SlideShare une entreprise Scribd logo
1  sur  41
Télécharger pour lire hors ligne
© 2015 InterWorks, Page 1
Caston Thomas
7½ Steps to “Bolt On”
Mobile/Cloud/BYoD/IoT
to our
Existing Network & Security
$$$
cthomas@iworkstech.com 586.530.4981
© 2015 InterWorks, Page 2
What is BYOD?
Option 1:
BYoD refers to employees bringing their own computing devices – to
the workplace for use on the corporate network.
Option 2:
BYoD is a change in how we move the cost of computing from
corporate owned devices to personally owned devices.
Option 3:
BYoD is the fundamental change in how we view ownership of, not just
devices, but also data, applications, & network. It changes how we
approach our company’s security, responsibilities & culture.
© 2015 InterWorks, Page 3
The BYOD/IoT Phenomenon
“68% of devices used by information workers to access
business applications are ones they own themselves,
including laptops, smartphones & tablets.”
“IT organizations typically underestimate the number of
personal mobile devices on their networks by 50%.”
“By 2020, 70% of “4 Pillar” buyers will have the LOB as
their buyer.”
1
(4 Pillars = mobile, cloud, big data, social media)
1IDC Research, The Mobility Game Changer, June 2013
© 2015 InterWorks, Page 4
Fight or Embrace?
“The rise of “BYoD" is the single most radical shift in
the economics of client computing for business since
PCs invaded the workplace.” - Gartner1
“The rise of “BYoD" is the single most radical cultural shift in the
corporate workplace since the copy machine.”
- Caston Thomas
1Gartner “Bring Our Own Device: New Opportunities, New Challenges”, August 16, 2012
© 2015 InterWorks, Page 5
• Data Loss
– Lost phone/tablet/laptop/device
– Unauthorized access
– Compromised device/backdoor
• APT/Malware
– Threats inside the network
• Compliance
– Unauthorized infrastructure
– Unauthorized apps (e.g., dropbox)
– Unauthorized data (e.g., drug interaction database)
The Risk in BYOD
For more detail, a good resource is still:
Gartner “Strategic Road Map for Network Access Control”,
October 11, 2011
© 2015 InterWorks, Page 6
Fight or Embrace?
© 2015 InterWorks, Page 7
What is Our Framework?
• Govern & Comply
• Educate & Manage
• Control & Prevent
• Monitor & Detect
• Respond & Mitigate
© 2015 InterWorks, Page 8
What Are Our Options?
CHARACTERISTICSSOLUTION
Security
Access
Agility
© 2015 InterWorks, Page 9
What Are Our Options?
CHARACTERISTICSSOLUTION
Manage devices (MDM) • Good security at the device level
• Secures device user & content
• Separate management console
• Lacks protecting network resources,
network access & “data in motion”
© 2015 InterWorks, Page 10
What Are Our Options?
CHARACTERISTICSSOLUTION
Manage devices (MDM) • Good security at the device level
• Secures device user & content
• Separate management console
• Lacks protecting network resources,
network access & “data in motion”
Restrict data (VDI) • Strong data protection
• Poor user experience
• Not for the road warrior
© 2015 InterWorks, Page 11
What Are Our BYOD Options?
CHARACTERISTICSSOLUTION
Manage devices (MDM) • Good security at the device level
• Secures device user & content
• Separate management console
• Lacks protecting network resources,
network access & “data in motion”
Restrict data (VDI) • Strong data protection
• Poor user experience
• Not for the road warrior
Control applications (MAM, MAW) • Leading edge approach
• Must be used with other controls
© 2015 InterWorks, Page 12
What Are Our BYOD Options?
CHARACTERISTICSSOLUTION
Control devices (MDM) • Good security at the device level
• Secures device user & content
