A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Similar documents
BlackBerry WorkLife Persona. The Challenge. The Solution. Datasheet

BlackBerry 2FA. Datasheet. BlackBerry 2FA

BlackBerry Enterprise Identity

How a Global Insurance Provider in Japan uses BlackBerry UEM to Secure, Protect and Connect its Mobile Workforce

BlackBerry UEM + Samsung Knox

Why This Major Energy Company Surged Back to BlackBerry After Trying AirWatch

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

SECURE, CENTRALIZED, SIMPLE

Enterprise Mobility Management

Securing Today s Mobile Workforce

XenApp, XenDesktop and XenMobile Integration

Securing Enterprise or User Brought mobile devices

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

Mobility, Security Concerns, and Avoidance

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

KODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform

BlackBerry UEM is a Wise Investment for ABANCA

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars

Exclusive Selling Mobility with Security

The Challenge. The Solution. The Modern Approach to Remote Access

2013 InterWorks, Page 1

Best Practices to Make BYOD, CYOD and COPE Simple and Secure

Google Identity Services for work

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Design and deliver cloud-based apps and data for flexible, on-demand IT

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

McAfee MVISION Mobile epo Extension Product Guide

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Secure Access for Microsoft Office 365 & SaaS Applications

MaaS360 Secure Productivity Suite

Mobile Security using IBM Endpoint Manager Mobile Device Management

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

WHITEPAPER. Security overview. podio.com

Mobile Devices prioritize User Experience

RHM Presentation. Maas 360 Mobile device management

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

IBM Future of Work Forum

Quick Heal Mobile Device Management. Available on

Security Enhancements

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

BYOD: BRING YOUR OWN DEVICE.

Endpoint Security for DeltaV Systems

CA Security Management

White Paper. Enabling Mobile Users and Staying Compliant. How Healthcare Organizations Manage Both

AT&T Endpoint Security

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

HPE Intelligent Management Center

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Best Practices in Securing a Multicloud World

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

HIPAA Assessment. Prepared For: ABC Medical Center Prepared By: Compliance Department

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Changing face of endpoint security

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

A Guide to Closing All Potential VDI Security Gaps

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Securing Health Data in a BYOD World

Five Tips to Mastering Enterprise Mobility

Make security part of your client systems refresh

Information Security BYOD Procedure

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

The Problem with Privileged Users

Carbon Black PCI Compliance Mapping Checklist

The Device Has Left the Building

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

The security challenge in a mobile world

SEPARATING WORK AND PERSONAL

Go mobile. Stay in control.

Mobile App Security and Malware in Mobile Platform

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Enterprise Mobility Management Buyers Guide

Securing Your Most Sensitive Data

WHITEPAPER. How to secure your Post-perimeter world

Enterprise Security Solutions by Quick Heal. Seqrite.

Enterprise Mobile Management (EMM) Policies

BYOD 2.0: Moving Beyond MDM

BUFFERZONE Advanced Endpoint Security

Evolved Backup and Recovery for the Enterprise

PCI DSS Compliance. White Paper Parallels Remote Application Server

BUFFERZONE Advanced Endpoint Security

GUIDE. MetaDefender Kiosk Deployment Guide

Purchase Intentions Spring 2013 EMEA

Clearing the Path to PCI DSS Version 2.0 Compliance

Technical Evaluation Best Practices Guide

NEN The Education Network

Enterprise Mobility. BEYOND MDM: A MULTIDIMENSIONAL MOBILITY STRATEGY Why device-centric strategies no longer meet today s mobility needs

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

CS 356 Operating System Security. Fall 2013

10 Hidden IT Risks That Might Threaten Your Business

PCI Compliance Updates

IT & DATA SECURITY BREACH PREVENTION

Transcription:

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today White Paper

As enterprises mobilize business processes, more and more sensitive data passes through and resides on mobile devices. And while almost every CIO knows how important mobile security is, getting a grip on it can be tough. There s a lot to consider, and new factors enter the equation all the time. On the pages that follow, you ll find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers. If you answer no to many of these questions, you may have some significant gaps in your approach to mobile security. The good news is that you re not alone and there are endpoint security and management solutions designed to address each of these challenges. The Top 10 Enterprise Mobility Security Threats Today 1. Inadequate control over lost/stolen devices 2. Poor security for IP leaving your network 3. Users who don t follow mobile policies 4. Rogue apps and malware 5. Poor separation of work and personal content and apps 6. Limited protection for data at rest and in transit 7. Weak authentication 8. Difficulty monitoring & managing the entire mobile fleet 9. Challenges with compliance and flexibility (meeting the needs of all users) 10. Inconsistent security due to OS fragmentation 1 Do you stay in control when devices go missing? Are your procedures for lost/stolen devices clearly defined, well understood by your entire staff and adhered to? Is IT able to perform a remote wipe (and confirm that data is permanently deleted)? Do you impose password protection on every device, regardless of who owns it? (Bring Your Own Device; Corporate Owned, Personally Enabled; etc.)? Do you insist that devices automatically lock after a defined period of inactivity? Are the devices in your network (again, regardless of the ownership model) discoverable via location-based tracking? Do you have backup and restore capabilities that allow you to provision a new device quickly and easily? Can mobile workers and safely initiate some remote security tasks themselves through a user self-service tool (e.g. locking a misplaced device remotely)? 1

