joe leonard introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 it management 7 crm...

57
BYOD Transformation April 3, 2013 Joe Leonard Director, Secure Networks

Upload: others

Post on 25-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

BYOD Transformation

April 3, 2013

Joe Leonard

Director, Secure Networks

Page 2: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Agenda

Joe Leonard Introduction

CIO Top 10 Tech Priorities

What is BYOD?

BYOD Trends

BYOD Threats

Security Best Practices

HIPAA Security Rule

BYOD Business Challenges

BYOD Architecture

Q&A

Page 3: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

3

Joe Leonard Introduction

Page 4: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

CIO

TOP 10 TECH

PRIORITIES

Page 5: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Wireless and BYOD

Cloud Computing & Data Center

Virtualization

Unified Communications, Web

Based Collaboration & Video

Core Network Infrastructures, Virtual

Infrastructure, ITaaS Models

Managed Services, Network

Management, Cloud Orchestration

Data Center Virtualization

Security

Analytics & Business Intelligence 1

Mobile Technologies 2

Cloud Computing (SaaS, IaaS, PaaS)

Collaboration technologies

(workflow) 4

Legacy Modernization 5

IT Management 6

CRM 7

Virtualization

Security

3

8

9

1. Analytics and Business Intelligence

2. Mobile Technologies

3. Cloud Computing (Iaas, PaaS, SaaS)

4. Collaboration Technologies (workflow)

5. Legacy Modernization

6. IT Management

7. CRM

8. Virtualization

9. ERP Applications

10.Security

*According to Gartner research combined reports 2012

CIO Top 10 Technology Priorities

Page 6: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

WHAT

IS

BYOD?

Page 7: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

WHAT DOES BYOD

MEAN TO YOU?

Page 8: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

BYOD

TRENDS

Page 9: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

MORE THAN 3 CONNECTED

2014 DEVICES PER PERSON

Page 10: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

How Fast is Mobile Internet Growing?

Page 11: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

THE INTERNET OF THINGS

is evolving to

THE INTERNET OF EVERYTHING

Connected World is Changing Business

Page 12: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

1 EXABYTE EQUALS

36,000 YEARS OF

HD-TV VIDEO

OR 1 BILLION GB

TOTAL GLOBAL

IP TRAFFIC

.9 EB in 2012

1.6 EB in 2013

11.2 EB in 2017

Page 13: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Global Mobile Data Forecast by Region

Page 14: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Mobile Devices Traffic Growth

Page 15: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Mobile Video Traffic

Page 16: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

BYOD

THREATS

Page 17: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Bring Your Own Device (BYOD)

• 75 percent of companies allow

employee-owned smartphones and/or

tablets to be used at work – Aberdeen

Study. Gartner predicts that this number

will rise to 90 percent by 2014.

• Less that 10% of respondents felt

completely aware of all mobile devices

accessing their enterprise infrastructure

– SANS BYOD Survey 2012

• The BYOD movement has significant

productivity, convenience and cost

benefits, but it is leading to serious

challenges for IT security and privacy.

17

Page 18: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

2012 Mobile Landscape

Source: F-Secure Mobile Threat Report Q4 2012

Page 19: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

2012 Mobile Threat Families

Source: F-Secure Mobile Threat Report Q4 2012

Page 20: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Threat Families 2010-2012

Source: F-Secure Mobile Threat Report Q4 2012

Page 21: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Malware Threats

Source: Kaspersky

21

Page 22: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Mobile Threats by Type

Source: F-Secure Mobile Threat Report Q4 2012

Page 23: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Malware Threat Report

Source: FireEye Threat Report – 2H 2011

Page 24: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Malware Attacks

• Malware

– Android

• DroidDream malware

• 50 apps pulled

– Rogue apps

– Upgrade attack

Page 25: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Top 5 Mobile Threats

1. Lost or stolen device

2. Mobile malware – data leakage

3. Wi-Fi hotspots

4. Vulnerabilities – phone OS and

applications

5. Proximity–based hacking

25

Cell-phone insurance provider Asurion reports that 60 million

smartphones are lost, stolen or damaged each year. In dollar terms,

according to a report conducted by mobile security firm Lookout,

Americans lost $30 billion dollars worth of smartphones in 2011.