• Separate management console
• Lacks protecting network resources,
network access & “data in motion”
Control data (VDI) • Strong data protection
• Poor user experience
• Not for the road warrior
Control applications (MAM, MAW) • Leading edge approach
• Must be used with other controls
Control the network (NAC) • Simple, fast, 100% coverage
• Protects data on the network, not on
the device
© 2015 InterWorks, Page 13
“No matter what BYOD strategy is selected, the
ability to detect when unmanaged devices are in
use for business purposes will be required — &
that requires NAC.”
Gartner Recommendations
Gartner, “NAC Strategies for Supporting BYOD Environments”,
22 December 2011, Lawrence Orans & John Pescatore
© 2015 InterWorks, Page 14
Multiple Security Choices
© 2015 InterWorks, Page 15
Multiple Security Choices
© 2015 InterWorks, Page 16
Multiple Security Choices
© 2015 InterWorks, Page 17
Multiple Security Choices
© 2015 InterWorks, Page 18
Multiple Security Choices
© 2015 InterWorks, Page 19
Blending These Multiple Security Choices
• MDM
• Policy & configuration management for mobile devices
• Solution for securing mobile users & content
• NAC
• Inspect & remediate devices when connecting to network
• Facilitate, monitor, & interdict access as appropriate
• Coordinate
• Reports, interfaces, alerts, & incident response
• Vendor cooperation? Critical
© 2015 InterWorks, Page 20
Network Access Policy
User Access Policy
Device Access Policy
“Points of Integration”
• Enterprise visibility
• Single policy
• Enterprise reporting
• Enrollment Automated
• On-access assessment
• Malicious activity
detected/enforced
© 2015 InterWorks, Page 21
The Enterprise Challenge:
Balance Access Agility With Security
• Employees, Guests,
Contractors
• Personal devices
• Wireless, wired,
VPN, mobile
• Data loss
• Zero-day attacks
& malware
• Endpoint integrity
• Regulations &
compliance
Security
Access
Agility
Requires real-time,
comprehensive
visibility
Requires real-time,
automated controls
© 2015 InterWorks, Page 22
End-To-End Security Automation
See
Grant
Fix
Protect
© 2015 InterWorks, Page 23
( ( ( ( ( ( (
See Grant Fix Protect
• What type of device?
• Who owns it?
• Who is logged in?
• What applications?
© 2015 InterWorks, Page 24
See Grant Fix Protect
• Grant access
• Register guests
• Block access
• Restrict access
( ( ( ( ( ( (
© 2015 InterWorks, Page 25
See Grant Fix Protect
• Remediate OS
• Fix security agents
• Fix configuration
• Start/stop applications
• Disable peripheral
© 2015 InterWorks, Page 26
See Grant Fix Protect
• Detect unexpected behavior
• Address insider threats
• Stop worm propagation
• Block intrusions
© 2015 InterWorks, Page 27
See Grant Fix Protect
MOVE & DISABLERESTRICT ACCESSALERT & REMEDIATE
Deploy a Virtual Firewall around an infected
or non-compliant device
Reassign the device into a VLAN with
restricted access
Update access lists (ACLs) on switches,
firewalls & routers to restrict access
Automatically move device to a pre-
configured guest network
Open trouble ticket
Send email notification
SNMP Traps
Syslog & SIEMs & behavior monitors
HTTP browser hijack
Auditable end-user acknowledgement
Self-remediation
Integrate with SMS, WSUS, SCCM, BigFix,
Darktrace, Cylance, etc
Reassign devices from production to
quarantine VLANs
Block access with 802.1X, ACL’s & certs
Alter login credentials to block access
Block access with device authentication
Turn off ports (802.1X/SNMP/CLI)
Terminate unauthorized apps
Disable peripheral devices
© 2015 InterWorks, Page 28
• A variety of actions are
available to manage, remediate
