SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
-
Upload
amd-developer-central -
Category
Technology
-
view
374 -
download
1
description
Transcript of SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
![Page 1: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/1.jpg)
Protec'ng Mobile Data
• Norman Shaw • CEO
• ExactTrak Ltd
![Page 2: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/2.jpg)
Discussion points
• Why protec9ng mobile data is difficult ? • What is going wrong ? • What can be done ? • Address the differing needs of enterprise and consumer • Some innova9ve solu9ons • Maximise the commercial opportuni9es • A glimpse into the future
![Page 3: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/3.jpg)
There are a lot of good solu'ons:
but s9ll there are problems
![Page 4: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/4.jpg)
Polarised Target Markets
Enterprise
Consumer
Restricts freedom of use Not secure enough for enterprise
![Page 5: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/5.jpg)
Just some of the problems
• 76% have lost a laptop, tablet or mobile with sensi9ve data • 84% use personal emails to send sensi9ve informa9on • 50% use public cloud services to send sensi9ve files • More than 30% have lost a USB drive containing confiden9al informa9on • 63% of IT managers lack visibility of mobile data within their organisa9on
Wall Street Journal Aug 2013 5000 interviews
![Page 6: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/6.jpg)
and then there is ….
B Y O D
50% of firms with BYOD policies have had a security breach 32% do not have a BYOD contract 40% don’t password-‐protect their mobile devices 51% connect their devices to unsecured wireless networks 52% enable their “Bluetooth discoverable” mode. Dell survey 2013
ring
isaster
wn
our
![Page 7: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/7.jpg)
Legal issues
• Who owns the data • Who has control • What are my rights • Rights to walk away
• Right to delete
![Page 8: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/8.jpg)
Dele'ng data
1881 devices lost. 680 recovered Remote delete requests
Recovered % deleted
• iOS 317 43%
• Android 193 57%
• Blackberry 170 61%
![Page 9: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/9.jpg)
What are we protec'ng?
Enterprise data Personal informa9on Hardware Reputa9ons
all of the above?
![Page 10: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/10.jpg)
What are we protec'ng data from?
• Employees
• Stupidity • Ignorance • Loss • Thec • Fraud
![Page 11: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/11.jpg)
Privacy
• We know what you are doing
• Who can see my files • Prism
![Page 12: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/12.jpg)
Consumer vs. Enterprise
• Twin approach strategy
• Something for everyone
![Page 13: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/13.jpg)
Obstacles to overcome
• Opera9ng system
• Updates cause problems
• Roo9ng
• Reset
![Page 14: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/14.jpg)
What is needed
• Easy to use
• Addresses Enterprise and consumer needs
• Mul9 plaeorm
• Mul9 form factor
• Deployment Secure and Flexible
• Make the user part of the solu9on
![Page 15: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/15.jpg)
Security Guardian
4 -‐64 GB memory Secure laptop Access GPS
Ba9ery
Data Delete Memory Switch Remote Control
EncrypBon
![Page 16: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/16.jpg)
Management console
• Cloud based • Management & user interface • Loca9on via GPS, GSM & WiFi • Geozones • Timed access • OTA configura9on • Remote turn On and Off • Remote data destruct • Verifiable audit trail and repor9ng
![Page 17: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/17.jpg)
Moving forward
![Page 18: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/18.jpg)
GeJng on the Route of Trust
Trusted Execu9on Environment
![Page 19: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/19.jpg)
A power train
![Page 20: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/20.jpg)
The ExactTrak approach
Home Work
Enterprise Personal
Access privileges VPN Profiles Apps Email Files etc.
![Page 21: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/21.jpg)
Ticking the boxes
• Route of Trust starts at power On • Opera9ng System independent • Total separa9on of work /personal informa9on • Individual keys to protect privacy
![Page 22: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/22.jpg)
Commercial opportuni'es
How many products with TrustZone Sold as a service License Management Console licenses Corporate / Enterprise user licenses Consumer user licenses Upgrades depending on service / func9on White label, OEM and bespoke customisa9on Ac9va9on fee for ODM / OEM Partnership with exis9ng MDM service providers
300m and growing ?
![Page 23: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/23.jpg)
Future
• Embedded GSM modem for any9me security
• Self provisioning SIM on chip • Informa9on Lifecycle Management • Remote Key Management • Wearable gadgets
![Page 24: SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell](https://reader033.fdocuments.in/reader033/viewer/2022052910/559b25d41a28ab5f488b4736/html5/thumbnails/24.jpg)
Discussion points
• Why protec9ng mobile data is difficult ? • What is going wrong ? • What can be done ? • Address the differing needs of enterprise and consumer • Some innova9ve solu9ons • Maximise the commercial opportuni9es • A glimpse into the future