SlideShare a Scribd company logo
SECURING “BYOD”
How We Secure Mobile Devices That We Do Not OWN...
People Love Their Smart-phones!!
People Love Their Smart-phones!!
BUSINESS
                                             ISSUES


• From   Company Owned Blackberry to Bring Your Own Device

  • From   Field Reps/Managers to Any Employee

• Approval   From Supervisor (“Business Need”)

• Allowed   Devices - Any Carrier - iPhone, Android, Windows -

• Initial Application   - Access Exchange - eMail, Calendar, Contacts
SECURITY POLICY - AUDIT
            ISSUES
• Protect “Corporate   Data” and Access To Systems (eMail)

• Old
    Blackberry - Had 4 Character PIN / Inactivity Timeout and
 Wipe - BES Provisioning and Management

• Minimal
        Protection on ActiveSync Devices “Enforced” Via
 Exchange Policy But Device Dependent - “Mileage Varies!”

• ActiveSync   Configuration W/O IT Enrollment

• No “Unified Audit Trail” -   Scattered Logs Across Systems
LOOKING FOR CONTROL
           TOOLS
• Limited Tools Available   in 2008/9 TimeFrame

• Identified   MobileIron System - Conducted Testing / POC

• Supported All   Policy Enforcement Needs - All Devices

• Excellent   Separation of User Data from Business Data on iOS

• Simple   Enrollment and Distribution of Client Agents

• Simple   Deployment of System - Appliance and Server Agent
AVAILABLE OPTIONS?


• MANY     Options Now

• Leader   Quadrant

• Successful   PoC
Smartphone security
Smartphone security
Smartphone security
WHERE ARE WE NOW?

• Blackberry    Usage Dropping - Users Switching Away

• New    Users Connecting Via ActiveSync (iOS and Android)

• Policies   Now Equally Enforced Across All Mobile Devices

• User   Self Service / Minimal IT Effort In Deployment

• Users Adopting    iPad / Tablet Mobile Devices

• Research    Project To “Deliver App / Data” to iOS - iPad/iPhone
ACCESS TO MORE
    THAN EMAIL
• Mobile    Device Browsers Work Really Well...

• Users Want Access To Their    Data / Systems - Outside eMail

• Juniper   Secure Access and Junos Pulse Provide Access

• Same   Gateway Used For Remote Access

• Robust    Security and Granular Access / Roles for Users
Smartphone security
Smartphone security
Smartphone security
IPAD ACCESS - APPLICATIONS
• Data Access To   More Than eMail Attachments - All Files

• Device   / Backup Encryption Turned On in MobileIron

• Best Way To Access   User Data?

 • DropBox?     Google Docs? Transfer Directly To iPad?

 • Leverage    SharePoint MySites / Team Sites Via Client

 • “There’s An App    For That” - Filamente (AirCreek)

 • Juniper   Provides VPN After SecurID Authentication
WHAT ARE THE THREATS?
• Malware    On Devices Exists But Not Yet In Numbers

  • Enforce App    Store Use (No JailBreaking) As Control

• Minimal   Business Need For “Device Control” Today

  • Could    Control SW Install, Device Features, Content Filters

• Biggest   Exposure - Lost / Stolen Devices, Device Swaps

  • Data Access, Data   On Device and Backups

  • MobileIron “Find   My Phone” - Remote Lock and Wipe

  • PIN   / Pass Code - Automatic Wipe After Guessing Wrong
BUSINESS INCENTIVES
• People   Like Security

• They   Don’t Like Inconvenience

• Balance   Is Needed!!



• “I   NEED My Email Now!”
PICKING OUR PIN POLICY

• Devices   Default To Open Access - But Support PIN Lock

• Users Very   Rarely Want The Security Enough (vs Ease of Use)

• NIST   Guidance on PIN / Passwords - Pub. 800-63 (“Entropy”)

 • “Level   1 PIN” - Simple But Effective Versus Guessing...

