Deploying and Managing Mobility Securely Jason Langridge UK Mobility Business Manager.

Slides:



Advertisements
Similar presentations
Security Features in Microsoft® Windows® XP James Noyce, Senior Consultant Security Solutions Team, Business Critical Services Microsoft Security Solutions,
Advertisements

Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Workspace Concept and Technology Overview Ceedo Client Workspace.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
The slides for this event will be posted at:
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Windows 2003 and 802.1x Secure Wireless Deployments.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Policy and Configuration Compliance for Devices Connecting to the Wireless Network.
Week #7 Objectives: Secure Windows 7 Desktop
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Deploying and Managing Mobile Devices in the Enterprise.
70-411: Administering Windows Server 2012
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 14: Configuring Server Security Compliance
George L. Heron Technology Officer, SafeNet, Inc..
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Module 9: Fundamentals of Securing Network Communication.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Helping to Secure Data while on the Run Greg Milligan Mobility Solutions Manager Microsoft Canada Co.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Microsoft Management Seminar Series SMS 2003 Change Management.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Wireless and Mobile Security
Mobile enabling existing applications. BMIST DD 1380 ReadinessSF 600.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Introduction TO Network Administration
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Deploying Mobility Securely. The Risks It’s just my calendar! Theft and loss Personal device ownership Malicious software Cracking and hacking.
2 nd September Mobile Device Security Jason Langridge Mobile and Embedded Device Division 2 nd September, 2004.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Chapter 7. Identifying Assets and Activities to Be Protected
Microsoft Windows NT 4.0 Authentication Protocols
Security Issues.
Configuring and Troubleshooting Routing and Remote Access
On and Off Premise Secure Access
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
Implementing Client Security on Windows 2000 and Windows XP Level 150
Designing IIS Security (IIS – Internet Information Service)
IT Management, Simplified
Presentation transcript:

Deploying and Managing Mobility Securely Jason Langridge UK Mobility Business Manager

Agenda Observations and Questions for you! What are we protecting? Threats and how to mitigate them Managing and enforcing policy Summary

Statements and observations Security is an excuse – not a reason not to deploy a mobile solution A Smartphone/Pocket PC is not the same as a PC – it’s just a phone/PDA that got really really smart The use of mobile devices is very different to a laptop Security and Device Management are not independent they are intrinsically linked

Questions for you! Do you have a mobile device security policy? – It’s not the same as a laptop policy. Do you let security influence your choice of device or platform? Who is handling your data as it goes from its corporate home to your users’ mobile devices? Is security designed into any custom mobile apps — or an afterthought?

What Are We Protecting? The physical device? Corporate Knowledge? Misuse of Resources (and increased costs)? Corporate legal exposure: – Sarbanes-Oxley, GLBA (US), – Privacy Directive, Data Protection Directive (EU), and “Safe Harbor” Principles (US) – OECD Fair Information Practices – CFAA (Computer Fraud and Abuse Act)

Fundamental Tradeoff Secure UsableCost You get to pick any two!

Threats and how to mitigate them Major threat categories – Unauthorized Access to device – Unauthorized Access to data – Interception of data – Viruses and trojan applications Perform Risk Assessment Establish Policy for: 1. Device Password 2. Anti-Virus 3. Application Installation and Execution 4. Transmission of Data 5. Data Protection

1. Device Password 4-digit PIN (Pocket PC) Strong password (Pocket PC & SmartPhone) >4 digit PIN (Smartphone) Exponential delay with incorrect password Password protected ActiveSync partnership Now enforceable and manageable through MSFP and SMS

2. Anti-Virus Software Built-in APIs for Anti-virus solutions – Computer Associates – F-Secure – McAfee – SOFTWIN – Airscanner – Trend Personal Firewall – Bluefire Security Technologies – Check Point VPN-1 SecureClient

3. Application Level Security Security Policies Configured via the Security Configuration Service Provider Unsigned Applications PolicyDisables execution of unsigned apps Unsigned CABS Policy Disables installation of unsigned applications Unsigned Prompt Policy Code Enables prompt-mode for unsigned installation and execution Privileged Applications PolicyEnables “1 tier” or “2 tier” security model

3. Application-level Security “1 tier” and “2 tier”? Smartphone supports “2 tier”: If an application is not blocked, it could be signed for one of 2 different trust levels – Trusted: Access to all registries, APIs, hardware interfaces – Normal: Exists only on two-tier devices – Some APIs restricted, parts of Registry are read-only – >95% of device accessible, adequate for almost all apps – Intended as a way to improve reliability of apps, not a primary defense against damage from malicious code

3. Application-level Security “1 tier” and “2 tier”? New to Windows Mobile 5.0: Pocket PC supports “1 tier” – The configuration or application is either blocked completely or trusted completely

4. Securing transmission of data Network Authentication – NTLM versions 1 and 2 – SSL Basic and TLS Client Authentication WiFi 802.1x user auth using – Protected EAP (PEAP) – EAP/TLS (cert-based) – WPA

4. Windows Mobile VPN VPN Name Mutually Authenticated Standards Based Password Only PPTP/MSCHAPv2 Layer 2 Tunneling Protocol Third Party VPN solutions

