ANDROID DATA CONFIDENTIALITY Tips and tools for keeping corporate confidential information confidential on Android Mobile Devices. Alex Mayer University.

Slides:



Advertisements
Similar presentations
Presented By Krypto Security Software, LLC. What is BackStopp is a simple but effective tool to help an organization protect its mobile data in the event.
Advertisements

Clovers Connected Classroom Welcome to Our district mission is to prepare each child for a successful, productive and responsible future. Mobile devices.
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Mobility in Government Consolidation & Wrap-up Lee Naik3 Oct 2013.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
Help enable mobile productivity. For years, companies have leveraged Microsoft solutions for their productivity needs. In an evolving cloud-first and mobile-first.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
Company Background  Leb Shama Company Limited  Founded in 1999  Focus – Online backup software development  Business Strategy - Rely.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Computer communication
MobeSys Technologies MobeSys – helping you overcome mobile technology challenges.
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Confidential The Power to Connect. On-the-go presentations in client’s office and outside meeting locations are made professional and worry free. CircleMobile.
Dr.Backup Online Backup Service (888) (toll free)
Gauteng Provincial Government
TEMPLATE DESIGN © Android Data Confidentiality Alex Mayer University of Houston Abstract Employees are increasingly relying.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
The Importance of Investment Recovery... Sam Reynolds.
© Huron Consulting Group. All rights reserved Confidential Information. Experience. Redefined. BOSTON CHARLOTTE CHICAGO HOUSTON LOS ANGELES NEW YORK SAN.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
SOCIAL IMPACT OF COMPUTERS
Mobile Device Management Overview Information Security Office.
Information Systems Security
The State of Computer & Data Security in Corporations Independent Survey.
Microsoft ® Windows ® Small Business Server 2003 R2 Sales Cycle.
Module 6: Designing Security for Network Hosts
Good MDM IOS Overview Presented by: Jerry Wen 02/09/2012.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
What is virtualization? virtualization is a broad term that refers to the abstraction of computer resources in order to work with the computer’s complexity.
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Information Systems in Organizations 3.2 Systems Management.
User and Device Management
Objectives how to use a systematic, top-down process when designing computer networks focuses on the first step in top-down network design: analyzing your.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Customer Success Stories. How BlackBerry ® Enterprise Service 10 and BlackBerry ® 10 are helping to solve mobility challenges for leading enterprises.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
CASE STUDY DPS NEWTOWN. Diversity of Operations.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
What Are the Different Platforms for Enterprise Mobility Solutions?
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
INTRODUCTION TO DESKTOP SUPPORT
Protecting PHI & PII 12/30/2017 6:45 AM
Describe the responsibilities of financial-information management in an organization
Transforming business
Tim Carter Sales Director Sybase Confidential Propriety.
Archive / Destruction / Disposal
Tim Carter Sales Director Sybase Confidential Propriety.
MICROSOFT AZURE ISV PROFILE: ONEBE
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

ANDROID DATA CONFIDENTIALITY Tips and tools for keeping corporate confidential information confidential on Android Mobile Devices. Alex Mayer University of Houston

Abstract  Employees are increasingly relying on mobile devices to perform daily job functions. Today's mobile devices are what connect the employee back to the office. Confidential company information remains on the mobile devices after they are at the end of their lifecycle. Company’s need to be able to secure confidential data left on mobile devices in order to meet security and business policy objectives.

Mobile Device’s in Corporate Environments  Most, if not all large companies issue mobile devices to their employees  Mobile devices can connect to any and all information systems used by companies  Confidential company information is stored on mobile devices and remains on the devices when they reach the end of their life cycle  When a mobile device malfunctions, it is important to get into the device and backup the confidential data and destroy any and all traces of that data.  The Android operating system is fast replacing RIM and Windows Mobile devices which shows in the 3Q of 2010 to own 25% of the market share

Data Remanence Lost/Stolen Confidential Company data The Problem

Data Remanence Problem  Data remanence is the left over physical data that either has been erased or overwritten. Since mobile devices use flash for data storage, typically files are not overwritten due to the nature of how flash disks operate. There are several methods to retrieve old data from mobile devices, all of which are not easy and require some technical expertise. However, the point being that it is possible to retrieve data from mobile devices even after the data was deleted.

Lost/Stolen Confidential Company data  Stolen or lost confidential company data can have the following negative effects on any company Revenue loss Competitive advantage loss if data is sold to competitors Law suites if data contains confidential employee or clients information

The Solution DESDROID

Collection, data cleansing, and disposal of wireless devices. This software service secures corporate data assets and completes the lifecycle of individual communications devices in an environmentally responsible manner, while also providing your organization an opportunity to earn potential cash rebates based on the device type. In order to delete confidential data from the mobile device, I have created a flash disk compilation of Android software, called DesDROID. These apps are needed to destroy system and user data on Android Mobile Operating System 2.1 and 2.2. All the following files will be located on DesDROID disk, and are apps all free to use. Root Explorer SPRecovery Terminal Emulator Superuser Androot

Summary  Mobile devices are increasingly being utilized by business to help ease the gap between work and home.  Most enterprises currently use some type of smart device for their employees, consequently the confidentiality of data on these devices needs to be maintained.  As mobile devices become more important in daily business processes, it is equally important to ensure information contained on those devices does not get into the wrong hands.  Using DesDROID will positively impact your business by ensuring confidential data is not lost or stolen. By taking these necessary steps, your business complies with business standards and reduces unneeded risk.