byod and your business ebook
TRANSCRIPT
-
7/29/2019 BYOD and Your Business eBook
1/26
Enabling Inside-Out Network Security
Learn about the BYOD trend, the risks associated with this trend, and
how to successfully adopt BYOD while securing your network.
-
7/29/2019 BYOD and Your Business eBook
2/26
Enabling Inside-Out Network Security
Agenda
-
7/29/2019 BYOD and Your Business eBook
3/26
Enabling Inside-Out Network Security
Gartner projects a 9-40% savings usingemployee PCs
1 in 10 use personal computers for
primary work device today
50% use personal computers for work atsome time
43% of companies have a written policy,with specific rules
The Rise of BYOD
-
7/29/2019 BYOD and Your Business eBook
4/26
Enabling Inside-Out Network Security
BYOD: A fast-growing Dilemma
The challenge: seamless and secure management of ALL devices
By 2016 at least 50% of enterprise email users will rely primarily on a browser,
tablet or mobile client instead of a desktop client. Gartner
- AND -
Today, 80% of attacks occur inside the network - SANS
-
7/29/2019 BYOD and Your Business eBook
5/26
Enabling Inside-Out Network Security
5
The Security dilemma of BYOD
1. People
2. Processes3. Policy
4. Technology
-
7/29/2019 BYOD and Your Business eBook
6/26
Enabling Inside-Out Network Security
Breach Statistics
Verizon 2012 Data Breach Investigations Report
-
7/29/2019 BYOD and Your Business eBook
7/26
Enabling Inside-Out Network Security
-
7/29/2019 BYOD and Your Business eBook
8/26
Enabling Inside-Out Network Security
BYOD: How is security breached?
Data
1. Accidentally download
malware onto your device.2. Bring that device into work
and bypass the firewall.
3. A Trojan gets onto the
network.
4. Data gets transferred to a
hacker without you even
knowing it!
-
7/29/2019 BYOD and Your Business eBook
9/26
Enabling Inside-Out Network Security
All Networks and IP Devices have Holes that
are known as:
Common Vulnerabilities and
Exposures (CVE)
Whats the real internal security problem?
-
7/29/2019 BYOD and Your Business eBook
10/26
Enabling Inside-Out Network Security
BYOD Risk: New Malware Outbreaks
Your favorite anti-virus program catches no more than 70-90% of malware!
Whats running on everyones personal device? Who knows?
-
7/29/2019 BYOD and Your Business eBook
11/26
Enabling Inside-Out Network Security
BYOD Risk: New Malware Outbreaks
Here's a video of my Droid cell phone that was hackedafter I loaded the new "Mobile Skype" program. It's as if the
phone has been possessed. Had to get a new cell.
http://www.youtube.com/watch?v=mpZgw5Db2ok
Noticed this crazy messaging happening on my iPad2
earlier this evening.
You can see that there are messages being sent (blue
background) and the keypad is not being used at the time.
Secondly, I don't have a Romanian number or contact.Thirdly, I don't speak Romanian.
Weird I tells ye! and it's still messaging back and forth as I
type here.http://www.youtube.com/watch?v=wa9H-8Q1FeA
http://www.youtube.com/watch?v=mpZgw5Db2okhttp://www.youtube.com/watch?v=wa9H-8Q1FeAhttp://www.youtube.com/watch?v=wa9H-8Q1FeAhttp://www.youtube.com/watch?v=wa9H-8Q1FeAhttp://www.youtube.com/watch?v=wa9H-8Q1FeAhttp://www.youtube.com/watch?v=mpZgw5Db2ok -
7/29/2019 BYOD and Your Business eBook
12/26
Enabling Inside-Out Network Security
BYOD Risk: CVEs (iPhone sample)
See: http://nvd.nist.gov
The current value of credit cards on the black market Look, you can even buy in bulk!
http://nvd.nist.gov/http://nvd.nist.gov/ -
7/29/2019 BYOD and Your Business eBook
13/26
Enabling Inside-Out Network Security
BYOD Risk: Lost or Stolen?