& restrict mobile devices
• Multiple actions can be stacked
together to provide even more
control
Mobile Security Remediation
© 2015 InterWorks, Page 29
SANS Report: “Your Pad or Mine:
Enabling Secure Personal & Mobile Device
Use on Our Network”
IDC Report: “Architecting a Flexible
Strategy for Securing Enterprise Bring Our
Own Device (BYOD)”
Whitepapers
© 2015 InterWorks, Page 30
1. Assemble a team
– Multiple IT departments
– Users across departments
10 Steps to BYOD Implementation
© 2015 InterWorks, Page 31
1. Assemble a team
2. Gather data
– Devices in use?
– Ownership of devices?
– Applications in use?
– Entry paths?
10 Steps to BYOD Implementation
© 2015 InterWorks, Page 32
1. Assemble a team
2. Gather data
3. Identify use cases
– Which applications?
– Which users? Role?
– Offline use?
– Sensitivity of data?
10 Steps to BYOD Implementation
© 2015 InterWorks, Page 33
1. Assemble a team
2. Gather data
3. Identify use cases
4. Create an economic model
– Device costs (capital)
– Data connectivity costs (expense)
– Employee stipends (expense)
– Software license costs (capital)
– Employee productivity gains
– Infrastructure costs (security, bandwidth, data protection)
10 Steps to BYOD Implementation
© 2015 InterWorks, Page 34
1. Assemble a team
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
– Which devices will we support?
– Which corporate applications?
– Which users?
– How will data be secured?
– Acceptable use?
– What if the device is lost or stolen?
– How will the endpoint be updated?
10 Steps to BYOD Implementation
© 2015 InterWorks, Page 35
1. Assemble a team
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
6. Decide how to protect our network
– Manual or automated ?
– Types of compliance checks?
– Multiple wireless networks or one network?
10 Steps to BYOD Implementation
© 2015 InterWorks, Page 36
1. Assemble a team
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
6. Decide how to protect our network
7. Decide how to protect data
– Containerization on the mobile device?
– Hosted Virtual Desktop?
10 Steps to BYOD Implementation
© 2015 InterWorks, Page 37
1. Assemble a team
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
6. Decide how to protect our network
7. Decide how to protect data
8. Build a project plan
– Remote device management?
– Cloud storage?
– Wipe devices when employees are terminated?
10 Steps to BYOD Implementation
© 2015 InterWorks, Page 38
1. Assemble a team
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
6. Decide how to protect our network
7. Decide how to protect data
8. Build a project plan
9. Evaluate solutions
– Ease of implementation?
– Cost?
– Security?
– Usability?
10 Steps to BYOD Implementation
© 2015 InterWorks, Page 39
1. Assemble a team
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
6. Decide how to protect our network
7. Decide how to protect data
8. Build a project plan
9. Evaluate solutions
10.Implement solutions
– Phased approach
– Monitor, then pilot, then full deployment
10 Steps to BYOD Implementation
© 2015 InterWorks, Page 40
1. Assemble a team
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
6. Decide how to protect our network
7. Decide how to protect data
8. Build a project plan
9. Evaluate solutions
10.Implement solutions
10 Steps to BYOD Implementation
© 2015 InterWorks, Page 41
1. Assemble a team
2. Gather data
3. Identify use cases
4. Create an economic model
5. Formulate policies
6. Decide how to protect our network
7. Decide how to protect data
8. Build a project plan
9. Evaluate solutions
10.Implement solutions
10 Steps to BYOD Implementation

