Download - BYOD and Your Business
![Page 1: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/1.jpg)
Enabling Inside-Out Network Security
BYOD and Your Business
Learn about the BYOD trend, the risks associated with this trend, and how to successfully adopt BYOD while securing
your network.
![Page 2: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/2.jpg)
Enabling Inside-Out Network Security
Agenda
• The rise of BYOD• Security risks associated with
BYOD• A BYOD strategy• NetClarity’s Internal Security
Solution
![Page 3: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/3.jpg)
Enabling Inside-Out Network Security
• Gartner projects a 9-40% savings using employee PCs
• 1 in 10 use personal computers for primary work device today
• 50% use personal computers for work at some time
• 43% of companies have a written policy, with specific rules
The Rise of BYOD
![Page 4: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/4.jpg)
Enabling Inside-Out Network Security
BYOD: A fast-growing Dilemma
Personal AND ProfessionalWired AND Wireless ANY operating system
The challenge: seamless and secure management of ALL devices
By 2016 at least 50% of enterprise email users will rely primarily on a browser, tablet or mobile client instead of a desktop client. – Gartner
- AND -Today, 80% of attacks occur inside the network - SANS
![Page 5: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/5.jpg)
Enabling Inside-Out Network Security
5
The “Security” dilemma of BYOD
1.People2.Processes3.Policy4.Technology
![Page 6: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/6.jpg)
Enabling Inside-Out Network Security
Breach Statistics
174 million compromised records last year
…and their firewall didn’t stop them!
Verizon 2012 Data Breach Investigations Report
![Page 7: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/7.jpg)
Enabling Inside-Out Network Security
And you thought a firewall was all you
needed?
![Page 8: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/8.jpg)
Enabling Inside-Out Network Security
BYOD: How is security breached?
Data
1. Accidentally download malware onto your device.
2. Bring that device into work and bypass the firewall.
3. A Trojan gets onto the network.
4. Data gets transferred to a hacker without you even knowing it!
![Page 9: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/9.jpg)
Enabling Inside-Out Network Security
All Networks and IP Devices have Holes that are known as:
Common Vulnerabilities and Exposures (CVE)
https://nvd.nist.gov/
What’s the real internal security problem?
![Page 10: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/10.jpg)
Enabling Inside-Out Network Security
BYOD Risk: New Malware Outbreaks…
Your favorite anti-virus program catches no more than 70-90% of malware!
What’s running on everyone’s personal device? Who knows?
![Page 11: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/11.jpg)
Enabling Inside-Out Network Security
BYOD Risk: New Malware Outbreaks…
“Here's a video of my Droid cell phone that was hacked after I loaded the new "Mobile Skype" program. It's as if the phone has been possessed. Had to get a new cell.”
http://www.youtube.com/watch?v=mpZgw5Db2ok “Noticed this crazy messaging happening on my
iPad2 earlier this evening.
You can see that there are messages being sent (blue background) and the keypad is not being used at the time. Secondly, I don't have a Romanian number or contact. Thirdly, I don't speak Romanian.
Weird I tells ye! and it's still messaging back and forth as I type here.”http://www.youtube.com/watch?v=wa9H-8Q
1FeA
![Page 12: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/12.jpg)
Enabling Inside-Out Network Security
BYOD Risk: CVEs (iPhone sample…)
See: http://nvd.nist.gov
The current value of credit cards on the black market – Look, you can even buy in bulk!
![Page 13: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/13.jpg)
Enabling Inside-Out Network Security
BYOD Risk: Lost or Stolen?
“More than a third of consumers have had cell phones lost or stolen”
![Page 14: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/14.jpg)
Enabling Inside-Out Network Security
BYOD Risks: Control and Compliance
The businesses in each of these vertical markets are all very different, but they are all faced with similar challenges:
• Ensuring Business Continuity.• Controlling Network Access.• Ensuring Regulatory Compliance.
Behind every firewall, you need to manage BYOD.
![Page 15: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/15.jpg)
Enabling Inside-Out Network Security
People Awareness, training, culture
Process Assessments, real-time monitoring, onboarding/departing employees, quarantining devices
Policy Acceptable use, email security, access control, password policy, patch mgmt., incident response, business continuity
Technology NAC, MDM, firewalls, A/V, IPS/WIPS, etc.
BYOD Strategy
![Page 16: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/16.jpg)
Enabling Inside-Out Network Security
Multi-faceted Internal Security
Internal Security
FirewallEnd PointProtection
IPS/IDS
Asset Management and Access Control.
Vulnerability management, compliance reporting and Auditing
Zero-Day Defense
![Page 17: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/17.jpg)
Enabling Inside-Out Network Security
Remember, while firewalls protect networks from the outside-in, over 80% of successful attacks come
from the inside.
There is a major need for internal UTM to secure networks from the
inside-out.
Internal UTM: Critical technology
![Page 18: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/18.jpg)
Enabling Inside-Out Network Security
Inside-Out Network Security™ Appliances
Scalable from 25 devices to thousands
• Immediately control access by any and all types of devices – if you don’t want them on the network, they don’t get on the network.
• Identify network holes (CVE®s) on the inside of your network and guide proactive remediation process
• Defend against malware through automated detection and blocking
![Page 19: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/19.jpg)
Enabling Inside-Out Network Security
![Page 20: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/20.jpg)
Enabling Inside-Out Network Security
![Page 21: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/21.jpg)
Enabling Inside-Out Network Security
![Page 22: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/22.jpg)
Enabling Inside-Out Network Security
How NetClarity stops a breach
Data
1. Accidentally download malware onto your device.
2. Bring that device into work and bypass the firewall.
3. A Trojan gets onto the network.4. NetClarity quarantines the device
that has a Trojan installs5. NetClarity stops the hacker from
receiving the data he was hoping to obtain!
![Page 23: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/23.jpg)
Enabling Inside-Out Network Security
“NetClarity Picks Up Where Firewalls, Anti-virus, Intrusion Detection Systems and Intrusion Prevention Systems Leave Off”
– John Gallant, President, Network World
“The Most Innovative NAC Vendor in the World” – Network Products Guide, Hot Companies, 2009, 2010, 2011
“The only Next Gen. NAC solution to be integrated with RSA enVision® for enterprise-wide internal risk management”
– Apurva More, RSA Secured Program Manager
The BYOD NACwall Appliance Awards
![Page 24: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/24.jpg)
Enabling Inside-Out Network Security
“When evaluating NAC solutions, look for vendors that understand the consumerization trend and support, or have plans to support, policies for
managing the non-Microsoft endpoints that will inevitably attempt to connect to your network….
Gartner NAC Report, 12/2010
Next Generation NAC, Manages BYOD!
• Convenient to install• Universal in application • All devices, OS,
wired/wireless
![Page 25: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/25.jpg)
Enabling Inside-Out Network Security
1. Personal devices are pervasive but the BYOD trend isn’t going anywhere.
2. They add a new level of risk management to the organization.
3. There are technologies to mitigate the risk, like NetClarity’s NACwalls!
In Summary: Managing BYOD
![Page 26: BYOD and Your Business](https://reader036.vdocuments.us/reader036/viewer/2022062511/54bcb18f4a7959d21b8b4632/html5/thumbnails/26.jpg)
Enabling Inside-Out Network Security
www.netclarity.net
Questions?