Symantec conducted an experiment earlier this year, where they

"lost" 50 phones on purpose (msnbc.com):

• 43 percent of finders clicked on an app labeled "online banking."

• 53 percent clicked on a filed named "HR salaries."

• 57 percent opened a file named "saved passwords“.

• 60 percent checked Social networking tools and personal e-mail.

• 72 percent tempted a folder labeled "private photos“.

• 89 percent clicked on something they probably shouldn’t have.

• 50 percent of the phones were returned.

Page 26: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

SECURITY

BEST

PRACTICES

Page 27: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

SANS Consensus Audit Guidelines (CAG)

http://www.sans.org/critical-security-controls/

# Guidelines

1 Inventory of authorized and

unauthorized devices

2 Inventory of authorized and

unauthorized software

3 Secure configurations for hardware

software (Laptop and Server)

4 Continuous vulnerability assessment

and remediation

5 Malware defenses

6 Application software security

7 Wireless device control

8 Data recovery capability (validated

manually)

9 Security skills assessment and

training to fill gaps

10 Secure configurations for network

devices (Firewall, Router and Switch)

# Guidelines

11 Limitation and control of network

ports and services

12 Controlled use of administration

privileges

13 Boundary defense

14 Maintenance, monitoring and

analysis of audit logs

15 Controlled access based or need to

know

16 Access monitoring and control

17 Data Loss Prevention (DLP)

18 Incident response capability

19 Secure networking engineering

20 Penetration tests and red team

exercises

Page 28: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

HIPAA

SECURITY

RULE

Page 29: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

History of HIPAA

Page 30: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

HIPAA Security Rule – What do we check?

• Administration Safeguards

• Physical Safeguards

• Technical Safeguards

• Organizational Safeguards

• Documentation Requirements

30

Page 31: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Administration Safeguards

§164.308 (a) (1) Standard: Security management

§164.308 (a) (2) Standard: Assigned security responsibility

§164.308 (a) (3) Standard: Workforce security

§164.308 (a) (4) Standard: Information access management

§164.308 (a) (5) Standard: Security awareness and training

§164.308 (a) (6) Standard: Security incident procedures

§164.308 (a) (7) Standard: Contingency plan

§164.308 (a) (8) Standard: Evaluation

§164.308 (b) (9) Standard: Business associate contracts and

other arrangements

Page 32: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Physical Safeguards

§ 164.310 (a) (1) Standard: Facility access controls

§ 164.310 (b) Standard: Workstation use

§ 164.310 (c) Standard: Workstation security

§ 164.310 (d) Standard: Device and media controls

Page 33: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Technical Safeguards

§ 164.312 (a) Standard: Access control

§ 164.312 (b) Standard: Audit controls

§ 164.312 (c) (1) Standard: Integrity

§ 164.312 (d) Standard: Person or entity authentication

§ 164.312 (e) Standard: Transmission security

Page 34: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Organizational Safeguards

§ 164.314 (a) (1) Standard: Business associate contracts

or other arrangements

§ 164.314 (b) (1) Standard: Requirements for Group Health

Plans

Page 35: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Documentation Requirements

