Mobile Device Security Group Magic: Michael Gong Jake Kreider Chris Lugo Kwame Osafoh MSIT 458 – Information Security October 30, 2010.

Slides:



Advertisements
Similar presentations
Cellular Networks.
Advertisements

1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Mobile Device Security MSIT Information Security December 4, 2010 Team Magic: Michael Gong Jake Kreider Chris Lugo Kwame Osafoh-Kantanka.
© 2009 Avaya Inc. All rights reserved. Page 1 AT&T Mobile Extension with Avaya one-X Mobile.
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
November 2012 | Cancun, Mexico. Avaya - Proprietary. Use pursuant to your signed agreement or Avaya policy. 2 Networking Innovation Lounge Virtual.
Team MAGIC Michael Gong Jake Kreider Chris Lugo Kwame Osafoh-Kintanka Wireless Network Security.
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
Impact of Mobile Technology Tim Nesler CIO and Associate VP for Information Technology Services Santa Fe College League for Innovation 2011 CIO Summit.
Hidden Apps Carrier IQ and Privacy in Mobile Devices.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Cloud Usability Framework
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
| imodules.com Making Your Site Mobile-Ready Presented by: Mark Werner & Chris Smith.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Welcome to the Cloud Era Mohammed Owais.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Lecture 4 Page 1 CS 236 Online Prolog to Lecture 4 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
New Antenna Technology for Next Generation Wireless Mobile Devices Al Petrick September 1, 2009.
Accompanying notes to presentation What you need to know This presentation is part of the Art of connecting. There are four themes in total, each with.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Security considerations for mobile devices in GoRTT
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Portal Vision and Strategy. Table of Contents Problem statement Solution Sharepoint 2007 features Current Architecture Assessment New portal architecture.
In a world of platform complexities and bring-your-own-device, IT departments want cost-effective ways to manage app deployments and user expectations.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Grow with Cisco’s Made-for-Midmarket Portfolio Inspire Growth, Productivity,
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
Internet of Things Identifying business opportunities
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
2015 October 5 th - 6 th 3 Things You Need to Know to Capitalise on Enterprise Mobility Suite How to Unlock EMS.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Nextiva UCaaS. 2 Nextiva Proprietary and Confidential, do not copy, duplicate or distribute. Nextiva.com Transition to Emerging Technologies Today Many.
What are Background Checking Applications? By: Intelifi Screening Technology.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
- Company Confidential - Corporate Overview March 2015.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Workshifting Transform your business – empower your people.
Total Enterprise Mobility Comprehensive Management and Security
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Barracuda Mobile Device Manager
The time to address enterprise mobility is now
Android Access Control
Data and database administration
Challenges facing Enterprise Mobility
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
Matt G change over point ?
HP Networking OpenFlow in Action
VPN What, where, who, why when?.
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
The MobileIron® Threat Detection difference:
Android Access Control
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Presentation transcript:

Mobile Device Security Group Magic: Michael Gong Jake Kreider Chris Lugo Kwame Osafoh MSIT 458 – Information Security October 30, 2010

Background  Mobility continues to become an increasingly vital component of our everyday lives  Prevalence of 3G/4G cellular services enable being connected at all times to the corporate and social networks  Employers continue to seek new ways to capitalize on being connected with their employees  Employees want a simple but feature rich platform  Employees want the freedom and simplicity to use a device of their choosing  Mobile interaction between user and company systems must be seamless  Mobility without compromising security

Problem Statement With the explosive growth of smartphones, tablets and mobile devices, companies must find a means of providing access to their internal systems and information to their mobile workforce securely and seamlessly.

Security Threat: Confidentiality  Proper device access  Device theft/loss  Data loss / information leakage  Ownership rights  End-user right to privacy  Struggle with information accessibility

Security Threat: Availability  Always-on accessibility  Disparate technologies / carrier agreements  Malware/virus detection & prevention  High availability / resiliency across platforms  Adherence to company-wide information security policies