Contenu connexe

Tendances

Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityNetIQ
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...NetIQ
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramNetIQ
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD PolicyKaseya
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
INTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONSINTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONSIvanti
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanNetIQ
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array NetworksIntellicomp GmbH
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker dsIvanti
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation SlidesIvanti
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 

Tendances (20)

Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
INTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONSINTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONS
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 

Similaire à 7.5 steps to overlaying byod & iot

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)Andris Soroka
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemCA Technologies
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT PatternsWSO2
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsSolarWinds
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterpriseGabriella Davis
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the CloudGaryArdito
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT securityPriyab Satoshi
 

Similaire à 7.5 steps to overlaying byod & iot (20)

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 

Plus de Caston Thomas

Master gardeners... meet... "High Yech"
Master gardeners... meet... "High Yech"Master gardeners... meet... "High Yech"
Master gardeners... meet... "High Yech"Caston Thomas
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Caston Thomas
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)Caston Thomas
 
How to adapt to the IoT
How to adapt to the IoTHow to adapt to the IoT
How to adapt to the IoTCaston Thomas
 
How to adapt to the IOT
How to adapt to the IOTHow to adapt to the IOT
How to adapt to the IOTCaston Thomas
 
The internet of things (io t) for issa v1.3
The internet of things (io t) for issa v1.3The internet of things (io t) for issa v1.3
The internet of things (io t) for issa v1.3Caston Thomas
 
Inter works golden circles for healthcare it
Inter works golden circles for healthcare itInter works golden circles for healthcare it
Inter works golden circles for healthcare itCaston Thomas
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 

Plus de Caston Thomas (8)

Master gardeners... meet... "High Yech"
Master gardeners... meet... "High Yech"Master gardeners... meet... "High Yech"
Master gardeners... meet... "High Yech"
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 
How to adapt to the IoT
How to adapt to the IoTHow to adapt to the IoT
How to adapt to the IoT
 
How to adapt to the IOT
How to adapt to the IOTHow to adapt to the IOT
How to adapt to the IOT
 
The internet of things (io t) for issa v1.3
The internet of things (io t) for issa v1.3The internet of things (io t) for issa v1.3
The internet of things (io t) for issa v1.3
 
Inter works golden circles for healthcare it
Inter works golden circles for healthcare itInter works golden circles for healthcare it
Inter works golden circles for healthcare it
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 