§ 164.316 (a) Standard: Policies and Procedures

§ 164.316 (b) (1) Standard: Documentation

Page 36: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

NIST 800-53 – Management Controls

Identifier Checks Family

CA 7 Security Assessment and Authorization

PL 6 Planning

RA 5 Risk Assessment

SA 14 System and Services Acquisition

PM 11 Program Management

Page 37: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

NIST 800-53 – Operational Controls

Identifier Checks Family

AT 5 Awareness and Training

CM 9 Configuration Management

CP 10 Contingency Planning

IR 8 Incident Response

MA 6 Maintenance

MP 6 Media Protection

PE 19 Physical and Environmental Protection

PS 8 Personnel Security

SI 13 System and Information Integrity

Page 38: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

NIST 800-53 – Technical Controls

Identifier Checks Family

AC 22 Access Controls

AU 14 Audit and Accountability

IA 8 Identification and Authentication

SC 34 System and Communication Protection

Page 39: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

HIPAA Security Rule + NIST 800-53 Example

Security Controls Mapping

AC-1 Access Control Policy and

Procedures

AC-3 Access Enforcement

AC-5 Separation of Duties

AC-6 Least Privilege

Page 40: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

HHS Office of Civil Rights (OCR) Audits

• Massachusetts Eye and Ear $1.5M

– Laptop with patient data stolen

• Alaska Department of Health $1.7M

– One USB drive

Page 41: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

BYOD

BUSINESS

CHALLENGES

Page 42: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

APPLYING

BYOD

PRACTICAL

THINKING

NOT JUST

TECHNOLOGY

Transformation

Page 43: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

VIRTUALIZATION NEXT GENERATIKON

WORKFORCE DEVICE

PROLIFERATION

DEVICE PROLIFERATION

15 Billion Devices

by 2015 that Will Be

Connecting to Your Network

On Average Every Person Has

3–4 Devices On Them that Connect to the Network

75% of Staff Are Bringing

Their Own Devices to Work

BYOD Transformation

Page 44: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

VIRTUALIZATION NEXT GENERATIKON

WORKFORCE DEVICE

PROLIFERATION

NEXT GENERATION WORKFORCE

Work Is No Longer a

Place You Go to Work

People Are Willing to Take a

Pay Cut as Long as They

Are Able to Work from Home

70% percent of end users

admit to breaking IT policy

to make their lives easier

Need Anywhere, Anytime, Any Device Access

BYOD Transformation

Page 45: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

VIRTUALIZATION NEXT GENERATIKON

WORKFORCE DEVICE

PROLIFERATION

VIRTUALIZATION

“60% of server workloads will

be virtualized by 2013”

“20% of professional PCs will be

managed under a hosted virtual

desktop model by 2013.”

Datacenters are evolving, Applications

are now objects moving through the

network

BYOD Transformation

Page 46: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Top of Mind Concerns

The Burden Falls on IT

DEVICE PROLIFERATION

• How do I ensure consistent experience on all devices?

• How do I implement multiple security policies per user and device?

• How and What do I support?

• How do I manage the risk of employees bringing their own devices?

Page 47: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Top of Mind Concerns

The Burden Falls on IT

• Am I hindering my workforce from being competitive?

• How do I retain top talent?

• How do I ensure compliance with HIPAA and PCI?

• Can I handle partners, consultants, guest appropriately?

CHANGING WORKFORCE

Page 48: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Market Transition

Video Mobility Workplace Experience

7 Billion New

Wireless Devices

by 2015

Mobile Devices

IT Resources

Blurring the Borders Consumer ↔ Workforce

Employee ↔ Partner

Physical ↔ Virtual

Changing the

Way We Work Video projected to

quadruple IP traffic by

2014 to 767 exabytes

Anyone, Anywhere, Anytime

Page 49: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

BYOD

ARCHITECTURE

Page 50: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Hospital extends

wireless access to

employees for

corporate devices

(laptop, iPad,

smartphone)

• Visibility to who/what

is on network

• Restrict access to

only corporate

issued devices

Environment Requires

Tight Controls

Business Policy

Device Types

BYOD Policy Considerations

LIMIT BASIC ENHANCED ADVANCED

Hospital

(Example)

IT Requirements

Corp Only Device

Page 51: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Hospital extends

wireless access to

employees for

corporate devices

(laptop, iPad,

smartphone)

• Visibility to who/what

is on network

• Restrict access to

only corporate

issued devices

Environment Requires

Tight Controls

Focus on Basic Services,

Easy Access

Business Policy

Device Types

BYOD Policy Considerations

LIMIT BASIC ENHANCED ADVANCED

Hospital

(Example)

