Technical Evaluation Best Practices Guide

Similar documents
WHY MOBILE SECURITY SHOULD BE IN YOUR TOP PRIORITIES

SIX MOBILE SECURITY CAPABILITIES YOU NEED

Finding GDPR non-compliance in a mobile first world

1 Introduction Requirements Architecture Feature List... 4

ForeScout Extended Module for MobileIron

Forescout. eyeextend for MobileIron. Configuration Guide. Version 1.9

ForeScout Extended Module for VMware AirWatch MDM

Lookout Mobile Endpoint Security Console Administrator s Guide

BETTER Mobile Threat Defense (BMTD)

Forescout. eyeextend for VMware AirWatch. Configuration Guide. Version 1.9

Lookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management

Go mobile. Stay in control.

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

1 Introduction Requirements Architecture Feature List... 3

Deploying Lookout with IBM MaaS360

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

Managing Microsoft 365 Identity and Access

Lookout Mobile Endpoint Security. AirWatch Connector Guide

MaaS360 Secure Productivity Suite

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

A: Administering System Center Configuration Manager

Administering System Center Configuration Manager

Administering System Center Configuration Manager

Comodo Certificate Manager

Administering System Center Configuration Manager

Administering System Center Configuration Manager ( A)

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Microsoft Administering System Center Configuration Manager

McAfee MVISION Mobile Threat Detection Android App Product Guide

Course A: Administering System Center Configuration Manager

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Microsoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811

ForeScout Extended Module for Carbon Black

Microsoft Security Management

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

VMware AirWatch Integration with Palo Alto Networks WildFire Integrate your application reputation service with AirWatch

Enterprise Security Solutions by Quick Heal. Seqrite.

PROTECTION SERVICE FOR BUSINESS. Datasheet

ForeScout Extended Module for MaaS360

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Security Automation. Challenge: Automatizzare le azioni di isolamento e contenimento delle minacce rilevate tramite soluzioni di malware analysis

VMware AirWatch Integration with Palo Alto Networks WildFire Integrate your application reputation service with AirWatch

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

MS-20696: Managing Enterprise Devices and Apps using System Center Configuration Manager

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

Phil Schwan Technical

Administering System Center Configuration Manager and Intune

Securing Today s Mobile Workforce

NE Administering System Center Configuration Manager and Intune

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

Administering System Center Configuration Manager

Duration Level Technology Delivery Method Training Credits. System Center Configuration Manager

The threat landscape is constantly

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Microsoft. MS-101 EXAM Microsoft 365 Mobility and Security. m/ Product: Demo File

: 20696C: Administering System Center Configuration Manager and Intune

McAfee MVISION Mobile epo Extension Product Guide

Forescout. eyeextend for IBM MaaS360. Configuration Guide. Version 1.9

Securing the SMB Cloud Generation

Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018

MOBILE SECURITY OVERVIEW. Tim LeMaster

Bring Your Own Device (BYOD) Best Practices & Technologies

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Administering System Center Configuration Manager ( )

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

WHITEPAPER. Lookout Mobile Endpoint Security for App Risks

MOBILE THREAT PREVENTION

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft

Aerohive and IntelliGO End-to-End Security for devices on your network

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Microsoft Administering System Center Configuration Manager and Intune

Lessons from the Human Immune System Gavin Hill, Director Threat Intelligence

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

Administering System Center Configuration Manager and Intune

BYOD: BRING YOUR OWN DEVICE.

trend micro smart Protection suites


A: Administering System Center Configuration Manager

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE

One Hospital s Cybersecurity Journey

10 FOCUS AREAS FOR BREACH PREVENTION

Datacenter Management and The Private Cloud. Troy Sharpe Core Infrastructure Specialist Microsoft Corp, Education

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

ForeScout Extended Module for Splunk

Office 365: Modern Workplace

Snort: The World s Most Widely Deployed IPS Technology

Launching a Highly-regulated Startup in the Cloud

Secure Access for Microsoft Office 365 & SaaS Applications

Administering System Center 2012 Configuration Manager

Enterprise Security Solutions by Quick Heal. Seqrite.

Administering System Center Configuration Manager

Administering System Center Configuration Manager and Intune

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

CounterACT Afaria MDM Plugin

Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement


Transcription:

Technical Evaluation Best Practices Guide How to test enterprise mobile security deployment, device monitoring, threat detection, and support TABLE OF CONTENTS STEP 1 Testing app deployment STEP 2 Testing device security monitoring STEP 3 Testing threat detection capabilities STEP 4 Testing enterprise support Why a test plan is critical Before selecting an enterprise mobile security provider, it is essential to conduct a thorough evaluation of the technology and its usability to answer four important questions: 1. How will we deploy the endpoint security app to our global employees? 2. How will we monitor the security status of those devices? 3. Will the solution we re testing detect all the different mobile threats our business is facing? 4. Will this vendor s support meet our needs, whether through a knowledge portal, email, or phone? The answers to these questions will ensure that the enterprise mobile security solution you ultimately select will do what it was designed to do: detect, analyze, and respond to mobile threats.

