Download presentation
Presentation is loading. Please wait.
1
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development Summit, Milan 26 th October 2005
2
2 THE SECURE MOBILITY DILEMMA: Availability Security Usability Control DEMAND FOR ACCESS Workforce Productivity Corporate Agility Global Reach Business Process Optimization On-Demand Enterprise NEED TO PROTECT User Identities Trade Secrets Regulatory Compliance Device Integrity IP on Devices Network Operations Customer Privacy Painful Business Compromises
3
3 THE MOBILE RISK Vulnerability Means Expense
4
4 EVOLUTION OF THREATS SECURITY: #1 issue for Broadband Mobility
5
5 Piecemeal processes through “bundled” solutions Security tools and connectivity service operate in silos Danger from inconsistent or improper use of these tools Endpoint protection only when touching enterprise During Internet-only sessions, pre-VPN window, and during VPN session Accelerate remediation once new threat/antidote discovered Inability to combine best-of-breed point solutions No security vendor are strong across the board “Forklift upgrade” of existing security components SECURITY SOLUTIONS TODAY
6
6 Data User and Device Authentication Identity Device Automated Assessment & Remediation Network Role-Based Network Security Coordinated protection of identities, endpoints, networks and data that ties together authentication, compliance and network authorization. Enforced VPN TRUSTED CONNECTIONS. NO COMPROMISE.
7
7 SECURING THE CONNECTION PROCESS Policy Orchestration Platform Single point of control for managing and enforcing policies INTERNET CONNECTIONLAN CONNECTION Internet Access Restricted VPN Access Policies Enforced Trusted Networks Endpoint Lockdown Securing the Connection Dynamic Policy Retrieval Remote Vulnerability Remediation Coordinated Network Enforcement
8
8 Protection of information Username / Password (single factor) authentication is not secure enough in current environment. Connection paradigm driving two factor authentication to enable trusted computing. Mechanism for “digital fingerprinting” and policy enforcement that ONLY allows corporate authorized devices to attach to the corporate LAN remotely. Almost 2,000 mobile phones are lost every day in the UK (Source: Metropolitian Police, UK) 49% of organizations experienced laptop or mobile phone theft (Source: CSI/FBI 2004 Computer Crime and Security Survey) DEVICE SECURITY
9
9 SUMMARY Mobility is rapidly evolving but it is not just about connectivity Security must be addressed from a holistic point of view in order for gaps to be identified and closed Policy Orchestration services tie internet and VPN access to both strong device/user authentication and endpoint policy compliance
11
11 Q&A Securing Mobile Data Sessions Anurag Lal Senior Vice President Strategic Services & Business Development alal@ipass.com
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.