Checkpoint Software Tech. (UK) Ltd. 3 STEPS TO IMPLEMENTING AN EFFECTIVE BYOD MOBILE SECURITY STRATEGY Check Point: 3 Steps to Implementing an Effective BYOD Mobile Security Strategy | White Paper 1. UNDERSTANDING THE RISKS AND VALUE OF MOBILITY TO YOUR STAKEHOLDERS The key to securing your mobility is to first understand how it is being used in your environment and what is potentially at risk. Taking stock of the mobile devices, applications and traffic in your network is critical to identifying how your data and resources are potentially vulnerable. Since mobile devices are being used to do more and more –the devices being carried around today are 3000 times more powerful than the compute power on the original space shuttle6- the potential risks continue to increase. Once an attacker is “in” – tricking a user into downloading malware or a malicious app, infecting a WiFi hot spot, exploiting a device vulnerability, in the operating system, hardware, configurations, etc. - they can do almost anything on the device and apps, including: • Intercept emails and text messages • Steal application data, including content within secure containers and wrappers (refer to the white paper “How Mobile Malware Compromises Your Secure Containers and Enterprise Content” to understand how attackers bypass these measures to compromise enterprise data) • Capture browsing activity, including any usernames and passwords entered into sites • Extract contact lists, call and text logs • Activate the microphone (to listen in on private conversations and meetings) • Use the camera to take pictures or videos (white boards, manufacturing plant layouts, etc.) • Track location (where an executive is going could provide insights into potential customer deals or merger/ acquisition plans, etc.) Stakeholders across your organization will likely view these risks differently and have different expectations around what is needed to effectively secure your data and resources. Since security is always a balancing act, requiring decisions on when and how to allow or shut down access, it’s important to understand what your stakeholders are looking for out of mobility and what they are willing to accept in terms of security. 6 ROLE WHAT MOBILITY REPRESENTS TO THEM THEIR MOBILE SECURITY PRIORITIES CISO Business-level objective to improve agility and overall productivity. Getting ahead of the evolving mobile threat landscape to prevent intellectual property loss, tough board-level discussions and lawsuits that: • Erode customer confidence • Tarnish brand reputation • Reduce competitive advantage AUDIT & RISK MANAGERS An initiative that introduces risks that need to be quantified and managed. Meeting compliance goals by adhering to security best practices and putting measures in place that reduce the attack surface. AUDIT & RISK MANAGERS An initiative with a lot of moving parts out of their control. Need to support: • BYOD • New mobile application roll outs • Ongoing management and maintenance of mobile policies Improving visibility to better manage mobile devices and applications and reduce risks to ensure alignment with overall security policies and practices. http://knopfdoubleday.com/2011/03/14/your-cell-phone/ CONTACT US Worldwide Headquarters | 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected] U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com ©2015 Check Point Software Technologies Ltd. All rights reserved. Classification: [Protected] March 30, 2015 3 Check Point: 3 Steps to Implementing an Effective BYOD Mobile Security Strategy | White Paper SECURITY TEAM An initiative that opens up a lot of new threat vectors that need to be managed and mitigated to keep resources safe and prevent data leakage. Effectively assessing mobile risks, integrating mobile intelligence into security information and event management (SIEM) and network access control (NAC) systems, and consistently applying policies, regardless of how or where a user accesses resources. EMPLOYEES The convenience of being able to work whenever and wherever they are located. Protecting their privacy and preserving a simple, good user experience. 