SlideShare a Scribd company logo
How BYOD will shape wireless network security in 2012? Dr. Hemant Chaskar Vice President of Technology AirTight Networks © 2011 AirTight Networks. All Rights Reserved.
BYOD! BYOD!
Security? Security?
Why is security a concern with BYOD? Unauthorized smart phones connecting to enterprise network Mobile Wi-Fi hotspots bypassing perimeter security 3G Intrusion threats Extrusion threats Rater, Intr A sion – pun intended!
Enterprise Wi-Fi:  Not a barrier for employee smartphones Two-steps to connect your smartphone to WPA2, 802.1x Wi-Fi? Look up username and password in Wi-Fi utility on laptop. Enter those in your personal smartphone.
Intrusion threats from personal smartphones Let us start with malware! Android malware grew 472% in 2H2011 – says PCMag
Intrusion threats from personal smartphones Android malware grew 472% in 2H2011 – says PCMag Even iOS is not safe once “Jailbroken” Your sensitive corporate data could finally end up here! Personal apps reduce productivity, increase risk of data leakage
Limitations of common security practices  MAC ACL Lot of initial work, tedious to manage Mobile Device Management (MDM) Required for IT assigned smartphone devices But, no visibility into or control over personal devices IT Assigned Smartphones Personal Smartphones
Wireless Intrusion Prevention Systems (WIPS) Eavesdropping Unauthorized Access WPA2 Firewall, Wired IPS Wi-Phishing Honeypots External APs Cracking External Users Rogue AP  Misconfigured AP Ad hoc Connections Wireless DoS WIPS
WIPS architecture Building A Building B Sensor Sensor Server
With this in place, your network is protected from all types of wireless threats, vulnerabilities and attack tools! External APs Rogue APs  (On Network) Authorized  APs AP Classification STOP Client Classification Policy Mis-config GO STOP IGNORE DoS External Clients Authorized Clients Rogue  Clients AUTOMATICALLY DETECT AND BLOCK RED PATHS! WIPS policy enforcement
Smartphone monitoring with WIPS
Authorized  APs Authorized Clients Users Smartphone policy enforcement with WIPS User Authentication  + Machine Identification Flag/block  unapproved  devices! GO STOP External  APs Mobile Hotspots STOP
Smart device identification Device type Approved/unapproved  status Device/user name MAC address
Drill down on device details
Accurate location tracking
Block policy for unapproved smart devices
Extrusion threats from personal smartphones Detect and block authorized clients from connecting to personal mobile hotspots (iPhone MyWi, Android Mobile AP, etc.) Mobile Honeypot Authorized Client 3G Blocked by WIPS  Allowed by WIPS  Authorized AP Internet
Key takeaways BYOD revolution creates new security risks due to use of  personal smart devices on enterprise premises WIPS uses combination of device fingerprinting and policy framework to automatically detect and flag/block unapproved personal smart devices in the network WIPS continues to provide comprehensive protection from traditional Wi-Fi security threats such as Rogue APs, Wi-Phishing, ad hoc networks, DoS attacks, device mis-configurations, etc.

More Related Content

PDF
Why Your Mobile Device Isn’t As Secure As You Think
PPTX
Mobile Security
PDF
Securing the Enterprise Mobile Perimeter
PPTX
Onboarding in the IoT
PDF
New trends in Payments Security: NFC & Mobile
PDF
Clear and Present Danger
PPTX
Hardware Authentication
PDF
Mobile Security: The 5 Questions Modern Organizations Are Asking
Why Your Mobile Device Isn’t As Secure As You Think
Mobile Security
Securing the Enterprise Mobile Perimeter
Onboarding in the IoT
New trends in Payments Security: NFC & Mobile
Clear and Present Danger
Hardware Authentication
Mobile Security: The 5 Questions Modern Organizations Are Asking

What's hot (20)

PDF
Mobile Security 101
PDF
C0c0n 2011 mobile security presentation v1.2
PDF
Top 6-Security-Threats-on-iOS
PDF
The Password Is Dead: An Argument for Multifactor Biometric Authentication
PPT
Smart phone and mobile device security
 
PDF
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
PDF
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
PPTX
Mobile security
PPTX
Ms810 assignment viruses and malware affecting moblie devices
PPTX
CIS 2013 Ping Identity Chalktalk
PPTX
Cybersecurity - Keeping Your Business Protected
PPT
2010: Mobile Security - WHYMCA Developer Conference
PPTX
Passwordless auth
PDF
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
PPTX
Mobile security
PPTX
Mobile Security Research Projects Help
PDF
Mobile Security
PDF
Solution: Block Armour Secure Remote Access for WFH
PDF
Top Seven Risks of Enterprise Mobility - How to protect your business
PDF
The Ultimate Security Checklist Before Launching Your Android App
Mobile Security 101
C0c0n 2011 mobile security presentation v1.2
Top 6-Security-Threats-on-iOS
The Password Is Dead: An Argument for Multifactor Biometric Authentication
Smart phone and mobile device security
 
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
Mobile security
Ms810 assignment viruses and malware affecting moblie devices
CIS 2013 Ping Identity Chalktalk
Cybersecurity - Keeping Your Business Protected
2010: Mobile Security - WHYMCA Developer Conference
Passwordless auth
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
Mobile security
Mobile Security Research Projects Help
Mobile Security
Solution: Block Armour Secure Remote Access for WFH
Top Seven Risks of Enterprise Mobility - How to protect your business
The Ultimate Security Checklist Before Launching Your Android App
Ad

