Mobilemonday b2b b-asecurity
-
Upload
mobile-monday-brussels -
Category
Technology
-
view
517 -
download
0
description
Transcript of Mobilemonday b2b b-asecurity
![Page 1: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/1.jpg)
Mobile Device SecurityThe next challenge
Jan Guldentops ( [email protected] )BA N.V. ( http://www.ba.be )
![Page 2: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/2.jpg)
About BA
More information
![Page 3: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/3.jpg)
Information Integrationi
![Page 4: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/4.jpg)
Our Commitment Ask our partners
![Page 5: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/5.jpg)
Our Commitment Ask our clients
Public Sector/Government
Non-profit
Enterprise
Association Vincotte Nuclear, Idewe, Handicap international, Jeugd en Stad Vzw)
Hamburger Mannheimer, Didak Injection, Credimo, Nollekens (PGZ International), Altrad Havico, Paratel, Sodexo, Securex
Vlaams Parlement, Leuven, Hasselt, Boom, Overpelt, Mortsel, Ranst, Lummen, Olen, St-Katelijne-Waver, Kasterlee, Oud-Turnhout, OCMW Kontich, PZ Noord, Balen, Schoten, Zwijndrecht, KBR
![Page 6: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/6.jpg)
Information Integration BA’s infrastructure for:
Digitisation
SecurityMobility
VirtualisationData Storage and Warehousing
Data Protection and Integrity
Digital Preservation and Archiving
Data Access and Portability
![Page 7: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/7.jpg)
Traditional Security-model is gone forever
There is no perimeter anymore...
Users are accessing data/app(lication)sFrom everywhere
From all kinds of devices
![Page 8: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/8.jpg)
There are no sure bets in the mobile device market
King today, beggar tomorrow(e.g. RIM, Nokia)
What will happen to Apple now Steve is dead ?
Will Nokia rise from the grave by selling its soul to the devil ?
![Page 9: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/9.jpg)
End-user rules...
ICT/security has to follow not lead
End-user decides which (cloud) apps/device he or she is going to use
Wants to have that sexy device that fiits his personality...
![Page 10: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/10.jpg)
BYOD
Bring your own device
Let users buy their own phone, tablet or laptop
Make IT support it
![Page 11: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/11.jpg)
Most secure devices
1. Blackberry 2. iOS
3. Symbian 4. Android
5. Windows Phone
![Page 12: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/12.jpg)
Armsrace
The security feature list is continuously evolving version by version.
IOS5 and Android 4 look very promising
Windows Phone is too early days
Security should be in the device OS itself and not added by extra software
![Page 13: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/13.jpg)
Mobile security = big business
All antivirus vendors have a mobile solutionKaspersky (not for Ios), Gdata & Symantec (only android), etc.
Lots of mobile device management platforms out there
Mobile Iron, Zenprise, Good technologies, Kaspersky
![Page 14: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/14.jpg)
Problems to fear / fix
DATA LEAKAGEEncrypt / remote wipe
Don't store confidential data on the device
MALWAREUpdate your os
Control the dev community / signingWalled gardens / sandboxes
![Page 15: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/15.jpg)
Problems to fear / fix (2)
STRONG AUTHENTICATIONPassword policiesBetter: certificates
CONTROLControll the apps/usage of your endusers
BACKUPS
![Page 16: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/16.jpg)
Conclusions
The ghost is out of the bottle, no way back Go for a crossplatform solution
Control what you can controlBYOD will happen so prepare for it
![Page 17: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/17.jpg)
Conclusions
First you need a good policyWhat level of security do you want/have to accomplish?
Riskanalysis – is this possible ?Plan for the worse
Then find the tools to do itFirst tool is common sense (be smart)
Look at the management solutions
![Page 18: Mobilemonday b2b b-asecurity](https://reader033.fdocuments.in/reader033/viewer/2022061218/54b5f1694a79598d6f8b4579/html5/thumbnails/18.jpg)
Thank YouContact us
016/29.80.45
016/29.80.46
www.ba.be
Vaartdijk 3/501 B-3018 Wijgmaal, Belgium
www.ba.bewww.ba.be
Twitter: JanGuldentops