 • Andrew      Jacquith - “Picking A Sensible Mobile Password”

 • Trade    Off Between “Secure Enough and User Pain”
PIN SETTINGS
                       8 Characters -     6 Characters - No
PIN Length / Format
                       No SImple PIN         SImple PIN

                      Lock 15 Minutes     Lock 30 Minutes
  Lock and Wipe
                      2 Minutes Grace     2 Minutes Grace
     Settings
                       8 Tries - Wipe      10 Tries - Wipe
                      No PIN Expiration   No PIN Expiration
  Change Policy?       (AD Passwords       (AD Passwords
                       Expire Like PC)     Expire Like PC)
PRIVACY ISSUES

• Mobile    Intelligence / Activity Monitoring Features

  • Track   Cell Tower Connections / Location of Device

  • Collect   Call Logs and All SMS Messages

• Set To   Ignore Calls/SMS and Track “Current Location” Only

• Concerns About      Collecting Data and Controls / Management

• Not   Presently Any Security / Business Requirements
AGENT INTERACTION

• Updates, Profiles, Certificates

• Report    Dropped Calls

• Check     Data Speeds

• iOS   Only Features

  • Links   to iTunes App Store

  • App     Delivery Direct to iOS
IOS “APP STORE”
• Links   to Apple

• Define/Deliver

• Direct   and Store
INTERNATIONAL ROAMING


• Detect   International Roaming

• Send Text   Message Alert

• Send Alert   to IT Admins

• Update   Plans / Activity
REFERENCES
• Surveys      - Sybase Survey Telenav Survey

• MobileIron

• Picking    PIN Policy - Perimeter Jaquith Blog - NIST 800-63

•   iPhone Password Brute Force
CNN Money http://money.cnn.com/galleries/2011/technology/1108/gallery.cybersecurity_tidbits/
Dino Dai Zovi -http://trailofbits.com/2011/08/10/ios-4-security-evaluation/


•

More Related Content

PPTX
Corporate Mobility Insights
PPTX
An overview of mobile technologies
PPTX
2013 ntca fall conference - Mobile Apps Presentation
PPSX
smartphones
PPTX
Home Tech
PPTX
Mobile technology assistive technology
PPTX
Going beyond perimeter defence
PPTX
Working From Home
Corporate Mobility Insights
An overview of mobile technologies
2013 ntca fall conference - Mobile Apps Presentation
smartphones
Home Tech
Mobile technology assistive technology
Going beyond perimeter defence
Working From Home

What's hot (18)

PDF
Not another *$#@ app: How to avoid IoT fatigue
PPTX
smart watch
PPTX
PPTX
Making Mobile Manageable
PPT
Signature solutions
PDF
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
PPTX
Ultrabooks presentation
PPTX
Near Field Communication – IxDworks.com
PDF
Mobile security and what it means to you bb
PDF
Mobile Device Security
PPT
Smartphone Shootout: Which One is Best?
PDF
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
PDF
Lg Web Network Mobile Presentation August 2009
PPTX
E knock app v1
PDF
Managing Remote Operation Teams
PPT
Chickens2
PDF
Nick Grant - Roam Solutions
PPT
Sfsu isys363 fall2013 part one rangers
Not another *$#@ app: How to avoid IoT fatigue
smart watch
Making Mobile Manageable
Signature solutions
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Ultrabooks presentation
Near Field Communication – IxDworks.com
Mobile security and what it means to you bb
Mobile Device Security
Smartphone Shootout: Which One is Best?
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
Lg Web Network Mobile Presentation August 2009
E knock app v1
Managing Remote Operation Teams
Chickens2
Nick Grant - Roam Solutions
Sfsu isys363 fall2013 part one rangers
Ad

Viewers also liked (8)

PPTX
BYOD - Mobility - Protection: security partnering with business
PPTX
Mobile Devices Securely Accessing SharePoint
PPTX
Mobile Device Security - Responsible Not Repressive
PPTX
NGC records management - SP2010 RM Features
PPTX
SharePoint Best Practices Conference 2013
PPTX
Secure Your Mobile Content!
PPTX
Secure mobile content SharePoint Best Practices Conference 2013
PPTX
Search for Overview for SC Upstate SP users
BYOD - Mobility - Protection: security partnering with business
Mobile Devices Securely Accessing SharePoint
Mobile Device Security - Responsible Not Repressive
NGC records management - SP2010 RM Features
SharePoint Best Practices Conference 2013
Secure Your Mobile Content!
Secure mobile content SharePoint Best Practices Conference 2013
Search for Overview for SC Upstate SP users
Ad