2. IDENTIFYING THE HOLES IN YOUR MOBILE SECURITY There are a host of solutions that enterprises use to gain visibility into their mobility and security infrastructure and add controls that reduce the risks of their mobility initiatives. Some of the foundational solutions that you may have deployed are: • Mobile Device Management (MDM) Solutions – help you enforce corporate policies around mobility; they keep track of mobile devices in the your environment and manage the access those devices have to corporate data and resources. • Mobile Application Management (MAM) Solutions – often delivered as a function of MDMs, MAMs help you enforce policies around which mobile applications can and cannot be used in the corporate environment. • Network Access Control (NAC) Solutions – enable you to enforce general access policies, typically making decisions based on the user’s role, type of device (including mobile) they are using and type of resource they are trying to access. • Security Information and Event Management (SIEM) Systems– provide visibility into the security alerts generated by all the attack detection solutions (including mobile threat detection solutions - if in place) deployed throughout your network. While effectively managing mobility does have derivative security benefits, inherently reducing the risks of mobile devices and applications, it is not the same as securing it. It is important to understand exactly how the solutions you’ve deployed support your mobile security objectives and where you have holes to determine how best to augment your mobility and security infrastructure to effectively mitigate your risk. MDM AND MAM Capabilities: MDMs/MAMs help you gain visibility into the mobile devices in your environment and enforce policies around what users can and cannot access with their mobile devices, via a variety of mechanisms/ controls: • Device Registration – increasing the visibility of the devices entering your environment; ensures basic compliance to enterprise mobility policies prior to allowing access to corporate resources from that device. • App Management - restricting apps that pose risks to the organization; often uses white or black lists to define what is and isn’t allowed. • Remote Locate, Lock and Wipe Capabilities – protecting the integrity of information on devices that are lost or stolen. CONTACT US Worldwide Headquarters | 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected] U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com ©2015 Check Point Software Tech Please complete the form to gain access to this content Email * First name * Last Name * Access Now
Check Point: 3 Steps to Implementing an Effective BYOD Mobile Security Strategy | White Paper 1. UNDERSTANDING THE RISKS AND VALUE OF MOBILITY TO YOUR STAKEHOLDERS The key to securing your mobility is to first understand how it is being used in your environment and what is potentially at risk. Taking stock of the mobile devices, applications and traffic in your network is critical to identifying how your data and resources are potentially vulnerable. Since mobile devices are being used to do more and more –the devices being carried around today are 3000 times more powerful than the compute power on the original space shuttle6- the potential risks continue to increase. Once an attacker is “in” – tricking a user into downloading malware or a malicious app, infecting a WiFi hot spot, exploiting a device vulnerability, in the operating system, hardware, configurations, etc. - they can do almost anything on the device and apps, including: • Intercept emails and text messages • Steal application data, including content within secure containers and wrappers (refer to the white paper “How Mobile Malware Compromises Your Secure Containers and Enterprise Content” to understand how attackers bypass these measures to compromise enterprise data) • Capture browsing activity, including any usernames and passwords entered into sites • Extract contact lists, call and text logs • Activate the microphone (to listen in on private conversations and meetings) • Use the camera to take pictures or videos (white boards, manufacturing plant layouts, etc.) • Track location (where an executive is going could provide insights into potential customer deals or merger/ acquisition plans, etc.) Stakeholders across your organization will likely view these risks differently and have different expectations around what is needed to effectively secure your data and resources. Since security is always a balancing act, requiring decisions on when and how to allow or shut down access, it’s important to understand what your stakeholders are looking for out of mobility and what they are willing to accept in terms of security. 