conres TheProfessionalServicesteamatConResconsistsofsolutionarchitects,solutionengineersandprojectmanagementprofessionalswhoaverageovereightyearsofexperience.

Protectingyourcorporatesystemsanddataisthemainfocusofourmobilesecuritypractice.Supportingthisinitiativerequiresdistinctpolicyconformance,encryptionand/ordisablingmethodsanduniquedatabackuppolicies.Havingsecuredatarequirespayingattentiontothesmallestdetail...howarethumbdrivesused?Whatothermethodsofdatatransportareused?

ConResworkswithyoutoprovidethenecessarysolutionsandsupporttoensurepropersecuritymeasuresareinplace.

Mobile Security Services ProvidedTocomplementthesesolutions,ConResprovidesevaluation,analysisandimplementationandmanagementservices.

• SoftwareDistributionforEndpointDevices

• EndpointSecurity• CorporateDataSecurity• RemoteAccess• CustomInventorySolutions• CustomSoftwareDistribution• SecurityPolicyManagement• CustomPackageBuilding• CustomData• Collection/CustomizedReporting• SoftwareLicenseCompliance• DataBackup/Recovery

• Configuration&Implementation• SecurityAudit&RiskAssessment• PolicyReview&Recommendation

• SLAReview&Mediation

About conresBuildabetterITinfrastructureanddatacenter,maximizeyourchoiceofITproductsandservices,andstrengthenyourROI–withthefriendlyprofessionalsatConRes,thehybridVAR™.Asahybrid,ConResbringsyouabroadrangeofproducts,combinedwiththeservicesandsupportyou’dexpectfromatraditionalVAR.

Whetheryou’reanITprofessionalinbusiness,academiaorgovernment,youcanrelyonConResforenterprise-classsolutionsrangingfromvirtualization,disasterrecovery,unifiedcommunications,unifiedcomputing,cloudcomputing,security,andnetworkingtoUNIX®,Linux®,andWindows®.

• 50yearsofexperienceandfinancialstability

• 96%customersatisfactionrating(3rdpartysurvey)

• RankedannuallyinthetopthirdontheVAR500(currently#63)

• ElectedtotheCRNTechElite250,best-of-breedsolutionproviders

Experience,stabilityandthirdpartycredentialsmakeConResareliableandtrustworthyresourceforyourITinfrastructureanddatacentersolutions.


Recommended