More than
a third of
consumershave hadcell phones
lost orstolen
-
7/29/2019 BYOD and Your Business eBook
14/26
Enabling Inside-Out Network Security
BYOD Risks: Control and Compliance
The businesses in each of these vertical markets are
all very different, but they are all faced with similar
challenges:
Ensuring Business Continuity.
Controlling Network Access.
Ensuring Regulatory Compliance.
Behind every firewall, you need to manage BYOD.
-
7/29/2019 BYOD and Your Business eBook
15/26
Enabling Inside-Out Network Security
Awareness, training, culture
Assessments, real-time monitoring,
onboarding/departing employees, quarantining devices
Acceptable use, email security, access control,
password policy, patch mgmt., incident response,
business continuity
NAC, MDM, firewalls, A/V, IPS/WIPS, etc.
BYOD Strategy
-
7/29/2019 BYOD and Your Business eBook
16/26
Enabling Inside-Out Network Security
Multi-faceted Internal Security
-
7/29/2019 BYOD and Your Business eBook
17/26
Enabling Inside-Out Network Security
Remember, while firewalls protectnetworks from the outside-in, over80% of successful attacks come
from the inside.
There is a major need for internalUTM to secure networks from the
inside-out.
Internal UTM: Critical technology
-
7/29/2019 BYOD and Your Business eBook
18/26
Enabling Inside-Out Network Security
Scalable from 25 devices to thousands
by any and all
types of devices if you dont want them
on the network, they dont get on the
network.
network holes (CVEs) on the
inside of your network and guide
proactive remediation process
through
automated detection and blocking
-
7/29/2019 BYOD and Your Business eBook
19/26
Enabling Inside-Out Network Security
-
7/29/2019 BYOD and Your Business eBook
20/26
Enabling Inside-Out Network Security
-
7/29/2019 BYOD and Your Business eBook
21/26
Enabling Inside-Out Network Security
-
7/29/2019 BYOD and Your Business eBook
22/26
Enabling Inside-Out Network Security
How NetClarity stops a breach
Data
1. Accidentally download malware onto your
device.2. Bring that device into work and bypass the
firewall.
3. A Trojan gets onto the network.
4. NetClarity quarantines the device that has
a Trojan installs
5. NetClarity stops the hacker from receivingthe data he was hoping to obtain!
-
7/29/2019 BYOD and Your Business eBook
23/26
Enabling Inside-Out Network Security
NetClarity Picks Up Where Firewalls,
Anti-virus, Intrusion Detection Systems
and Intrusion Prevention SystemsLeave Off
John Gallant, President, Network World
The Most Innovative
NAC Vendor in the
World Network Products Guide, Hot
Companies, 2009, 2010, 2011
The only Next Gen. NAC solution to be
integrated with RSA enVision forenterprise-wide internal risk management
Apurva More, RSA Secured Program Manager
The BYOD NACwall Appliance Awards
-
7/29/2019 BYOD and Your Business eBook
24/26
Enabling Inside-Out Network Security
When evaluating NAC solutions, look for vendorsthat understand the consumerization trend and
support, or have plans to support, policies for
managing the non-Microsoft endpoints
that will inevitably attempt to connect to yournetwork.
Gartner NAC Report, 12/2010
Next Generation NAC, Manages BYOD!
-
7/29/2019 BYOD and Your Business eBook
25/26
Enabling Inside-Out Network Security
1. Personal devices are pervasive but theBYOD trend isnt going anywhere.
2. They add a new level of riskmanagement to the organization.
3. There are technologies to mitigate therisk, like NetClaritys NACwalls!
In Summary: Managing BYOD
Q i ?
-
7/29/2019 BYOD and Your Business eBook
26/26
Enabling Inside-Out Network Security
Questions?
http://www.netclarity.net/