mobile device management - is it all about the tools

Post on 18-Feb-2017

284 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

2

MOBILE DEVICE MANAGEMENT„IS IT ALL ABOUT THE TOOLS?“

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 3

A FEW THOUGHTS FOR STARTERS

Why do we need MDM to begin with?

We have mobile devices Mobile devices can be used productively (somewhat) Company data might be stored and processed on them Mobile devices can access to company networks People do strange things with their devices

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 4

THE HARD QUESTIONS FIRST…

Management Decisions:- Do we allow mobile devices at all?- Do we issue devices or go BYOD?- Cost considerations (cheaper vs. more secure)

„IT is a cost center, not a profit driver…

- Do we accept the risks (Loss / Theft / Malware / …)?

…also, we have never been hacked before.“

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 5

WHAT TO CONSIDER: INFRASTRUCTURE & PROCEDURES

Changes required to existing infrastructure?- Enough IP address space?- Consider traffic

- Procedures for rooted devices- Prevent use / installation of malicious apps

Image: cyberkey.in

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 6

MOBILE MALWARE

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 7

WHAT TO CONSIDER: „WHAT IF…?“

Emergency plans for theft/loss- Remote wiping- Geolocation- Make encryption mandatory

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 8

Gather information about legal requirements/restrictions- Different legal situations in different countries / in between states- Watch out for Privacy regulations

(e.g. Germany requires expressed consent from user for Geolocation)§§

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 9

Inform users:

- Certain functions may delete private data if required (in case of theft/loss)- Device location can be tracked- Restrictions are in place for Wifi access- Rules for app usage are in effect (where applicable)

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 10

… THANK YOU!

top related