mobile device management - is it all about the tools

11

Upload: g-data-software

Post on 18-Feb-2017

284 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Mobile Device Management - is it all about the tools
Page 2: Mobile Device Management - is it all about the tools

2

MOBILE DEVICE MANAGEMENT„IS IT ALL ABOUT THE TOOLS?“

Page 3: Mobile Device Management - is it all about the tools

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 3

A FEW THOUGHTS FOR STARTERS

Why do we need MDM to begin with?

We have mobile devices Mobile devices can be used productively (somewhat) Company data might be stored and processed on them Mobile devices can access to company networks People do strange things with their devices

Page 4: Mobile Device Management - is it all about the tools

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 4

THE HARD QUESTIONS FIRST…

Management Decisions:- Do we allow mobile devices at all?- Do we issue devices or go BYOD?- Cost considerations (cheaper vs. more secure)

„IT is a cost center, not a profit driver…

- Do we accept the risks (Loss / Theft / Malware / …)?

…also, we have never been hacked before.“

Page 5: Mobile Device Management - is it all about the tools

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 5

WHAT TO CONSIDER: INFRASTRUCTURE & PROCEDURES

Changes required to existing infrastructure?- Enough IP address space?- Consider traffic

- Procedures for rooted devices- Prevent use / installation of malicious apps

Image: cyberkey.in

Page 6: Mobile Device Management - is it all about the tools

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 6

MOBILE MALWARE

Page 7: Mobile Device Management - is it all about the tools

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 7

WHAT TO CONSIDER: „WHAT IF…?“

Emergency plans for theft/loss- Remote wiping- Geolocation- Make encryption mandatory

Page 8: Mobile Device Management - is it all about the tools

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 8

Gather information about legal requirements/restrictions- Different legal situations in different countries / in between states- Watch out for Privacy regulations

(e.g. Germany requires expressed consent from user for Geolocation)§§

Page 9: Mobile Device Management - is it all about the tools

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 9

Inform users:

- Certain functions may delete private data if required (in case of theft/loss)- Device location can be tracked- Restrictions are in place for Wifi access- Rules for app usage are in effect (where applicable)

Page 10: Mobile Device Management - is it all about the tools

G DATA | 30Y ANNIVERSARY SECURITY SUMMIT | BOCHUM, SEPTEMBER 24, 2015 10

… THANK YOU!

Page 11: Mobile Device Management - is it all about the tools