2 Are you taking measures to protect your documents, as well as your devices? Does your IT department have a means of controlling files when they leave the firewall? Do you have protections in place against screen captures and unauthorized printing/downloads? Does your enterprise use an enterprise file sync and share (EFSS) solution? Do you protect your outgoing email attachments? Can you enable content/file sharing securely? 3 Do your users understand and follow your policies? Are your employees aware of how social engineering works, and how to protect themselves against it? Do employees understand the risk of using unsecured, third-party applications in the workplace? Do you provide training and documentation for new employees that explains how they should approach mobile computing? Is that training reinforced regularly and in different ways? Do employees truly understand what s expected and why it matters? Do you account for different learning styles (some users will respond better to video; others to a checklist, etc.)? Do you ask users to sign your policy document and are they aware of the penalties for not complying? 4 How do you keep rogue apps and malware at bay? Do all devices accessing your network have appropriate anti-virus/anti-malware capabilities installed or built-in? Do you keep an up-to-date whitelist of third-party apps? Can you run a quick check at any time to make sure that all the apps in use are authorized? Are BYOD users required to keep devices current with OS upgrades, software and app updates, and (if not built-in) anti-virus protection? Do you have a corporate app storefront? Do you have a means of enabling developers to quickly deploy secure corporate apps? Do you have a mechanism in place to manage apps throughout their lifecycle (deployment, updates, retirement)? Are you able to automatically detect when jailbroken or rooted devices try to access your network and can you automatically program next steps? Can employees find out which apps are approved, recommended or mandatory for their role? Are users prompted to enter their device password before installing apps? Are your anti-virus measures for non-mobile devices up to date and adequate? (Malware exposure can occur when users connect a mobile device to an infected desktop computer via USB, but most desktop anti-virus software will help prevent this type of attack.) Do you protect your corporate applications from malicious software through containerization/ sandboxing? Are interactions between your applications secured/encrypted? 2

5 How do you keep work and personal content/data separate? Can you enable and control a separate work space or container on the devices you manage, across multiple operating systems? If you use tools like location-tracking applications, are they disabled outside the work profile? Do you have a mechanism to prevent data leakage across multiple devices (e.g. making it difficult for users to send corporate data through unsecure channels like social media)? 6 Can you ensure data is secure, at rest and in transit? Can you enforce encryption for data that s resting on devices and for data in transit to the standard your policies demand? Are users prevented from disabling encryption manually? Can app data move securely along its path without a third-party VPN? Do you have confidence that your systems can protect your customers data regardless of how closely employees follow your policies? Are you protecting your network against external threats, like unsecure business partners? 7 How do you control authentication? Do you authenticate devices and users beyond single-factor identification? Do your systems produce an alarm when an unauthorized device accesses the network? Can you control what happens next? Have you tested your authentication processes for vulnerabilities? Have you enabled single sign-on for SaaS/cloud applications? Are you able to seamlessly manage users with multiple registered devices? 8 Can you monitor your mobile ecosystem in real-time? Are you able to get a quick snapshot of your complete mobility landscape, through a unified dashboard? Can you easily create and export reports for auditing/compliance/logging? Can you configure your systems to create alerts and take automatic actions when security breaches are detected? Do you have full visibility into how and where devices in your fleet are being used at any given time? 9 Can you apply appropriate security policies to the various user profiles in your organization? Are you able to provide the highest security for those users who require it? Do your users have to sacrifice convenience for the sake of security? Are you able to meet all the compliance requirements of your industry? 3

10 Are you able to deal with device fragmentation? Do you know which specific devices are being used within your organization? Are users provided with a wide range of choices in terms of mobility? What tools do you use to help ensure that BYOD users are upgrading their operating systems as soon as patches and updates are available? For users with multiple mobile devices, are you using Identity and Access Management tools for more efficient authentication? Are your security solutions device-agnostic, and consistent across your mobile fleet? How to protect your organization The BlackBerry platform is purpose-built for security, to deliver the best protection for work content, at rest and in transit, across the operating systems that matter, including ios, Android, Windows Phone and BlackBerry. And now, with the Good Secure EMM Suites, we re better-equipped than ever to provide you with a comprehensive EMM platform that s suited for every corporate use case. Designed for flexibility, the Secure EMM Suites seamlessly integrate document control, MDM, MAM, and MCM into a single, unified platform, complete with productivity tools and a rich development framework. To learn more, visit BlackBerry.com/suites. About BlackBerry BlackBerry is securing a connected world, delivering innovative solutions across the entire mobile ecosystem and beyond. We secure the world s most sensitive data across all end points from cars to smartphones making the mobile-first enterprise vision a reality. Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates offices in North America, Europe, Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker symbols BB on the Toronto Stock Exchange and BBRY on the NASDAQ. For more information, visit www.blackberry.com. 2016 BlackBerry Limited. All rights reserved. Trademarks, including but not limited to BLACKBERRY, EMBLEM Design, BBM and BES are the trademarks or registered trademarks of BlackBerry Limited and the exclusive rights to such trademarks are expressly reserved. All other trademarks are the property of their respective owners. Content: 08/16 Rev. 30AUG2016 4