oid eakage om mobile - informationweek · 2013-02-15 · one of the biggest challenges facing it...

12
White paper Use the Cloud How to Avoid Data Leakage from Mobile Enterprise Apps:

Upload: others

Post on 12-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: oid eakage om Mobile - InformationWeek · 2013-02-15 · One of the biggest challenges facing IT today is the inherent insecurity of mobile devices now being used by the enterprise,

White paper

Use the Cloud

How to Avoid Data Leakage from Mobile Enterprise Apps:

Page 2: oid eakage om Mobile - InformationWeek · 2013-02-15 · One of the biggest challenges facing IT today is the inherent insecurity of mobile devices now being used by the enterprise,

FraMehaWK White paper

2

OVerVieWOne of the biggest challenges facing IT today is the inherent insecurity of mobile devices now being used by the enterprise, either because of new corporate mobile-enabled applications or because of BYOD. This paper will examine the opportunity for enterprises to use public or private cloud offerings, together with some Framehawk technology, to deliver an architecture that can solve the problem of data leakage from mobile devices.

BaCKGrOUND7KH�GHÀQLWLRQ�RI�PRELOLW\�KDV�FKDQJHG���,W�KDV�EURDGHQHG�WR�LQFOXGH�WRXFK��VPDOOHU�VFUHHQV�GHYLFHV��DQG�increasingly wider network access (location and cellular). And, there are major forces at work driving HQWHUSULVHV�WR�GHDO�ZLWK�WKLV�QHZ�GHÀQLWLRQ�RI�PRELOLW\���

It started with the simple existence and popularity of tablets and smartphones. These new devices and form factors have changed the demands of users. Users want to engage enterprise applications via WKHVH�GHYLFHV�PRUH�RIWHQ�WKDQ�WUDGLWLRQDO�GHVNWRS�DQG�ODSWRS�IRUP�IDFWRUV��WKH�ROG�GHÀQLWLRQ�RI�PRELOH����And these devices are on mobile networks and home networks more often than they are on secure corporate networks.

Compounding things tremendously are two predictable but new trends:

1) Employees (and, frankly, everyone else) use their devices in bite-sized engagements, all day long. Consumer app access (news, social) via these devices has encroached from casual or after-hours access into 24x7 demand

2) BYOD - Bring Your Own Device

In many ways, BYOD is a response to the consumer-style behavior noted above – if a user wants 24x7 access to their news and social networks, then access to enterprise applications becomes a viable UHTXHVW�DV�D�VXEVHW�RI�WKHLU�GHYLFH·V�H[LVWLQJ�FDSDELOLWLHV���7KH�ELJ�GHOWD"��7KHVH�GHYLFHV�DUH�UDUHO\�RQ�corporate networks and they are rarely as controlled or locked down as corporate-issued laptops.

These forces are driving a sea change in the way that enterprises have to think about protecting corporate information. These forces are also changing the requirements for a scalable, secure architecture (and infrastructure) for corporate applications in this new mobile-friendly world where not everything is under corporate control.

the ChaLLeNGeIf corporate data leakage is a primary concern, then standard native application options, such as the L26�QDWLYH�HPDLO�FOLHQW�RU�QDWLYH�WDEOHW�SURGXFWLYLW\�VXLWHV�VXFK�DV�4XLFN2IÀFH��DUH�QRW�WUXO\�YLDEOH�DSSURDFKHV���:K\�QRW"��7KH�RSHUDWLQJ�V\VWHPV�WKHPVHOYHV�DQG�WKH�DSSOLFDWLRQV�WKDW�PD\�EH�GHSOR\HG�on them provide too many ways for data to be exposed.

