Bring Your Own Data in motion without risk

11
Adopt a mobile access strategy that users can easily embrace Bring Your Own Data in motion without risks Giuseppe Paternò IT Security Architect - [email protected]

description

Through the adoption of BYOD, users' comfort has increasingly improved, but it's important to embrace the proper tools to protect the users' credentials and company's on-line data. This the reason why a combined solution let appliances and services work together to guarantee the highest level of protection on the weakest points of the network, the ones that the Sysadmins can't control directly. SecurePass was designed to bring more security while maintaining users' comfort in accessing your resources. SecurePass is easy to manage and easy to integrate in your appliances: add strong authentication in a matter of few minutes, not hours or days, and no headaches for your IT staff. With the flexibility of a full range of tokens, from smartphones to traditional tokens and service cards, SecurePass suits any budget. And if you like it, you can easily extend SecurePass to your web applications, without any cost: SecurePass counts only provisioned users, with unlimited applications and firewall appliances. SecurePass is always free up to 5 users: give it a try today on http://www.secure-pass.net/open Twitter: @securepass Facebook: https://www.facebook.com/securepass

Transcript of Bring Your Own Data in motion without risk

Page 1: Bring Your Own Data in motion without risk

Adopt a mobile access strategy that users can easily embrace

Bring Your Own Data in motion without risks

Giuseppe PaternòIT Security Architect - [email protected]

Page 2: Bring Your Own Data in motion without risk

EVERY USER IS AN ADMIN ... of his devices (BYOD) . ... of his credential to access to company’s data

... of his apps, softwares, virus installed with company’s management tools

Page 3: Bring Your Own Data in motion without risk

THE BYOD OPPORTUNITIES

Let your users choose their devices

Improve agility with teleworking

Lower costs and less time dedicated to test and development

Less time spent in the IT helpdesk

Page 4: Bring Your Own Data in motion without risk

THE BYOD RISKSAccess to company’s network

Unable to enforce company’s policies on the device

Respect privacy regulations (ex. customers’ data stored within address book accessible by social networks)

Users install mobile apps that accessing and collecting data like bank and shopping accounts

Stolen or lost devices with credential to access to company’ system

Page 5: Bring Your Own Data in motion without risk

THE STRATEGY The BYOD access strategy should be focused on securing the users’ access, not the devices

Page 6: Bring Your Own Data in motion without risk

STRONG SECURITYPOLICY

A secure access gateway

+A virtual desktop

infrastructure+

A secure centralized identity management system

Page 7: Bring Your Own Data in motion without risk

ACCESS GATEWAY

Easy web access from anywhere with SSL

Full HTML compatibility

Per-user customized portal

Access to applications based on users’ role

Page 8: Bring Your Own Data in motion without risk

VIRTUAL DESKTOP INFRASTRUCTURE

Desktop experience from anywhere and any device

Easy to use for everybody

No need to rewrite existing desktop applications

Page 9: Bring Your Own Data in motion without risk

IDENTITY MANAGEMENTCentralized identity management across all on-line applications

Grant users’ access with One Time Passwords

Easy integration with all your web based applications

Few minutes to secure existing partner portals, virtual desktops and VPN

Page 10: Bring Your Own Data in motion without risk

AND DON’T FORGET BEST PRACTICES!

Configure an SSL VPN Adopt a firewall and check policies periodically

Page 11: Bring Your Own Data in motion without risk

EASY SECURITYFOR YOUR ON-LINE SERVICES

www.secure-pass.net www.intellicomp.de