7.5 steps to overlaying byod & iot

  • 1. © 2015 InterWorks, Page 1 Caston Thomas 7½ Steps to “Bolt On” Mobile/Cloud/BYoD/IoT to our Existing Network & Security $$$ cthomas@iworkstech.com 586.530.4981
  • 2. © 2015 InterWorks, Page 2 What is BYOD? Option 1: BYoD refers to employees bringing their own computing devices – to the workplace for use on the corporate network. Option 2: BYoD is a change in how we move the cost of computing from corporate owned devices to personally owned devices. Option 3: BYoD is the fundamental change in how we view ownership of, not just devices, but also data, applications, & network. It changes how we approach our company’s security, responsibilities & culture.
  • 3. © 2015 InterWorks, Page 3 The BYOD/IoT Phenomenon “68% of devices used by information workers to access business applications are ones they own themselves, including laptops, smartphones & tablets.” “IT organizations typically underestimate the number of personal mobile devices on their networks by 50%.” “By 2020, 70% of “4 Pillar” buyers will have the LOB as their buyer.” 1 (4 Pillars = mobile, cloud, big data, social media) 1IDC Research, The Mobility Game Changer, June 2013
  • 4. © 2015 InterWorks, Page 4 Fight or Embrace? “The rise of “BYoD" is the single most radical shift in the economics of client computing for business since PCs invaded the workplace.” - Gartner1 “The rise of “BYoD" is the single most radical cultural shift in the corporate workplace since the copy machine.” - Caston Thomas 1Gartner “Bring Our Own Device: New Opportunities, New Challenges”, August 16, 2012
  • 5. © 2015 InterWorks, Page 5 • Data Loss – Lost phone/tablet/laptop/device – Unauthorized access – Compromised device/backdoor • APT/Malware – Threats inside the network • Compliance – Unauthorized infrastructure – Unauthorized apps (e.g., dropbox) – Unauthorized data (e.g., drug interaction database) The Risk in BYOD For more detail, a good resource is still: Gartner “Strategic Road Map for Network Access Control”, October 11, 2011
  • 6. © 2015 InterWorks, Page 6 Fight or Embrace?
  • 7. © 2015 InterWorks, Page 7 What is Our Framework? • Govern & Comply • Educate & Manage • Control & Prevent • Monitor & Detect • Respond & Mitigate
  • 8. © 2015 InterWorks, Page 8 What Are Our Options? CHARACTERISTICSSOLUTION Security Access Agility
  • 9. © 2015 InterWorks, Page 9 What Are Our Options? CHARACTERISTICSSOLUTION Manage devices (MDM) • Good security at the device level • Secures device user & content • Separate management console • Lacks protecting network resources, network access & “data in motion”
  • 10. © 2015 InterWorks, Page 10 What Are Our Options? CHARACTERISTICSSOLUTION Manage devices (MDM) • Good security at the device level • Secures device user & content • Separate management console • Lacks protecting network resources, network access & “data in motion” Restrict data (VDI) • Strong data protection • Poor user experience • Not for the road warrior
  • 11. © 2015 InterWorks, Page 11 What Are Our BYOD Options? CHARACTERISTICSSOLUTION Manage devices (MDM) • Good security at the device level • Secures device user & content • Separate management console • Lacks protecting network resources, network access & “data in motion” Restrict data (VDI) • Strong data protection • Poor user experience • Not for the road warrior Control applications (MAM, MAW) • Leading edge approach • Must be used with other controls
  • 12. © 2015 InterWorks, Page 12 What Are Our BYOD Options? CHARACTERISTICSSOLUTION Control devices (MDM) • Good security at the device level • Secures device user & content • Separate management console • Lacks protecting network resources, network access & “data in motion” Control data (VDI) • Strong data protection • Poor user experience • Not for the road warrior Control applications (MAM, MAW) • Leading edge approach • Must be used with other controls Control the network (NAC) • Simple, fast, 100% coverage • Protects data on the network, not on the device
  • 13. © 2015 InterWorks, Page 13 “No matter what BYOD strategy is selected, the ability to detect when unmanaged devices are in use for business purposes will be required — & that requires NAC.” Gartner Recommendations Gartner, “NAC Strategies for Supporting BYOD Environments”, 22 December 2011, Lawrence Orans & John Pescatore
  • 14. © 2015 InterWorks, Page 14 Multiple Security Choices
  • 15. © 2015 InterWorks, Page 15 Multiple Security Choices
  • 16. © 2015 InterWorks, Page 16 Multiple Security Choices
  • 17. © 2015 InterWorks, Page 17 Multiple Security Choices
  • 18. © 2015 InterWorks, Page 18 Multiple Security Choices
  • 19. © 2015 InterWorks, Page 19 Blending These Multiple Security Choices • MDM • Policy & configuration management for mobile devices • Solution for securing mobile users & content • NAC • Inspect & remediate devices when connecting to network • Facilitate, monitor, & interdict access as appropriate • Coordinate • Reports, interfaces, alerts, & incident response • Vendor cooperation? Critical
  • 20. © 2015 InterWorks, Page 20 Network Access Policy User Access Policy Device Access Policy “Points of Integration” • Enterprise visibility • Single policy • Enterprise reporting • Enrollment Automated • On-access assessment • Malicious activity detected/enforced