7KLQN�WKLV�LV�DQ�H[DJJHUDWLRQ"��-XVW�ORRN�DW�´WKH�'URSER[�SUREOHP�µ��2SHQ�DQ�HPDLO�ZLWK�DQ�DWWDFKPHQW�RQ�DQ�L3KRQH���7KHQ�ORRN�DW�WKH�´2SHQ�LQ«µ�RSWLRQV���,I�\RX�KDYH�\RXU�SHUVRQDO�'URSER[�DSS�LQVWDOOHG��then this immediately pops up as one of the options. Data moved there is instantly in the public FORXG�DQG��HIIHFWLYHO\��LQ�WKH�SXEOLF�GRPDLQ�ZLWK�QR�FRUSRUDWH�FRQWUROV�ZKDWVRHYHU���,Q�$QGURLG��LW·V�QRW�uncommon to see 15 options to move data around, as every service can easily be a target location.

Page 3: oid eakage om Mobile - InformationWeek · 2013-02-15 · One of the biggest challenges facing IT today is the inherent insecurity of mobile devices now being used by the enterprise,

FraMehaWK White paper

3

Note that this scenario is true regardless of whether the user got the email to their phone via direct (sanctioned) or indirect (unsanctioned forwarding of email to a personal account) mechanisms.

Compounding this, web applications can also be problematic. Accessing web applications behind the ÀUHZDOO�UHTXLUHV�931�DQG�KDYLQJ�D�931�FOLHQW�RQ�D�PRELOH�GHYLFH�PHDQV�WKDW�DOO�WKH�DSSV�UXQQLQJ�RQ�the device then have access.. This issue is not solved by having corporate-issued devices. A recently published Osterman Research article shows that only 54% of company-owned tablets can be remotely wiped. Furthermore most of these devices cannot run the bevy of intrusion detection, edge-point analysis, and anti-virus software previously required in the world of laptops and home-based desktops

$GGLWLRQDOO\��WKH�DELOLW\�WR�´2SHQ�LQ«µ�DQG�FRS\�SDVWH�LQWR�SHUVRQDO�DSSOLFDWLRQV�FRPHV�DV�VWDQGDUG�ZLWK�WKH�mobile operating systems. So the browser often needs to run in a container (see below for more on this issue), which can introduce performance and more compatibility problems.

In all cases, a device ends up with corporate data cached on it. Email, web browser caches, downloaded ÀOHV�²�UHJDUGOHVV�RI�KRZ�WKH�GDWD�JRW�WKH�GHYLFH��WKH�PHUH�IDFW�WKDW�WKH�GDWD�LV�RQ�WKH�GHYLFH�UHSUHVHQWV�data leakage potential. Being able to wipe the device is only useful if the device shows up on the network again.

the reaLiStiC OptiONSSo if having corporate data on the device is not a desirable outcome, then there are only two realistic options:

1. Solve-the-problem:�'RQ·W�OHW�DQ\�FRUSRUDWH�GDWD�JHW�RQ�WKH�PRELOH�GHYLFH��(YHU�

2. Mitigate-risk-with-controls: Protect any data that is on the end-point device.

Option #1 has never been accepted by the employee population for daily usage. Current approaches to SUHYHQW�GDWD�JHWWLQJ�RQWR�D�PRELOH�GHYLFH�PHDQ�OHYHUDJLQJ�90�KRVWHG�DSSOLFDWLRQV�RU�GHVNWRSV��9',�RU�+9'����7KHUH�DUH�WZR�SUHGRPLQDQW�LVVXHV�

�� Current approaches result in poor user experience (UX). Poor UX results in high attrition, low adoption, and high costs. UX issues include complicated interfaces, poor performance, and non-functioning gestures. As a result, this model is often relegated to disaster recovery or temporary at-home access.

