Bring Your Own Data in motion without risk

Post on 05-Dec-2014

949 views 0 download

description

Through the adoption of BYOD, users' comfort has increasingly improved, but it's important to embrace the proper tools to protect the users' credentials and company's on-line data. This the reason why a combined solution let appliances and services work together to guarantee the highest level of protection on the weakest points of the network, the ones that the Sysadmins can't control directly. SecurePass was designed to bring more security while maintaining users' comfort in accessing your resources. SecurePass is easy to manage and easy to integrate in your appliances: add strong authentication in a matter of few minutes, not hours or days, and no headaches for your IT staff. With the flexibility of a full range of tokens, from smartphones to traditional tokens and service cards, SecurePass suits any budget. And if you like it, you can easily extend SecurePass to your web applications, without any cost: SecurePass counts only provisioned users, with unlimited applications and firewall appliances. SecurePass is always free up to 5 users: give it a try today on http://www.secure-pass.net/open Twitter: @securepass Facebook: https://www.facebook.com/securepass

Transcript of Bring Your Own Data in motion without risk

Adopt a mobile access strategy that users can easily embrace

Bring Your Own Data in motion without risks

Giuseppe PaternòIT Security Architect - gpaterno@garl.ch

EVERY USER IS AN ADMIN ... of his devices (BYOD) . ... of his credential to access to company’s data

... of his apps, softwares, virus installed with company’s management tools

THE BYOD OPPORTUNITIES

Let your users choose their devices

Improve agility with teleworking

Lower costs and less time dedicated to test and development

Less time spent in the IT helpdesk

THE BYOD RISKSAccess to company’s network

Unable to enforce company’s policies on the device

Respect privacy regulations (ex. customers’ data stored within address book accessible by social networks)

Users install mobile apps that accessing and collecting data like bank and shopping accounts

Stolen or lost devices with credential to access to company’ system

THE STRATEGY The BYOD access strategy should be focused on securing the users’ access, not the devices

STRONG SECURITYPOLICY

A secure access gateway

+A virtual desktop

infrastructure+

A secure centralized identity management system

ACCESS GATEWAY

Easy web access from anywhere with SSL

Full HTML compatibility

Per-user customized portal

Access to applications based on users’ role

VIRTUAL DESKTOP INFRASTRUCTURE

Desktop experience from anywhere and any device

Easy to use for everybody

No need to rewrite existing desktop applications

IDENTITY MANAGEMENTCentralized identity management across all on-line applications

Grant users’ access with One Time Passwords

Easy integration with all your web based applications

Few minutes to secure existing partner portals, virtual desktops and VPN

AND DON’T FORGET BEST PRACTICES!

Configure an SSL VPN Adopt a firewall and check policies periodically

EASY SECURITYFOR YOUR ON-LINE SERVICES

www.secure-pass.net www.intellicomp.de