Similar to How BYOD Will Shape Wireless Network Security in 2012 (20)

PPTX
Implementing Enterprise Wireless Security Policy in the BYOD Era
PDF
BETTER- Threat Whitepaper- PoS
PDF
Security in IoT Mobile Apps Safeguarding Your Devices and Da.pdf
PDF
LIFT OFF 2017: IoT and MSS Deep Dive
PPTX
Top 5 wi fi security threats
PDF
Sholove cyren web security - technical datasheet2
PPTX
A Quick Guide On What Is IoT Security_.pptx
PPTX
Mobile security
PPTX
Tips and Tricks on Securing your Android Devices
PPTX
Mobile protection
PDF
ForeScout IoT Enterprise Risk Report
PDF
Mobile Apps and Security Attacks: An Introduction
PDF
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
PDF
IRJET- Android Device Attacks and Threats
PPT
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
PPTX
Mobile App Security: Enterprise Checklist
PDF
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
PDF
Bolstering the security of iiot applications – how to go about it
PDF
Smartphone Smart Card 061013
PDF
Your Shortcut to BYOD Success
Implementing Enterprise Wireless Security Policy in the BYOD Era
BETTER- Threat Whitepaper- PoS
Security in IoT Mobile Apps Safeguarding Your Devices and Da.pdf
LIFT OFF 2017: IoT and MSS Deep Dive
Top 5 wi fi security threats
Sholove cyren web security - technical datasheet2
A Quick Guide On What Is IoT Security_.pptx
Mobile security
Tips and Tricks on Securing your Android Devices
Mobile protection
ForeScout IoT Enterprise Risk Report
Mobile Apps and Security Attacks: An Introduction
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
IRJET- Android Device Attacks and Threats
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
Mobile App Security: Enterprise Checklist
WSO2Con US 2013 - Securing Cloud and Mobile: Pragmatic Enterprise Security Ar...
Bolstering the security of iiot applications – how to go about it
Smartphone Smart Card 061013
Your Shortcut to BYOD Success
Ad

How BYOD Will Shape Wireless Network Security in 2012

  • 1. How BYOD will shape wireless network security in 2012? Dr. Hemant Chaskar Vice President of Technology AirTight Networks © 2011 AirTight Networks. All Rights Reserved.
  • 4. Why is security a concern with BYOD? Unauthorized smart phones connecting to enterprise network Mobile Wi-Fi hotspots bypassing perimeter security 3G Intrusion threats Extrusion threats Rater, Intr A sion – pun intended!
  • 5. Enterprise Wi-Fi: Not a barrier for employee smartphones Two-steps to connect your smartphone to WPA2, 802.1x Wi-Fi? Look up username and password in Wi-Fi utility on laptop. Enter those in your personal smartphone.
  • 6. Intrusion threats from personal smartphones Let us start with malware! Android malware grew 472% in 2H2011 – says PCMag
  • 7. Intrusion threats from personal smartphones Android malware grew 472% in 2H2011 – says PCMag Even iOS is not safe once “Jailbroken” Your sensitive corporate data could finally end up here! Personal apps reduce productivity, increase risk of data leakage
  • 8. Limitations of common security practices MAC ACL Lot of initial work, tedious to manage Mobile Device Management (MDM) Required for IT assigned smartphone devices But, no visibility into or control over personal devices IT Assigned Smartphones Personal Smartphones
  • 9. Wireless Intrusion Prevention Systems (WIPS) Eavesdropping Unauthorized Access WPA2 Firewall, Wired IPS Wi-Phishing Honeypots External APs Cracking External Users Rogue AP Misconfigured AP Ad hoc Connections Wireless DoS WIPS
  • 10. WIPS architecture Building A Building B Sensor Sensor Server
  • 11. With this in place, your network is protected from all types of wireless threats, vulnerabilities and attack tools! External APs Rogue APs (On Network) Authorized APs AP Classification STOP Client Classification Policy Mis-config GO STOP IGNORE DoS External Clients Authorized Clients Rogue Clients AUTOMATICALLY DETECT AND BLOCK RED PATHS! WIPS policy enforcement
  • 13. Authorized APs Authorized Clients Users Smartphone policy enforcement with WIPS User Authentication + Machine Identification Flag/block unapproved devices! GO STOP External APs Mobile Hotspots STOP
  • 14. Smart device identification Device type Approved/unapproved status Device/user name MAC address
  • 15. Drill down on device details
  • 17. Block policy for unapproved smart devices
  • 18. Extrusion threats from personal smartphones Detect and block authorized clients from connecting to personal mobile hotspots (iPhone MyWi, Android Mobile AP, etc.) Mobile Honeypot Authorized Client 3G Blocked by WIPS Allowed by WIPS Authorized AP Internet
  • 19. Key takeaways BYOD revolution creates new security risks due to use of personal smart devices on enterprise premises WIPS uses combination of device fingerprinting and policy framework to automatically detect and flag/block unapproved personal smart devices in the network WIPS continues to provide comprehensive protection from traditional Wi-Fi security threats such as Rogue APs, Wi-Phishing, ad hoc networks, DoS attacks, device mis-configurations, etc.

Editor's Notes

  • #6: Take high resolution picture of this Samsung phone in Pune office. Take another picture of iPhone screen in Pune office.