Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Mobile is everywhere:
5 Trends with significant implications for the
1
enterprise
Mobile is primary
91% of mobile users keep their device within arms reach 100% of the
time
2
Source: China Mobile 50k survey; Morgan Stanley Research; 2011
3
Source: JiWire Mobile Audience Insights Report Q42011
4
Source: IBM Coremetrics Retail Data as published in 11/24/12 IBM Press Release
Mobile must create a continuous brand experience
90% of users use multiple screens as channels come together to create
integrated experiences
5
Source: Time, Inc. 2012
Personal phones Work tool OS immaturity for A single location Conflicts with user
and tablets shared Entertainment enterprise mgmt could offer public, experience not
with family device BYOD dictates private, and cell tolerated
Enterprise tablet multiple OSs connections OS architecture puts
Personal
shared with co- organization Vendor / carrier Anywhere, anytime the user in control
workers control dictates Increasing reliance Difficult to enforce
Security profile per
Social norms of persona? multiple OS versions on enterprise WiFi policy, app lists
mobile apps vs. file
systems
Base: Those who deployed/piloted/plan to adopt Base: Those who deployed/piloted/plan to adopt mobile,
mobile, excluding dont know (n=1117) excluding dont know (n=1115)
5 October 2012 2012 Tech Trends Report (Weighted by GMV IBM Proprietary) | IBM Market Insights | IBM Confidential
Mobile Security Challenges Faced By Enterprises
Personal vs corporate
Achieving Data Data leakage into and out of the enterprise
Partial wipe vs. device wipe vs legally defensible wipe
Separation & Data policies
Providing Data
Protection Multiple device platforms and variants
Multiple providers
Adapting to the Managed devices (B2E)
Unmanaged devices (B2B,B2E, B2C)
BYOD/
Interrelated
Endpoint policies
Threat protection
Consumerization of
IT Trend
Identity of user and devices
Providing secure Authentication, Authorization and Federation
User policies
access to Secure Connectivity
enterprise
applications & data
Application life-cycle
Developing Secure Static & Dynamic analysis
Call and data flow analysis
Applications Application policies
Designing & Policy Management: Location, Geo, Roles, Response, Time policies
Security Intelligence
Instituting an Reporting
Adaptive Security
Visualizing Mobile Security
WiFi Mobile
apps Develop,
test and
deliver
We
safe
Internet b
applicatio
site
ns
s
Telecom
Secure
Provider
endpoi
nt
device Securit Corporat
and y e
data Achieve Visibility Gatewa Intranet
and Enable y &
Secure access to
Adaptive Security Systems
enterprise applications
Posture
and data
Addressing Security Imperatives and Challenges?
Corporate
Internet
Intranet
Getting Started with Mobile Security Solutions
Security goals
Protect user data
Protect system resources (hardware, software)
Provide application isolation
Permissions
In Android, each application runs as its own
user. Unless the developer explicitly exposes
files to other applications, files created by one
application cannot be read or altered by another
application.
Password Protection
Android can require a user-supplied password
prior to providing access to a device. In addition
to preventing unauthorized use of the device,
this password protects the cryptographic key for
full file system encryption.
Encryption
Encryption
Android 3.0+ provides full filesystem
encryption, so all user data can be encrypted in
the kernel
Prevention
Minimization
Detection
Reaction
Prevent
Whitelist model
1.Allow minimal access by
default
2.Allow for user accepted
access to resources
Ask users less questions
Make questions more
understandable
194 permissions
o More granularity
o Less understandability
More Privilege Separation