BYOD/MDM Seminar @ ROCKBOTTOM

34
BYOD/MDM Workshop Luncheon Sponsored by Cisco and Zenprise Rev2 BYOD/MDM Workshop Luncheon @ RockBottom Denver Hosted by Greg Hanchin Global Technology Resources, Inc. / Trusted Security Advisor ©2012 Global Technology Resources, Inc., All Rights Reserved. Contents herin contain confidential information not to be copied September 19, 2012

Transcript of BYOD/MDM Seminar @ ROCKBOTTOM

Page 1: BYOD/MDM Seminar @ ROCKBOTTOM

BYOD/MDM Workshop Luncheon Sponsored by Ciscoand Zenprise Rev2

BYOD/MDM Workshop Luncheon @ RockBottom Denver

Hosted by Greg HanchinGlobal Technology Resources, Inc. / Trusted Security Advisor

©2012 Global Technology Resources, Inc., All Rights Reserved.Contents herin contain confidential information not to be copiedSeptember 19, 2012

Page 2: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI2

Agenda

Welcome Mobility Cisco ISE / BYOD ZenPrise / MDM Questions Breakout

Page 3: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI3

Who is GTRI?

•$200M Systems Integrator•14 years old•214 People•Profitable•Scratch built•Denver - HQ•$15 Million a Year in Professional Services•$70M in Commercial / $130M in Federal

Profitable Relationships

Customers

Employees

Projects

Page 4: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI4

GTRI InfoSec Quilt

Page 5: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI5

Recent GTRI Security Projects

Page 6: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI6

Page 7: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI7

iPad Sales – Just iPads

Page 8: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI8

Mobility

Monty Petrich SA - Wireless

GTRI

Page 9: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI9

Simple Secure Scalable

ANY USER

ANYWHERE

ANY DEVICE

ANYTIME

Mobility Changes Everything

Page 10: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI10

Where is Wireless Going

Future Technologies 802.11ac 802.11ad

Wi-Fi Offload and DAS What the carriers are doing 802.11u

AnyConnect How to prepare customers

BYOD and Dynamic VLANs

Page 11: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI11

Page 12: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI12

Page 13: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI13

Page 14: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI14

Bring Your Own Device

Micah MontgomerySE-Information Security

GTRI

Page 15: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI15

MDM vs BYOD/NACMDM BYOD /NAC

Managing Device on 3g/ 4g

Manage Files

Manage APPS / Email

JailBreak Control

Remote Wipe

Device Encryption

GEO Fencing

Device Recovery- LoJack

Managing device WLAN/ Wired Access

Role Based Access Control (RBAC) Concept of Device Stacking on

Corp Identity Posture / Profile / Quarantine Hoteling DLP – Lite on critical Files Authentication/Authorization/

Accounting -AAA

Page 16: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI16

Bridging the GAP

Page 17: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI17

Sample ISE Deployment

Page 18: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI18

The User to Device Ratio Has Changed

Page 19: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI19

Identity Services Engine

ACS

NAC Profiler

NAC Guest

NAC Manager

NAC Server

Identity Services Engine

• Centralized Policy

• RADIUS Server

• Posture Assessment

• Guest Access Services

• Device Profiling

• Monitoring

• Troubleshooting

• Reporting

Page 20: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI20

BYOD Deployment Scenario's

Figure 5 BYOD Adoption Scenarios

Page 21: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI21

ISE Node Types

Page 22: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI22

ISE Platforms

Page 23: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI23

Gradual Deployment

Monitor Mode

• Authentication Without Access Control

Low Impact Mode

• Minimal Impact to Network and Users

High Security Mode

• Logical Isolation of User Groups / Device Types

Page 24: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI24

What Device?

Page 25: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI25

ISE Profiler: 3 Steps

Page 26: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI26

Guest Self Service

Page 27: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI27

Guest User Experience

Page 28: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI28

Certificate Location by DeviceDevice Certificate Storage Location Access Method iPhone/iPad Standard certificate store Settings > General > Profile

Android Encrypted certificate store Invisible to end users. Note Certificates can be removed using Settings > Location & Security > Clear Storage.

Windows Standard certificate store Launch mmc.exe from /cmd prompt, or view in certificate snap-in.

Mac Standard certificate store Application > Utilities > Keychain Access

Page 29: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI29

What about Accounting?

Provides additional information about the session

Marks end of a session (Removes endpoint from licensing count)

Provides IP address Profile IOS probe

Page 30: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI30

MDM vs BYOD/NACMDM BYOD /NAC

Managing Device on 3g/ 4g

Manage Files

Manage APPS / Email

JailBreak Control

Remote Wipe

Device Encryption

GEO Fencing

Device Recovery- LoJack

Managing device WLAN/ Wired Access

Role Based Access Control (RBAC) Concept of Device Stacking on

Corp Identity Posture / Profile / Quarantine Hoteling DLP – Lite on critical Files Authentication/Authorization/

Accounting -AAA

Page 31: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI31

Mobile Device Management

David DeCesareSE – Denver Region

Page 32: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI32

ZenPrise MDM Slides See - http://slidesha.re/N2lTWL

Page 33: BYOD/MDM Seminar @ ROCKBOTTOM

© 2012 GTRI33

Questions?

Page 34: BYOD/MDM Seminar @ ROCKBOTTOM

BYOD/MDM Workshop Luncheon

©2012 Global Technology Resources, Inc., All Rights Reserved.Contents herin contain confidential information not to be copiedJuly 26, 2012

Thank You!