Mdm Byod Chop House Workshop Final

34
BYOD/MDM Workshop Luncheon Sponsored by Cisco and Zenprise Rev2 BYOD/MDM Workshop Luncheon Hosted by Greg Hanchin Global Technology Resources, Inc. / Trusted Security Advisor ©2012 Global Technology Resources, Inc., All Rights Reserved. Contents herin contain confidential information not to be copied July 26, 2012
  • date post

    19-Oct-2014
  • Category

    Documents

  • view

    723
  • download

    5

description

July 2012 Slide Deck for BYOD , GTRI and Cisco ISE with ZenPrise MDM Integration

Transcript of Mdm Byod Chop House Workshop Final

Page 1: Mdm Byod Chop House Workshop   Final

BYOD/MDM Workshop Luncheon Sponsored by Ciscoand Zenprise Rev2

BYOD/MDM Workshop Luncheon

Hosted by Greg HanchinGlobal Technology Resources, Inc. / Trusted Security Advisor

©2012 Global Technology Resources, Inc., All Rights Reserved.Contents herin contain confidential information not to be copiedJuly 26, 2012

Page 2: Mdm Byod Chop House Workshop   Final

© 2012 GTRI2

Agenda

Welcome

Mobility

Cisco ISE / BYOD

ZenPrise / MDM

Questions

Breakout

Page 3: Mdm Byod Chop House Workshop   Final

© 2012 GTRI3

Who is GTRI?

•$200M Systems Integrator•14 years old•214 People•Profitable•Scratch built•Denver - HQ•$15 Million a Year in Professional Services•$70M in Commercial / $130M in Federal

Profitable Relationships

Customers

Employees

Projects

Page 4: Mdm Byod Chop House Workshop   Final

© 2012 GTRI4

GTRI InfoSec Quilt

Page 5: Mdm Byod Chop House Workshop   Final

© 2012 GTRI5

Recent GTRI Security Projects

Page 6: Mdm Byod Chop House Workshop   Final

© 2012 GTRI6

Page 7: Mdm Byod Chop House Workshop   Final

© 2012 GTRI7

iPad Sales – Just iPads

Page 8: Mdm Byod Chop House Workshop   Final

© 2012 GTRI8

Mobility

Monty Petrich SA - Wireless

GTRI

Page 9: Mdm Byod Chop House Workshop   Final

© 2012 GTRI9

Simple Secure Scalable

ANY USER

ANYWHERE

ANY DEVICE

ANYTIME

Mobility Changes Everything

Page 10: Mdm Byod Chop House Workshop   Final

© 2012 GTRI10

Where is Wireless Going

Future Technologies 802.11ac 802.11ad

Wi-Fi Offload and DAS What the carriers are doing 802.11u

AnyConnect How to prepare customers

BYOD and Dynamic VLANs

Page 11: Mdm Byod Chop House Workshop   Final

© 2012 GTRI11

Page 12: Mdm Byod Chop House Workshop   Final

© 2012 GTRI12

Page 13: Mdm Byod Chop House Workshop   Final

© 2012 GTRI13

Page 14: Mdm Byod Chop House Workshop   Final

© 2012 GTRI14

Bring Your Own Device

Micah MontgomerySE-Information Security

GTRI

Page 15: Mdm Byod Chop House Workshop   Final

© 2012 GTRI15

MDM vs BYOD/NAC

MDM BYOD /NAC

Managing Device on 3g/ 4g

Manage Files

Manage APPS / Email

JailBreak Control

Remote Wipe

Device Encryption

GEO Fencing

Device Recovery- LoJack

Managing device WLAN/ Wired Access

Role Based Access Control (RBAC) Concept of Device Stacking on

Corp Identity Posture / Profile / Quarantine Hoteling DLP – Lite on critical Files Authentication/Authorization/

Accounting -AAA

Page 16: Mdm Byod Chop House Workshop   Final

© 2012 GTRI16

Bridging the GAP

Page 17: Mdm Byod Chop House Workshop   Final

© 2012 GTRI17

Sample ISE Deployment

Page 18: Mdm Byod Chop House Workshop   Final

© 2012 GTRI18

The User to Device Ratio Has Changed

Page 19: Mdm Byod Chop House Workshop   Final

© 2012 GTRI19

Identity Services Engine

ACS

NAC Profiler

NAC Guest

NAC Manager

NAC Server

Identity Services Engine

• Centralized Policy

• RADIUS Server

• Posture Assessment

• Guest Access Services

• Device Profiling

• Monitoring

• Troubleshooting

• Reporting

Page 20: Mdm Byod Chop House Workshop   Final

© 2012 GTRI20

BYOD Deployment Scenario's

Figure 5 BYOD Adoption Scenarios

Page 21: Mdm Byod Chop House Workshop   Final

© 2012 GTRI21

ISE Node Types

Page 22: Mdm Byod Chop House Workshop   Final

© 2012 GTRI22

ISE Platforms

Page 23: Mdm Byod Chop House Workshop   Final

© 2012 GTRI23

Gradual Deployment

Monitor Mode

• Authentication Without Access Control

Low Impact Mode

• Minimal Impact to Network and Users

High Security Mode

• Logical Isolation of User Groups / Device Types

Page 24: Mdm Byod Chop House Workshop   Final

© 2012 GTRI24

What Device?

Page 25: Mdm Byod Chop House Workshop   Final

© 2012 GTRI25

ISE Profiler: 3 Steps

Page 26: Mdm Byod Chop House Workshop   Final

© 2012 GTRI26

Guest Self Service

Page 27: Mdm Byod Chop House Workshop   Final

© 2012 GTRI27

Guest User Experience

Page 28: Mdm Byod Chop House Workshop   Final

© 2012 GTRI28

Certificate Location by Device

Device Certificate Storage Location Access Method

iPhone/iPad Standard certificate store Settings > General > Profile

Android Encrypted certificate store Invisible to end users. Note Certificates can be removed using Settings > Location & Security > Clear Storage.

Windows Standard certificate store Launch mmc.exe from /cmd prompt, or view in certificate snap-in.

Mac Standard certificate store Application > Utilities > Keychain Access

Page 29: Mdm Byod Chop House Workshop   Final

© 2012 GTRI29

What about Accounting?

Provides additional information about the session

Marks end of a session (Removes endpoint from licensing count)

Provides IP address

Profile

IOS probe

Page 30: Mdm Byod Chop House Workshop   Final

© 2012 GTRI30

MDM vs BYOD/NAC

MDM BYOD /NAC

Managing Device on 3g/ 4g

Manage Files

Manage APPS / Email

JailBreak Control

Remote Wipe

Device Encryption

GEO Fencing

Device Recovery- LoJack

Managing device WLAN/ Wired Access

Role Based Access Control (RBAC) Concept of Device Stacking on

Corp Identity Posture / Profile / Quarantine Hoteling DLP – Lite on critical Files Authentication/Authorization/

Accounting -AAA

Page 31: Mdm Byod Chop House Workshop   Final

© 2012 GTRI31

Mobile Device Management

David DeCesareSE – Denver Region

Page 32: Mdm Byod Chop House Workshop   Final

© 2012 GTRI32

ZenPrise MDM Slides

See - http://slidesha.re/N2lTWL

Page 33: Mdm Byod Chop House Workshop   Final

© 2012 GTRI33

Questions?

Page 34: Mdm Byod Chop House Workshop   Final

BYOD/MDM Workshop Luncheon

©2012 Global Technology Resources, Inc., All Rights Reserved.Contents herin contain confidential information not to be copiedJuly 26, 2012

Thank You!