Team G-Force: Jason, Veronica, Doug and Socrates Multiple Device Authentication for the Cloud MSIT 458 11.17.12.

Slides:



Advertisements
Similar presentations
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Network Systems Sales LLC
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
McAfee One Time Password
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Security for Mobile Devices
Mobile Asset Disposition in a BYOD World Craig Boswell HOBI International, Inc.
© Robert G Parker – UW-CISA 2010 S-1 New and Emerging Technologies 3 - New and Emerging Technologies.
BYOD – Panel Discussion Introductions – Who, where, what have you done so far in BYOD  Peter Mariahazy – MBM, Director of Technology & HR  John Messer.
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
Steps to Compliance: Bring Your Own Device PRESENTED BY.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Will you need your umbrella?.  Objective: Explain the Cloud In business terms, so you can see if it will benefit you.  Agenda: 12:00 – Welcome and Introductions.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Information Security Technological Security Implementation and Privacy Protection.
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
Wireless Password:  “The cloud” is real  Electronic data growth is rapid and pervasive  Employees use the cloud to conduct government work.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Security considerations for mobile devices in GoRTT
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
Jessica Dyer Emerge Mobile Tech Emerging Safety Technology.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Leveraging Mobile Technology to Increase Productivity.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Easily secure your EDGE data, unlock the value. 2 Your data is on the edge.
Wyse.com David Angwin Vice President, Field Marketing Managing mobility in a changing device landscape.
Robert J. Scott. Agenda Licensing Models Perpetual vs. Subscription User vs. Device Agreement Types Microsoft Business and Services Agreement Online Subscription.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Moving to BYOD Gary Audin 1.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Unified Communications – Use and Advantages If you deal with business communications or head an organization where the right emphasis is put upon effective.
Workshifting Transform your business – empower your people.
Total Enterprise Mobility Comprehensive Management and Security
Bring Your Own Device Issues and Opportunities of Moving Beyond the NID.
Info-Tech Research Group1 Choose a Consumerization Strategy Find the right path for your organization.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
BYOD Security Risks Presentation by Ravi Namboori Visit
Mobile Cloud Market to Global Analysis and Forecasts by User Type, End-users No of Pages: 150 Publishing Date: Jan 2017 Single User PDF: US$ 3900.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Challenges facing Enterprise Mobility
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
Mobile Device Management
Introduction to BYOD EIT, Author Gay Robertson, 2017.
The MobileIron® Threat Detection difference:
Presentation transcript:

Team G-Force: Jason, Veronica, Doug and Socrates Multiple Device Authentication for the Cloud MSIT

2Team: G Force Multiple Device Authentication for the Cloud Trudy Work Blackberry Personal IPhone Work Desktop Personal Ipad Personal Dell Laptop circa 2011 with Windows 2010 Work Dell Laptop circa 2009 with Windows 2007

Team: G Force When we started doing research for our project, we found that this scenario was taking place all over the world

Team: G Force The Change of Mobile Devices in the Workplace BS (before smartphones)  The promise of productivity improvements quickly spread to the corporate world and employees were systematically armed with cell phones and PCs.  Now employees could be contacted and work from anywhere  Blackberries were the only game in town AS (after smartphones)  Corporations didn’t see the need to upgrade their employees to smartphones  So people brought their personal smartphone to the office  The smartphone was the new rock star  A paradigm shift is taking place BlackBerry 850 was the first BlackBerry device introduced in 1999.