Similar to Smartphone security (20)

PDF
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
PPTX
Spirent: The Internet of Things: The Expanded Security Perimeter
PDF
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
PDF
Wso2 con byod-shan-ppt
PPTX
Successful Industrial IoT patterns
PDF
Mobile security chess board - attacks & defense
PPT
Mobile code mining for discovery and exploits nullcongoa2013
PPT
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
PPT
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
PDF
Mobile Security
PPT
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
PPTX
Security Testing for IoT Systems
PPTX
15Payne Presentation Mobile Best Practicestotal.pptx
PPTX
Wearables, Things & Apps - Mobile Dev + Test '15
PDF
WSO2Con EU 2015: IoT in Finance
PDF
UKLUG 2011 - iOS devices in the enterprise
PDF
Menofia UN -Mobile Security
PDF
DeepSec_2019_Chemerkin_Yury_-_Full_-_Final.pdf
PDF
Attacking and Defending Apple iOS Devices
PPTX
Harbin clinic iot-mobile-no-vid
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
Spirent: The Internet of Things: The Expanded Security Perimeter
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
Wso2 con byod-shan-ppt
Successful Industrial IoT patterns
Mobile security chess board - attacks & defense
Mobile code mining for discovery and exploits nullcongoa2013
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
Mobile Security
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Security Testing for IoT Systems
15Payne Presentation Mobile Best Practicestotal.pptx
Wearables, Things & Apps - Mobile Dev + Test '15
WSO2Con EU 2015: IoT in Finance
UKLUG 2011 - iOS devices in the enterprise
Menofia UN -Mobile Security
DeepSec_2019_Chemerkin_Yury_-_Full_-_Final.pdf
Attacking and Defending Apple iOS Devices
Harbin clinic iot-mobile-no-vid

Recently uploaded (20)

PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
Training And Development of Employee .pdf
PPTX
Business Ethics - An introduction and its overview.pptx
PDF
A Brief Introduction About Julia Allison
PDF
Laughter Yoga Basic Learning Workshop Manual
PDF
Types of control:Qualitative vs Quantitative
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
How to Get Funding for Your Trucking Business
PPT
Chapter four Project-Preparation material
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
Chapter 5_Foreign Exchange Market in .pdf
Power and position in leadershipDOC-20250808-WA0011..pdf
New Microsoft PowerPoint Presentation - Copy.pptx
Ôn tập tiếng anh trong kinh doanh nâng cao
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Training And Development of Employee .pdf
Business Ethics - An introduction and its overview.pptx
A Brief Introduction About Julia Allison
Laughter Yoga Basic Learning Workshop Manual
Types of control:Qualitative vs Quantitative
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
Roadmap Map-digital Banking feature MB,IB,AB
Belch_12e_PPT_Ch18_Accessible_university.pptx
WRN_Investor_Presentation_August 2025.pdf
How to Get Funding for Your Trucking Business
Chapter four Project-Preparation material
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
ICG2025_ICG 6th steering committee 30-8-24.pptx
Probability Distribution, binomial distribution, poisson distribution
Chapter 5_Foreign Exchange Market in .pdf