6 ROLE WHAT MOBILITY REPRESENTS TO THEM THEIR MOBILE SECURITY PRIORITIES CISO Business-level objective to improve agility and overall productivity. Getting ahead of the evolving mobile threat landscape to prevent intellectual property loss, tough board-level discussions and lawsuits that: • Erode customer confidence • Tarnish brand reputation • Reduce competitive advantage AUDIT & RISK MANAGERS An initiative that introduces risks that need to be quantified and managed. Meeting compliance goals by adhering to security best practices and putting measures in place that reduce the attack surface. AUDIT & RISK MANAGERS An initiative with a lot of moving parts out of their control. Need to support: • BYOD • New mobile application roll outs • Ongoing management and maintenance of mobile policies Improving visibility to better manage mobile devices and applications and reduce risks to ensure alignment with overall security policies and practices. http://knopfdoubleday.com/2011/03/14/your-cell-phone/ CONTACT US Worldwide Headquarters | 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected] U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com ©2015 Check Point Software Technologies Ltd. All rights reserved. Classification: [Protected] March 30, 2015 3 Check Point: 3 Steps to Implementing an Effective BYOD Mobile Security Strategy | White Paper SECURITY TEAM An initiative that opens up a lot of new threat vectors that need to be managed and mitigated to keep resources safe and prevent data leakage. Effectively assessing mobile risks, integrating mobile intelligence into security information and event management (SIEM) and network access control (NAC) systems, and consistently applying policies, regardless of how or where a user accesses resources. EMPLOYEES The convenience of being able to work whenever and wherever they are located. Protecting their privacy and preserving a simple, good user experience. 2. IDENTIFYING THE HOLES IN YOUR MOBILE SECURITY There are a host of solutions that enterprises use to gain visibility into their mobility and security infrastructure and add controls that reduce the risks of their mobility initiatives. Some of the foundational solutions that you may have deployed are: • Mobile Device Management (MDM) Solutions – help you enforce corporate policies around mobility; they keep track of mobile devices in the your environment and manage the access those devices have to corporate data and resources. • Mobile Application Management (MAM) Solutions – often delivered as a function of MDMs, MAMs help you enforce policies around which mobile applications can and cannot be used in the corporate environment. • Network Access Control (NAC) Solutions – enable you to enforce general access policies, typically making decisions based on the user’s role, type of device (including mobile) they are using and type of resource they are trying to access. • Security Information and Event Management (SIEM) Systems– provide visibility into the security alerts generated by all the attack detection solutions (including mobile threat detection solutions - if in place) deployed throughout your network. While effectively managing mobility does have derivative security benefits, inherently reducing the risks of mobile devices and applications, it is not the same as securing it. It is important to understand exactly how the solutions you’ve deployed support your mobile security objectives and where you have holes to determine how best to augment your mobility and security infrastructure to effectively mitigate your risk. MDM AND MAM Capabilities: MDMs/MAMs help you gain visibility into the mobile devices in your environment and enforce policies around what users can and cannot access with their mobile devices, via a variety of mechanisms/ controls: • Device Registration – increasing the visibility of the devices entering your environment; ensures basic compliance to enterprise mobility policies prior to allowing access to corporate resources from that device. • App Management - restricting apps that pose risks to the organization; often uses white or black lists to define what is and isn’t allowed. • Remote Locate, Lock and Wipe Capabilities – protecting the integrity of information on devices that are lost or stolen. CONTACT US Worldwide Headquarters | 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected] U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com ©2015 Check Point Software Tech
Related Resources Checkpoint Software Tech. (UK) Ltd. Network Boundaries Have Gone Mobile Read more Checkpoint Software Tech. (UK) Ltd. HOW MOBILE MALWARE COMPROMISES YOUR SECURE CONTAIN... Read more Checkpoint Software Tech. (UK) Ltd. CHECK POINT SANDBLAST ZERO-DAY PROTECTION: THE BES... Read more Checkpoint Software Tech. (UK) Ltd. THE TOP 6 CYBER SECURITY THREATS TO IOS DEVICES Read more Checkpoint Software Tech. (UK) Ltd. DEMYSTIFYING MOBILE SECURITY ATTACKS Read more Checkpoint Software Tech. (UK) Ltd. THE TOP 4 CYBER SECURITY THREATS TO ANDROID MOBILE... Read more Checkpoint Software Tech. (UK) Ltd. EXPOSING THE UNKNOWN: HOW SANDBOXING TECHNOLOGY FI... Read more Checkpoint Software Tech. (UK) Ltd. THREAT RESEARCH: TARGETED ATTACKS ON Enterprise E... Read more Load more
© 2024 Infotech Crowd. All rights reserved. Privacy Policy Cookies Policy Advertise with us Back to top