Академический Документы
Профессиональный Документы
Культура Документы
Learn about the BYOD trend, the risks associated with this trend, and how to successfully adopt BYOD while securing your network.
Agenda
Enabling Inside-Out Network Security
The rise of BYOD Security risks associated with BYOD A BYOD strategy NetClaritys Internal Security Solution
By 2016 at least 50% of enterprise email users will rely primarily on a browser, tablet or mobile client instead of a desktop client. Gartner - AND Today, 80% of attacks occur inside the network - SANS
Breach Statistics
Enabling Inside-Out Network Security
1. Accidentally download malware onto your device. 2. Bring that device into work and bypass the firewall. 3. A Trojan gets onto the network. 4. Data gets transferred to a hacker without you even knowing it!
Data
All Networks and IP Devices have Holes that are known as:
https://nvd.nist.gov/
Your favorite anti-virus program catches no more than 70-90% of malware! Whats running on everyones personal device? Who knows?
Here's a video of my Droid cell phone that was hacked after I loaded the new "Mobile Skype" program. It's as if the phone has been possessed. Had to get a new cell.
http://www.youtube.com/watch?v=mpZgw5Db2ok
Noticed this crazy messaging happening on my iPad2 earlier this evening. You can see that there are messages being sent (blue background) and the keypad is not being used at the time. Secondly, I don't have a Romanian number or contact. Thirdly, I don't speak Romanian.
Weird I tells ye! and it's still messaging back and forth as I type here.
http://www.youtube.com/watch?v=wa9H-8Q1FeA
The current value of credit cards on the black market Look, you can even buy in bulk!
See: http://nvd.nist.gov
More than a third of consumers have had cell phones lost or stolen
The businesses in each of these vertical markets are all very different, but they are all faced with similar challenges:
BYOD Strategy
Enabling Inside-Out Network Security
Process Assessments, real-time monitoring, onboarding/departing employees, quarantining devices Policy Acceptable use, email security, access control, password policy, patch mgmt., incident response, business continuity Technology NAC, MDM, firewalls, A/V, IPS/WIPS, etc.
IPS/IDS
Firewall
Asset Management and Access Control. Vulnerability management, compliance reporting and Auditing Zero-Day Defense
Internal Security
Remember, while firewalls protect networks from the outside-in, over 80% of successful attacks come from the inside. There is a major need for internal UTM to secure networks from the inside-out.
1. Accidentally download malware onto your device. 2. Bring that device into work and bypass the firewall. 3. A Trojan gets onto the network. 4. NetClarity quarantines the device that has a Trojan installs 5. NetClarity stops the hacker from receiving the data he was hoping to obtain!
Data
NetClarity Picks Up Where Firewalls, Anti-virus, Intrusion Detection Systems and Intrusion Prevention Systems Leave Off
When evaluating NAC solutions, look for vendors that understand the consumerization trend and support, or have plans to support, policies for
managing the non-Microsoft endpoints that will inevitably attempt to connect to your network.
1. Personal devices are pervasive but the BYOD trend isnt going anywhere.
Questions?
Enabling Inside-Out Network Security
www.netclarity.net