Smartphone security

  • 1. SECURING “BYOD” How We Secure Mobile Devices That We Do Not OWN...
  • 2. People Love Their Smart-phones!!
  • 3. People Love Their Smart-phones!!
  • 4. BUSINESS ISSUES • From Company Owned Blackberry to Bring Your Own Device • From Field Reps/Managers to Any Employee • Approval From Supervisor (“Business Need”) • Allowed Devices - Any Carrier - iPhone, Android, Windows - • Initial Application - Access Exchange - eMail, Calendar, Contacts
  • 5. SECURITY POLICY - AUDIT ISSUES • Protect “Corporate Data” and Access To Systems (eMail) • Old Blackberry - Had 4 Character PIN / Inactivity Timeout and Wipe - BES Provisioning and Management • Minimal Protection on ActiveSync Devices “Enforced” Via Exchange Policy But Device Dependent - “Mileage Varies!” • ActiveSync Configuration W/O IT Enrollment • No “Unified Audit Trail” - Scattered Logs Across Systems
  • 6. LOOKING FOR CONTROL TOOLS • Limited Tools Available in 2008/9 TimeFrame • Identified MobileIron System - Conducted Testing / POC • Supported All Policy Enforcement Needs - All Devices • Excellent Separation of User Data from Business Data on iOS • Simple Enrollment and Distribution of Client Agents • Simple Deployment of System - Appliance and Server Agent
  • 7. AVAILABLE OPTIONS? • MANY Options Now • Leader Quadrant • Successful PoC
  • 11. WHERE ARE WE NOW? • Blackberry Usage Dropping - Users Switching Away • New Users Connecting Via ActiveSync (iOS and Android) • Policies Now Equally Enforced Across All Mobile Devices • User Self Service / Minimal IT Effort In Deployment • Users Adopting iPad / Tablet Mobile Devices • Research Project To “Deliver App / Data” to iOS - iPad/iPhone
  • 12. ACCESS TO MORE THAN EMAIL • Mobile Device Browsers Work Really Well... • Users Want Access To Their Data / Systems - Outside eMail • Juniper Secure Access and Junos Pulse Provide Access • Same Gateway Used For Remote Access • Robust Security and Granular Access / Roles for Users
  • 16. IPAD ACCESS - APPLICATIONS • Data Access To More Than eMail Attachments - All Files • Device / Backup Encryption Turned On in MobileIron • Best Way To Access User Data? • DropBox? Google Docs? Transfer Directly To iPad? • Leverage SharePoint MySites / Team Sites Via Client • “There’s An App For That” - Filamente (AirCreek) • Juniper Provides VPN After SecurID Authentication
  • 17. WHAT ARE THE THREATS? • Malware On Devices Exists But Not Yet In Numbers • Enforce App Store Use (No JailBreaking) As Control • Minimal Business Need For “Device Control” Today • Could Control SW Install, Device Features, Content Filters • Biggest Exposure - Lost / Stolen Devices, Device Swaps • Data Access, Data On Device and Backups • MobileIron “Find My Phone” - Remote Lock and Wipe • PIN / Pass Code - Automatic Wipe After Guessing Wrong
  • 18. BUSINESS INCENTIVES • People Like Security • They Don’t Like Inconvenience • Balance Is Needed!! • “I NEED My Email Now!”
  • 19. PICKING OUR PIN POLICY • Devices Default To Open Access - But Support PIN Lock • Users Very Rarely Want The Security Enough (vs Ease of Use) • NIST Guidance on PIN / Passwords - Pub. 800-63 (“Entropy”) • “Level 1 PIN” - Simple But Effective Versus Guessing... • Andrew Jacquith - “Picking A Sensible Mobile Password” • Trade Off Between “Secure Enough and User Pain”
  • 20. PIN SETTINGS 8 Characters - 6 Characters - No PIN Length / Format No SImple PIN SImple PIN Lock 15 Minutes Lock 30 Minutes Lock and Wipe 2 Minutes Grace 2 Minutes Grace Settings 8 Tries - Wipe 10 Tries - Wipe No PIN Expiration No PIN Expiration Change Policy? (AD Passwords (AD Passwords Expire Like PC) Expire Like PC)
  • 21. PRIVACY ISSUES • Mobile Intelligence / Activity Monitoring Features • Track Cell Tower Connections / Location of Device • Collect Call Logs and All SMS Messages • Set To Ignore Calls/SMS and Track “Current Location” Only • Concerns About Collecting Data and Controls / Management • Not Presently Any Security / Business Requirements
  • 22. AGENT INTERACTION • Updates, Profiles, Certificates • Report Dropped Calls • Check Data Speeds • iOS Only Features • Links to iTunes App Store • App Delivery Direct to iOS
  • 23. IOS “APP STORE” • Links to Apple • Define/Deliver • Direct and Store
  • 24. INTERNATIONAL ROAMING • Detect International Roaming • Send Text Message Alert • Send Alert to IT Admins • Update Plans / Activity
  • 25. REFERENCES • Surveys - Sybase Survey Telenav Survey • MobileIron • Picking PIN Policy - Perimeter Jaquith Blog - NIST 800-63 • iPhone Password Brute Force CNN Money http://money.cnn.com/galleries/2011/technology/1108/gallery.cybersecurity_tidbits/ Dino Dai Zovi -http://trailofbits.com/2011/08/10/ios-4-security-evaluation/ •

Editor's Notes