STEP 1: Testing app deployment How quickly and easily can enterprise mobile security apps be installed throughout my organization? The first step to evaluating an enterprise mobile security solution is deploying to a test segment of your end-users. This segment can be as small as just your IT team. The most important criteria for defining the segment of users to test is that you want to include both managed and unmanaged devices. If you haven t already created an inventory of your mobile devices, use this simple Mobile Inventory Spreadsheet to document your devices and environment. TABLE 1: DEPLOYING MOBILE SECURITY ENDPOINT APPS ADMINISTRATIVE SETUP Get access to the admin. console for the IT and security team members that will be doing the technical evaluation This is an easy first step that works best with guidance from a vendor account or support representative MDM INTEGRATION CLIENT PROVISIONING EMPLOYEE ENROLLMENT Use existing MDM software to distribute the endpoint app to users of managed devices Configuring apps, emails, or other distribution channels for enrolling end-users Manually or automatically enrolling users primary and secondary devices This requires setup of the Microsoft Intune, VMware AirWatch, MobileIron connector, followed by configuration of tags/labels, application provisioning groups, and ios configuration profiles For unmanaged devices (often found in BYOD environments), it s common to distribute the endpoint mobile security app via email Managed devices will have automatic enrollment, and unmanaged devices will likely require the end-user to open the app and enter an enrollment code

STEP 2: Testing security monitoring How customizable and easy to manage are the security incident functions? The second step is to actually experience monitoring the security of mobile devices that have access to your corporate data. This is when you ll input custom policies for your organization based on the level of risk from different types of malware, sideloaded apps, and man-in-the-middle attacks. This is also when you ll set up risk syncing with your MDM, if applicable. This stage also should include the first use of EICAR samples provided by the vendor to show how the solution detects and responds to potential threats. TABLE 2: THE SECURITY MONITORING USER EXPERIENCE POLICY DEVELOPMENT MDM INTEGRATION Set the risk level for the full range of covered threats. Configure MDM to automatically enforce policies and label at-risk devices. Input the level of risk for your organization for different classifications of malware, and when you would like to receive notifications by email. Each MDM will have a slightly different configuration process. ALERT CONFIGURATION USER EXPERIENCE Install a malware sample and view the threat detection alert that end-users will receive. Deep dive into a detection to understand what was discovered, why it was flagged as a risk to the organization, and track its history. Install the EICAR test virus from Google Play or via sideloading on ios to see the solution detect the threat and alert administrators. Continue to explore the device list to view your entire mobile fleet to see which devices have encountered mobile threats.

STEP 3: Testing threat protection How effectively does the mobile security platform detect critical threats? The third step of testing an enterprise mobile security solution is to evaluate its ability to identify malware, vulnerability exploits, man-in-themiddle attacks, device compromise, and sideloaded apps. In addition, comprehensive testing should include detection abilities on both Android and ios and the solution s ability to remediate threats through the MDM integration, if present. This stage also includes use of EICAR and other samples provided by the vendor to show how the solution detects and responds to potential threats. TABLE 3: THE SECURITY MONITORING USER EXPERIENCE CONFIGURE REMEDIATION ACTIONS THREAT DETECTION - MALWARE Configure remediation actions for each threat level in the console of your MDM solution, if applicable. Test the mobile security solution s ability to detect malware, riskware, and file-based threats. As an administrator of a mobile security solution that integrates with an MDM, you re able to configure that MDM s corporate policy rules to take effect for devices with different risk-level tags. Confirm that each type of malware is detected and that the remediation actions you configured in the previous step are applied. THREAT DETECTION VULNERABILITIES Test the mobile security solution s ability to detect vulnerability exploits. Confirm that the mobile security solution detects the vulnerability exploit test file and reports the threat in the console. THREAT DETECTION DEVICE COMPROMISE THREAT DETECTION SIDELOAD DETECTION THREAT DETECTION NETWORK ATTACK DETECTION Test the mobile security solution s ability to detect rooted or jailbroken devices. Test the mobile security solution s ability to detect sideloaded applications from both trusted and untrusted developers. Test the mobile security solution s ability to detect a man-in-themiddle attack. Use a rooted Android device and/or a jailbroken ios device to confirm that the mobile security solution detects these device states. Confirm that the solution takes the configured remediation action, or in the case of an app that has been sideloaded from a trusted location, that the solution detects the app, but no action is taken. The solution you are testing should not generate man-in-the-middle alerts when connected to your corporate, home, or the Wi-Fi network at a nearby cafe or hotel that uses a captive portal. If any of those connections trigger an alert, chances are it is a false positive. To test the detection of man-in-the-middle, configure an HTTPS proxy on your mobile device to mimic an attack and ensure the solution detects it.

STEP 4: Testing enterprise support How available and useful is this vendor s support? SELF-SERVICE PHONE & EMAIL SUPPORT MALWARE ADVISORY SUPPORT Does the vendor s knowledge base enable you to answer key questions about the solution s functionality without assistance? How responsive and effective is this vendor? Are they meeting or exceeding the SLA? Do their support hours match your needs? Is this vendor able to deliver more information on the impact of a mobile malware detection in your environment? About Lookout Lookout is a cybersecurity company that makes it possible for individuals and enterprises to be both mobile and secure. With 100 million mobile sensors fueling a dataset of virtually all the mobile code in the world, the Lookout Security Cloud can identify connections that would otherwise go unseen - predicting and stopping mobile attacks before they do harm. The world s leading mobile network operators, including AT&T, Deutsche Telekom, EE, KDDI, Orange, Sprint, T-Mobile and Telstra, have selected Lookout as its preferred mobile security solution. Lookout is also partnered with such enterprise leaders as Microsoft AirWatch, Ingram Micro and MobileIron. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C.