  • 21. © 2015 InterWorks, Page 21 The Enterprise Challenge: Balance Access Agility With Security • Employees, Guests, Contractors • Personal devices • Wireless, wired, VPN, mobile • Data loss • Zero-day attacks & malware • Endpoint integrity • Regulations & compliance Security Access Agility Requires real-time, comprehensive visibility Requires real-time, automated controls
  • 22. © 2015 InterWorks, Page 22 End-To-End Security Automation See Grant Fix Protect
  • 23. © 2015 InterWorks, Page 23 ( ( ( ( ( ( ( See Grant Fix Protect • What type of device? • Who owns it? • Who is logged in? • What applications?
  • 24. © 2015 InterWorks, Page 24 See Grant Fix Protect • Grant access • Register guests • Block access • Restrict access ( ( ( ( ( ( (
  • 25. © 2015 InterWorks, Page 25 See Grant Fix Protect • Remediate OS • Fix security agents • Fix configuration • Start/stop applications • Disable peripheral
  • 26. © 2015 InterWorks, Page 26 See Grant Fix Protect • Detect unexpected behavior • Address insider threats • Stop worm propagation • Block intrusions
  • 27. © 2015 InterWorks, Page 27 See Grant Fix Protect MOVE & DISABLERESTRICT ACCESSALERT & REMEDIATE Deploy a Virtual Firewall around an infected or non-compliant device Reassign the device into a VLAN with restricted access Update access lists (ACLs) on switches, firewalls & routers to restrict access Automatically move device to a pre- configured guest network Open trouble ticket Send email notification SNMP Traps Syslog & SIEMs & behavior monitors HTTP browser hijack Auditable end-user acknowledgement Self-remediation Integrate with SMS, WSUS, SCCM, BigFix, Darktrace, Cylance, etc Reassign devices from production to quarantine VLANs Block access with 802.1X, ACL’s & certs Alter login credentials to block access Block access with device authentication Turn off ports (802.1X/SNMP/CLI) Terminate unauthorized apps Disable peripheral devices
  • 28. © 2015 InterWorks, Page 28 • A variety of actions are available to manage, remediate & restrict mobile devices • Multiple actions can be stacked together to provide even more control Mobile Security Remediation
  • 29. © 2015 InterWorks, Page 29 SANS Report: “Your Pad or Mine: Enabling Secure Personal & Mobile Device Use on Our Network” IDC Report: “Architecting a Flexible Strategy for Securing Enterprise Bring Our Own Device (BYOD)” Whitepapers
  • 30. © 2015 InterWorks, Page 30 1. Assemble a team – Multiple IT departments – Users across departments 10 Steps to BYOD Implementation
  • 31. © 2015 InterWorks, Page 31 1. Assemble a team 2. Gather data – Devices in use? – Ownership of devices? – Applications in use? – Entry paths? 10 Steps to BYOD Implementation
  • 32. © 2015 InterWorks, Page 32 1. Assemble a team 2. Gather data 3. Identify use cases – Which applications? – Which users? Role? – Offline use? – Sensitivity of data? 10 Steps to BYOD Implementation
  • 33. © 2015 InterWorks, Page 33 1. Assemble a team 2. Gather data 3. Identify use cases 4. Create an economic model – Device costs (capital) – Data connectivity costs (expense) – Employee stipends (expense) – Software license costs (capital) – Employee productivity gains – Infrastructure costs (security, bandwidth, data protection) 10 Steps to BYOD Implementation
  • 34. © 2015 InterWorks, Page 34 1. Assemble a team 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies – Which devices will we support? – Which corporate applications? – Which users? – How will data be secured? – Acceptable use? – What if the device is lost or stolen? – How will the endpoint be updated? 10 Steps to BYOD Implementation
  • 35. © 2015 InterWorks, Page 35 1. Assemble a team 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect our network – Manual or automated ? – Types of compliance checks? – Multiple wireless networks or one network? 10 Steps to BYOD Implementation
  • 36. © 2015 InterWorks, Page 36 1. Assemble a team 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect our network 7. Decide how to protect data – Containerization on the mobile device? – Hosted Virtual Desktop? 10 Steps to BYOD Implementation
  • 37. © 2015 InterWorks, Page 37 1. Assemble a team 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect our network 7. Decide how to protect data 8. Build a project plan – Remote device management? – Cloud storage? – Wipe devices when employees are terminated? 10 Steps to BYOD Implementation
  • 38. © 2015 InterWorks, Page 38 1. Assemble a team 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect our network 7. Decide how to protect data 8. Build a project plan 9. Evaluate solutions – Ease of implementation? – Cost? – Security? – Usability? 10 Steps to BYOD Implementation
  • 39. © 2015 InterWorks, Page 39 1. Assemble a team 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect our network 7. Decide how to protect data 8. Build a project plan 9. Evaluate solutions 10.Implement solutions – Phased approach – Monitor, then pilot, then full deployment 10 Steps to BYOD Implementation
  • 40. © 2015 InterWorks, Page 40 1. Assemble a team 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect our network 7. Decide how to protect data 8. Build a project plan 9. Evaluate solutions 10.Implement solutions 10 Steps to BYOD Implementation
  • 41. © 2015 InterWorks, Page 41 1. Assemble a team 2. Gather data 3. Identify use cases 4. Create an economic model 5. Formulate policies 6. Decide how to protect our network 7. Decide how to protect data 8. Build a project plan 9. Evaluate solutions 10.Implement solutions 10 Steps to BYOD Implementation