©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey

Slides:



Advertisements
Similar presentations
1/4/2014 Enterprise to Cloud Mobilize, Secure & Accelerate your Business Customer Date `
Advertisements

| Toll-free: How to have both Productivity and Security for Remote Access Solution in a HIPAA Environment Tom.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Workspace Concept and Technology Overview Ceedo Client Workspace.
McAfee One Time Password
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Securely connecting users and applications from anywhere to anywhere in todays global economy MY-ARRAY DesktopDirect Bring.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
1©2013 Check Point Software Technologies Ltd. [Protected] Non-confidential content Top 10 Security Best Practices for Small Business Small business need.
IBM Endpoint Manager for Mobile Devices Mobile Device Management
1 Confidential Lessons Learned from the First Generation of Mobile Apps Sean Ginevan, Product Management MobileIron - Confidential1.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
Lesson 30 Computer Safety and Ethics
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
Designing Enterprise Mobility Cortado Corporate Server.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
Meraki Mobile Device Management
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
© 2008 McAfee, Inc. “Endpoint” Security Defining the endpoints and how to protect them.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
New Data Regulation Law 201 CMR TJX Video.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Network Security in a Business Setting By: Brian Haumschild.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Introduction TO Network Administration
User and Device Management
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Computer Security Sample security policy Dr Alexei Vernitski.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Barracuda SSL VPN 2012.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda Mobile Device Manager
Customized Solutions to your needs
Virtual Private Networks (VPN)
Check Point Connectra NGX R60
Presentation transcript:

©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey

2 2©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Early years solutions

3 3©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | … and then it became easier … and then it became easier Laptops brought freedom… Laptops brought freedom…

4 4©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Mobile Workforce Challenges Access from anywhere… While maintaining security

5 5©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Keep communication private The Security Challenges Protected device access (passcode, encryption, etc.) Allow access only to the needed information Allow access only to device owner

6 6©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Four Scenarios for Mobile Security Background | Challenges | Needs | Best Practices Check Point Solution Background | Challenges | Needs | Best Practices Check Point Solution BetMore Gaming Equipment Company Personal Mobile and portable devices YourRHired Human Resources Company Personal PCs and Contractors OnTheGo High Tech Company Many managed laptops Roadwarriors LotsToMake Manufacturing Company Managed laptops Little travel

7 7©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | OnTheGo High Tech Company OnTheGo Background –Large mobile workforce –Employees issued company owned laptops –Employees work from home, coffee shops and travel frequently –Users need to access corporate resources at any given time –Employees shares fair amount of sensitive data Challenges –Employees let their kids play with computers, a number of unauthorized apps are downloaded –IT must manage security policy on 10,000 laptops –Sensitive data has found its way into competitors hands lately Needs –Access to native applications (like SAP and a homegrown application) –Keep employees productive –Ensure only endpoints that comply with security policy are able to access corporate resources –Protect corporate data

8 8©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | OnTheGo High Tech Company OnTheGo Best Practices –Encrypt laptop in case of theft or loss during travel –Ensure any data leaving the laptop is encrypted –Control programs allowing only authorized apps to be run –Protect the laptop from malware –Firewall the road warriors –Protect from drive-by downloads –Use an always-on IPSec VPN solution for access to native applications

9 9©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Solution for OnTheGo Protect against drive-by-downloads, phishing sites and zero-day attacks Stop unwanted traffic, prevent malware and block targeted attacks Automatically and transparently secure all information on endpoint hard drives Centrally enforceable encryption of removable media and port control Protects your endpoint from unsecure, malicious and unwanted applications Provide secure, seamless access to corporate networks remotely

10 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | LotsToMake Hardware Manufacturing CompanyLotsToMake Background –Employees issued company owned laptops –Employees occasionally work from home and travel –Users need to access corporate resources sometimes –Has a firewall today but no remote access –Existing AV and File based Encryption solution Challenges –Travel and working from home occasional, but happens often enough to worry –Small IT group must manage security too Needs –Occasional access to native applications (Oracle) –Keep employees productive, no matter where they are –Protect corporate resources

11 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | LotsToMake Hardware Manufacturing CompanyLotsToMake Best Practices –Encrypt laptop in case of theft or loss during travel –Ensure any data leaving the laptop is encrypted –Control programs allowing only authorized apps to be run –Protect the laptop from malware –Firewall the road warriors –Protect from drive-by downloads –Use an always-on IPSec VPN solution for access to native applications –Continue using current Endpoint Protection Solution Even though occasionally mobile, security is still key

12 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Solution for LotsToMake Endpoint Security client: VPN, FDE, Compliance, Anti-Malware Managed VPN access from central Gateway Includes a Desktop Firewall

13 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | YouRHired Human Resources CompanyYouRHired Background –Employees use desktops at work and personal PCs or Macs at home –Some Contractors are used as sales force –Users occasionally need to access corporate resources from home –Have a Check Point Gateway Challenges –Employees complain that they need access to intranet and internal applications (Inventory Application) –Contractors need access to some web-based applications (SalesForce) –Company is cutting budget on IT spending Needs –Secure access to corporate data from unmanaged employee and contractor computers –Employees need access to network based, home-grown application –Protect corporate resources

14 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | YouRHired Human Resources CompanyYouRHired Best Practices –Allow Contractors secure access to web-based applications through browser-based secure encrypted connection –Allow Employees secure access to network-based applications with browser plug-in –Check compliance of any endpoint accessing your network or specific applications –Train and encourage secure home use of PCs

15 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Solution for YouRHired SSL VPN Web Portal Easy and secure access to critical resources Connect through a standard Web browser SSL VPN Web Portal Easy and secure access to critical resources Connect through a standard Web browser Shared files Web Portal for PC and Mac using SSL VPN Web apps Web mail On-demand, dissolvable SSL VPN agent for non- web-application access (SSL Network Extender) Endpoint Security On-demand Secure Workspace

16 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | BetMore Gaming Manufacturing CompanyBetMore Background –Large mobile workforce –Employees want access from their own personal mobile devices (iPhones, iPads, Android devices, etc.) –Users want to access corporate resources at any given time Challenges –Securing the enterprise being accessed by unmanaged devices –Difficult to manage unmanaged devices –Employees are concerned of losing personal freedom of their device Needs –Keep communication private –Verified access for employees only (2-factor authentication) –Allow access only to authorized applications

17 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | BetMore Gaming Manufacturing CompanyBetMore Best Practices –Allow corporate access only through encrypted communication –Create policy of Remote-Wipe if users device is lost or stolen –Choose a solution that increases productivity for employees, but easy to support –Easy for end user –Dont end up supporting user-owned devices –Minimize corporate intrusion on the employee owned device

18 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Solution for BetMore Certificate and username/password Pair device with its owner for a safer connection Two-factor authentication for safe connectivity

19 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | User and Device Access Control Personalized portal, based on identity Set up device security features Control data access by user and device settings Remote-wipe device upon loss

20 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Protect Your Internal Servers Shield your mail and web servers All Active Sync & Web traffic is secured by SSL VPN technology

21 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Simple for the End User Download App Enter your password Gain secure access to your data!

22 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Simple for the Administrator Enable Mobile Access Blade on your gateway Set access policies for users Generate and send an activation key to the users

23 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Mobile Client for Android Full VPN client (Layer 3 IPSec) Web application access via SSL VPN Strong authentication – two factor User/Pass and Certificate Device-to-user pairing Automatic certificate enrollment Easy access to application Concurrent users license

24 ©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Remote Access Strategy Remote access solutions for a variety of endpoint scenarios

©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Thank You!