5. Data Protection Limit the data to just what is needed…. Cryptographic services for applications are built-in (Crypto API v2) SQL-CE provides 128-bit encryption (PPC only) 3 rd Party options: CompanyProduct Applian TechnologiesThe Pocket Lock offers both file and folder encryption. Asynchrony.comPDA Defense for the Pocket PC encrypts databases, files, and memory cards. Cranite SystemsWirelessWall provides AES data encryption for Pocket PCs Developer One, Inc.CodeWallet Pro provides a secure way to store and access important information on your Pocket PC or Smartphone Handango, Inc.Handango Security Suite for Pocket PC provides file and data encryption. Pointsec Mobile Technologies Pointsec for Pocket PC encrypts all data stored in the device, whether in RAM or on external storage cards. SoftWinterseNTry 2020 encrypts data on external storage cards. Trust Digital LLCPDASecure secures access to a Pocket PC and encrypts the data on it. It also prevents unauthorized infrared beaming of data.

Perimeter protection – Device lock: PIN, Strong, exponential delay – Authentication protocols: PAP, CHAP, MS-CHAP, NTLM, TLS Data protection – 128-bit Cryptographic services: CAPIv2 – Code signing (SmartPhone only) – Anti-virus API Network protection – OTA device management security – Secure Browsing: HTTP (SSL), WAP (WTLS) – Virtual Private Networking (PPTP, L2TP IPSec) – Wireless network protection (WEP, 802.1x, WPA) Summary of Windows Mobile Security Features

Mobile Device Management and Security Challenges Devices infrequently connected to an organisation’s network Low bandwidth, higher cost connections Unreliable connections Device loss that leads to work stoppage

Customer requests for mobile device management Security – Data protection – Ensuring corporate data on the device is secure Configuration – Applying settings – Applying networking, application and security settings Inventory – Asset and version tracking – Storing device serial numbers, OS and application versions Application deployment and update – Deploying applications, and updating or patching based on version OS Deployment and update MSFP will provide

SMS 2003 Device Management Feature Pack (DMFP) Add-on to SMS 2003 SP1 to manage Pocket PC, Pocket PC Phone and Windows CE based devices Components install on SMS 2003 site systems Client agent installs on Windows Mobile devices via SD Card or Activesync Device clients can connect direct to the SMS server independent of a PC Aimed at the major feature requests

Feature Set Hardware/Software inventory File collection Software distribution Script execution Settings management Password policy management Automated client distribution via SMS 2003 Advanced Client desktop

Mobile Device Management – Working environments Customers already deployed or licensed for SMS Support for both personal and line of business devices Flexible configuration required SMS 2003 Device Management Feature Pack (DMFP) Customers who don’t currently have a management solution in place Managing critical business processes Robust configuration management b2m solutions - mProdigy

Mobile Enterprise Management Tom Fell Mobile Systems Architect, b2m solutions

Device Management Asset Management Communications Management Supplier Management Application Monitoring mProdigy Five Software Modules Focus for today’s presentation

mProdigy Features “Hands off” commissioning of devices Deployment Profiles – detailed device configuration management – provides tight control whilst maintaining flexibility – support multiple device types in the same operational role Patches for “ad-hoc” updates Remote diagnostics Remote warm / cold reboot Cold boot resilience Distributed deployment

mProdigy Features Asset register includes details of devices and associated peripherals Repair loop management Event tracking (used by Supplier Management & Application Monitoring) Alerts Manage devices by group / location / function GPRS / /Ethernet Support Efficient and robust communications infrastructure (optimised protocol for “pay per byte” networks)

Device Management Asset Management Communications Management Supplier Management Application Monitoring mProdigy Five Software Modules Change Management Technology Management

Mobile Device Management Demonstration Tom Fell Mobile Systems Architect, b2m solutions

Summary and Recommendations Security is no longer an excuse Define a security policy for mobile devices Find out how many devices are in use in your organisation! If you need: – Security Policy and Password Policy control – MSFP – Software deployment, settings management and asset control – Management Solution

References Windows Mobile Security White paper – security.mspx security.mspx Security Product Solutions – utions/security/secsearch.aspx utions/security/secsearch.aspx

Signature authentication – Certicom Corporation – Communication Intelligence Corporation – TSI/Crypto-Sign – VASCO Enhanced password protection – Hewlett-Packard Pictograph authentication – Pointsec Mobile Technologies Fingerprint authentication – Biocentric Solutions Inc. – HP iPAQ 5400 Card-based authentication – RSA Security – Schlumberger Sema Certificate Authentication on a Storage Card – JGUI Software Storage Encryption – F-Secure – Pointsec Mobile Technologies – Trust Digital LLC Encrypt Application Data – Certicom Corporation – Glück & Kanja Group – Ntrū Cryptosystems, Inc. Virtual Private Networking – Certicom Corporation – Check Point Software Technologies Ltd. – Columbitech – Entrust, Inc. – Epiphan Consulting Inc. Disable Applications – Trust Digital LLC Device Wipe – Asynchrony.com Public Key Infrastructure (PKI) – Certicom Corporation – Diversinet Corp. – Dreamsecurity Co., Ltd. – Glück & Kanja Group Thin Client Technology – Citrix – FinTech Solutions Ltd. – Microsoft 3 rd Party Solution Providers