�� 2OG�90�KRVWLQJ�PRGHOV�DUH�FRVWO\���7KH\�ZHUH�GHVLJQHG�IRU�ORQJ�UXQQLQJ�DFFHVV��DQG�EXLOG�IRU�SHDN�models

For option #2, mitigate risk with controls, approaches usually include some or all of the following: �� 0RELOH�'HYLFH�0DQDJHPHQW��0'0�

�� 931�0RELOH�&OLHQW

�� Good for Enterprise (or equivalent)�� 0RELOH�$SSOLFDWLRQ�0DQDJHPHQW��0$0��DQG�0RELOH�,QIRUPDWLRQ�0DQDJHPHQW��0,0�

�� Secure Container

/HW·V�WDNH�D�ORRN�DW�WKHVH�HOHPHQWV�

Page 4: oid eakage om Mobile - InformationWeek · 2013-02-15 · One of the biggest challenges facing IT today is the inherent insecurity of mobile devices now being used by the enterprise,

FraMehaWK White paper

4

0'0 0RVW�RUJDQL]DWLRQV�ZRXOG�DJUHH�WKDW�0'0�LV�D�UHTXLUHPHQW�IRU�FRUSRUDWH�RZQHG�GHYLFHV���+RZHYHU��IRU�%<2'�LW�FDQ�UHSUHVHQW�D�FKDOOHQJH�VLQFH�XVHUV�LQ�JHQHUDO�GRQ·W�want their company to have complete control, including wipe ability, over their personal devices.

0RUH�LPSRUWDQWO\�IRU�WKH�SXUSRVHV�RI�WKLV�GLVFXVVLRQ��0'0�LV�D�PDQDJHPHQW�WHFKQRORJ\��QRW�D�VHFXULW\�WHFKQRORJ\�DQG�LQ�LWVHOI�GRHVQ·W�SUHYHQW�GDWD�OHDNDJH�XQOHVV�GUDFRQLDQ�device and app lockdown measures are put in place.

931�0RELOH�Client

The premise is simple: if you need to get access to corporate apps and data behind the ÀUHZDOO�\RX�QHHG�VHFXUH�YHULÀHG�DFFHVV�IRU�WKH�XVHU�DQG�WKH�GHYLFH�

7KH�FKDOOHQJH�ZLWK�PRELOH�931�FOLHQWV�LQ�WKH�FRQVXPHUL]HG�ZRUOG�LV�WKDW�WKH�GHYLFH�LV�YHULÀHG�DQG�WKH�YDVW�PDMRULW\�RI�931�FOLHQWV�DOORZ�DFFHVV�WR�DQ\WKLQJ�WKDW�LV�UXQQLQJ�on the device. So even with a corporate owned device, there are many, many apps that come from untrusted or questionable sources, so data leakage prevention is by no means guaranteed.

Good for Enterprise

GfE provides a secure email solution that allows enterprises to have a Blackberry-like security model for other mobile platforms.

(QIRUFLQJ�*I(�DV�WKH�FRUSRUDWH�PRELOH�HPDLO�VROXWLRQ�PHDQV�WKDW�DOO�WUDIÀF�JRHV�WKURXJK�WKH�*RRG�12&���7KLV�LQFOXGHV�WKH�WUDIÀF�IRU�WKH�SURSULHWDU\�VHFXUH�EURZVHU�WKDW�LV�WKH�recommended way to access corporate web applications.

0$0�DQG�0,0

0$0�UHIHUV�WR�WKH�DELOLW\�WR�GLVWULEXWH��PDQDJH��DQG�FRQWURO�DFFHVV�WR�FRUSRUDWH�PRELOH�applications, typically in conjunction with an enterprise app store.

0,0�UHIHUV�WR�WKH�SUDFWLFH�RI�VHFXULQJ�WKHVH�DSSOLFDWLRQV�DQG�WKH�GDWD�WKDW�WKH\�DFFHVV�either by using an SDK and building the security into the application itself, or by FRQWDLQHUL]LQJ�WKH�DSS�LWVHOI�XVLQJ�´DSS�ZUDSSLQJµ�WHFKQLTXHV���0,0�FDQ�UHTXLUH�IXOO�LGHQWLW\�SROLF\�HQJLQHV�WR�KDQGOH�GDWD�FODVVLÀFDWLRQ�WR�WKH�ULJKW�GHJUHH�

0$0�DQG�0,0�YHUVLRQV�RI�DSSOLFDWLRQV�QHHG�WR�EH�PDGH�DYDLODEOH�IRU�HDFK�WDUJHW�platform (iOS, Android, Windows 8, etc.)