IT Requirements

Corp Only Device Broader Device Types but

Internet Only

Simple Guest

Hospital provides

guest access to

patients

• Restrict personal

devices to public

internet

• Restricted access

to internal sites

Page 52: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Hospital extends

wireless access to

employees for

corporate devices

(laptop, iPad,

smartphone)

• Visibility to who/what

is on network

• Restrict access to

only corporate

issued devices

Environment Requires

Tight Controls

Focus on Basic Services,

Easy Access

Secure Access to Business

Applications Onsite/Offsite

Business Policy

Device Types

BYOD Policy Considerations

LIMIT BASIC ENHANCED ADVANCED

Hospital

(Example)

IT Requirements

Corp Only Device Broader Device Types but

Internet Only

Simple Guest

Multiple Device Types +

Access Methods

Early BYOD Commercial Adopters

Hospital provides

guest access to

patients

• Restrict personal

devices to public

internet

• Restricted access

to internal sites

Doctor uses personal

device in hospital and

offsite on the train

with access to some

hospital applications

• Allow granular onsite

and offsite access to

network/applications

for personal and

company devices

Page 53: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Hospital extends

wireless access to

employees for

corporate devices

(laptop, iPad,

smartphone)

• Visibility to who/what

is on network

• Restrict access to

only corporate

issued devices

Environment Requires

Tight Controls

Focus on Basic Services,

Easy Access

Secure Access to Business

Applications Onsite/Offsite

All Key

Applications, New Services,

Full Control

Business Policy

Device Types

BYOD Policy Considerations

LIMIT BASIC ENHANCED ADVANCED

Hospital

(Example)

IT Requirements

Corp Only Device Broader Device Types but

Internet Only

Simple Guest

Multiple Device Types +

Access Methods

Early BYOD Commercial Adopters

Any Device, Any Ownership

Innovative Organizations

Hospital provides

guest access to

patients

• Restrict personal

devices to public

internet

• Restricted access

to internal sites

Doctor uses personal

device in hospital and

offsite on the train

with access to some

hospital applications

• Allow granular onsite

and offsite access to

network/applications

for personal and

company devices

Hospital administrator

is granted full

network access to

applications with new

collaboration services

• Enable a full

mobile and

collaboration

experience

Page 54: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Presidio BYOD Architecture

Mobile User

Mobile Device

Management

• Device Management

• Selective and Full Wipe

• Security Enforcement

• Access Control

• Certificate Management

• Application Management

and Distribution

• Content Management

Content Security

• Malware Defense

• Data Security

• Acceptable Use

Controls

IPS

Malware

(Control)

Switch

Firewall

(Control)

Redirect

Wireless

SSL VPN

Internet

IPS-Malware

• Malware/Spyware

• Malicious Software

• DDoS Attacks

• Reconnaissance

Attacks

Policy

• 802.1x Authentication

• Authorization

• Profiling Device Type

• Posture Assessment

• Remediation

• Guest Services

• High Availability Design

• Mobile Onboarding

• Comprehensive

Reporting

SIEM

• Logging

• Correlation

• Reporting

Mobile Device Management – MDM (Control)

Content

Security

(Control) 2

1

3 5

6

4

Security Information Event Management - SIEM (Control)

Firewall

• Access Control

• Remote Access VPN

• Dynamic Access

Policies

54

VPN

(Control)

Policy

Wireless

(Control)

Page 55: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Summary

• BYOD is transforming how we work.

• BYOD is a layered architecture

• BYOD Transformation requires a clearly defined policy.

• Bandwidth requirements are increasing.

http://www.presidio.com/technologies-trends/trends/byod

Page 56: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Q&A

Page 57: Joe Leonard Introductionmd.himsschapter.org/sites/himsschapter/files/... · 6 IT Management 7 CRM Virtualization8 Security 3 9 1. Analytics and Business Intelligence 2. Mobile Technologies

Practical thinking for a connected world.

THANK YOU.