The New World of Security for Business Travellers
Anurag Lal Senior Vice PresidentStrategic Services & Business Development
Wi-Fi Business Development Summit, Milan
26th October 2005
2
THE SECURE MOBILITY DILEMMA:
Availability
Security
Usability
Control
DEMAND FOR ACCESSWorkforce
ProductivityCorporate
AgilityGlobalReach
Business ProcessOptimization
On-DemandEnterprise
NEED TO PROTECTUser
IdentitiesTrade
SecretsRegulatoryCompliance
DeviceIntegrity
IP onDevices
NetworkOperations
CustomerPrivacy
Painful Business Compromises
3
THE MOBILE RISK
Vulnerability Means Expense
4
EVOLUTION OF THREATS
SECURITY: #1 issue for Broadband Mobility
5
Piecemeal processes through “bundled” solutionsSecurity tools and connectivity service operate in silos Danger from inconsistent or improper use of these tools
Endpoint protection only when touching enterpriseDuring Internet-only sessions, pre-VPN window, and during VPN sessionAccelerate remediation once new threat/antidote discovered
Inability to combine best-of-breed point solutionsNo security vendor are strong across the board“Forklift upgrade” of existing security components
SECURITY SOLUTIONS TODAY
6
Data
User and Device Authentication
IdentityDeviceAutomated
Assessment & Remediation
NetworkRole-Based
NetworkSecurity
Coordinated protection of identities, endpoints, networks and data that ties together authentication, compliance and network authorization.
Enforced VPN
TRUSTED CONNECTIONS. NO COMPROMISE.
7
SECURING THE CONNECTION PROCESS
Policy Orchestration PlatformSingle point of control for managing and enforcing policies
INTERNET CONNECTION LAN CONNECTION
Internet AccessRestricted
VPN AccessPolicies Enforced
TrustedNetworks
EndpointLockdown
Securing theConnection
DynamicPolicyRetrieval
RemoteVulnerabilityRemediation
CoordinatedNetworkEnforcement
8
Protection of informationUsername / Password (single factor) authentication is not secure enough in current environment.
Connection paradigm driving two factor authentication to enable trusted computing.
Mechanism for “digital fingerprinting” and policy enforcement that ONLY allows corporate authorized devices to attach to the corporate LAN remotely.
Almost 2,000 mobile phones are lost every day in the UK(Source: Metropolitian Police, UK)
49% of organizations experienced laptop or mobile phone theft (Source: CSI/FBI 2004 Computer Crime and Security Survey)
DEVICE SECURITY
9
SUMMARY
Mobility is rapidly evolving but it is not just about connectivity
Security must be addressed from a holistic point of view in order for gaps to be identified and closed
Policy Orchestration services tie internet and VPN access to both strong device/user authentication and endpoint policy compliance
11
Q&A
Securing Mobile Data SessionsAnurag LalSenior Vice President
Strategic Services & Business [email protected]