Paradigm Shift Takes Place Team: G Force  At first IT turned a blind eye to the use of personal devices in the workplace until the impact of this trend became to great to ignore

Team: G Force Personal Routers Polluting NU Wireless Network  Northwestern students are coming to campus more tech-savvy than ever before and with more wireless-ready devices.  Students setting up unauthorized personal wireless routers and access points in the Residence Halls are impacting wireless service.  “This is creating conflicts and service challenges for others using the Northwestern Wi-Fi network,” said Wendy Woodward, director of NUIT Technology Support Services.  “We strongly recommend that students access the Northwestern wireless network directly and contact the NUIT Support Center if they have questions or

Team: G Force  Instead of continuing to ignore the personal devices that employees were bringing into the workplace, a trend has began to emerge called: o BYOD : Bring Your Own Device o BYOT : Bring Your Own Technology  BYOD means that companies allow employees to use their own personal devices in the workplace instead of those issued by their company.  It is estimated that 90% of companies will offer BYOD by 2014 Introduction of BYOD

Team: G Force The Benefits of BYOD  The biggest benefit of allowing BYOD is employee satisfaction  Exposure to cutting edge technology  No more slow technology refresh and upgrade cycles Here are just a few benefits:

Team: G Force Problems with BYOD Companies must think and plan before they jump on the BYOD bandwagon  The modification of corporate policy is the first thing to consider out before any changes IT will need to be present! Which devices will be permitted? Will individuals have to take more responsibility for trouble shooting and support Who pays for the device? What about the cloud?  There are many more considerations, some of which will be covered later in the presentation.

Team: G Force Cloud Computing is the latest buzz word:  It sounds sexy, new and modern  It promises cost savings in a down economy  It brings its own privacy and security concerns  When considered in conjunction with BYOD there is much to discuss!

Current: Old School… User ID Password SSL Team: G Force

Team: G Force Implementation Architecture TAC Client TAC Gateway

Gateway Architecture Team: G Force

How does it work? Team: G Force First Packet Authentication occurs BEFORE connection is established.

How do we do it? Team: G Force

Team: G Force A more elegant solution : Authenticate the device before any data is transmitted! Can our product allow us to compete with these companies? Should we?

Team: G Force – Acceptable use policy on personal devices is difficult to manage – Compliance mandates must still be followed (PCI, HIPAA, GLBA) if this data is accessed on BYOD Incident detection & breaches – Securing corporate and personal data from malware and malicious apps – Shared device and auto-login * Good Technology State of BYOD Report, Jan 2011 Security Risks

Team: G Force Productivity Benefits Benefits  Using BYOD can result in savings of up to $80 / mo / user*  Mobility yields higher productivity benefits Type of WorkerActivityValue ExecutiveCollaboration$1,300 Field SalesCustomer Face Time$700 Knowledge WorkerProductivity$300 * Good Technology State of BYOD Report, Jan 2011

Team: G Force Legal Risks Privacy & Liability – Corporate device  Employers have 100% access to data per SCOTUS – Personal device  Employers do not necessarily have access rights to data Medical information Personal pictures Your location Confidentiality + Trade Secrets – Trade secrets are no longer secret on personal devices E-Discovery and electronic evidence Integrity – destruction of personal data via remote command Intellectual Property ownership

Team: G Force Business Benefits Operating Expenses – no more data plans on income statement Capital Expenses – no more devices on income statement Fact: This is how people want to work – Who wants to carry personal and work devices? – Recruitment of young talent – Increase of mobile productivity

Team: G Force Solution that fits many different business segments “ BlackRidge is thrilled to be working with Sypris Electronics on integrating our TAC technology within the Sypris key management framework,” - Bob Graham, Chairman and CEO of BlackRidge Technology. “We believe the combined solution will give government customers an unparalleled level of protection.” - Bob Graham, Chairman and CEO of BlackRidge Technology.

Team: G Force How to manage personal devices in the enterprise… 1.Create Thy Policy Before Procuring Technology 2. Seek The Flocks’ Devices 3. Enrollment Shall Be Simple 4. Thou Shalt Configure Devices Over the Air 5. Thy Users Demand Self-Service 6. Hold Sacred Personal Information 7. Part the Seas of Corporate and Personal Data 8. Manage Thy Data Usage 9. Monitor Thy Flock—Herd Automatically 10. Drink from the Fountain of ROI By Rob Patey, art by Nathan Salla

Team: G Force Back – Up Slides Multiple Device Authentication for the Cloud

Trend in Mobile Device Ownership Team: G Force ~235,000,000

Demographics of Smartphone Owners

Team: G Force Workplace Reality