Secure Container

A secure container on the device enables applications to be deployed in the container and then run in a secure environment.There are a few challenges typically associated with secure containers, including:

�� Deployment and management of a secure container may not be possible in many BYOD scenarios

�� 1DWLYH�DSSV�QHHG�WR�EH�GHYHORSHG�ZLWK�D�VSHFLÀF�6'.

�� Compatibility and usability of the secure browsers used (device browsers are limited compared to their counterparts. No plugins. Webkit differences. Etc)

�� 3HUIRUPDQFH�UHODWHG�WR�SURFWRUHG�WUDIÀF

�� There is no support for legacy applications

Page 5: oid eakage om Mobile - InformationWeek · 2013-02-15 · One of the biggest challenges facing IT today is the inherent insecurity of mobile devices now being used by the enterprise,

FraMehaWK White paper

5

Summary: any time you enable your corporate application software to be accessed from an inherently insecure device that is easily lost, the costs of developing secure applications and managing the risk of lost devices is very high.

6R�RSWLRQ�����´6ROYHµ��LV�XVHG�SULPDULO\�DV�HPHUJHQF\�DFFHVV�DQG�RSWLRQ�����´0LWLJDWHµ��LV�FRPSOH[�DQG�H[SHQVLYH���)DFHG�ZLWK�RQO\�WKHVH�WZR�XQDSSHDOLQJ�RSWLRQV��ZKDW�LV�DQ�,7�H[HFXWLYH�VXSSRVHG�WR�GR"

hOW the CLOUD CaN heLp With eNterpriSe MOBiLitY/HW·V�VWDUW�E\�VWDWLQJ�D�EDVLF�ODZ�RI�HQWHUSULVH�,7�

Distributing client applications to insecure devices outside the corporate campus creates compounded costs in multiple forms:�� Risk and mitigating control processes and technology�� Distribution management systems�� Application fracturing across devices – multiple versions or reduced feature set�� Redesign and regression testing to handle tuning over non-managed networks.

Said another way: “implementing mobility costs a lot.”

Adding a new end point outside campus control regardless of whether the asset is owned by IT or by the employee creates a mess that is costly to manage:

Dealing with these complications is where the idea of leveraging cloud computing has appeal.

����!�����������

�����������

�������������� �����!��������������������"���������� ����������� ��

��

���

��������� ���������������

�� �(��������$���

��������� �

���� � ������ ��������������������� ��� ����� ���

��� ���#!������#�� %(�������!������������)����� ������������������

��������

��!$������ ��+������ ���������'��������'����,�

Page 6: oid eakage om Mobile - InformationWeek · 2013-02-15 · One of the biggest challenges facing IT today is the inherent insecurity of mobile devices now being used by the enterprise,

FraMehaWK White paper

6

As an alternative, consider (for a starting point) that all of the client applications could run from a highly performant B2B cloud – a single place where control and distribution are easy. This would mean no asset management challenges and enable the use of familiar server technology. There would be PLQLPDO��LI�DQ\��DSSOLFDWLRQ�UHGHVLJQ�VLQFH�WKH�PDMRULW\�RI�FOLHQW�DSSOLFDWLRQV�FDQ�UXQ�LQ�D�90�KRVWHG�environment.

Of course, for cloud computing to be a viable solution for mobile application access as described here, there are a number of other issues that need to be managed and pre-requisites that need to be in place. Consider the following logic:

IF (trusted communication exists between cloud and data center) AND (cloud is secure) AND (secure communications exist between cloud and mobile device) THEN (cloud is suitable for deploying corporate mobile apps)

/HW·V�H[DPLQH�HDFK�RI�WKHVH�QHFHVVDU\�SUH�UHTXLVLWHV�

1. CLOUD-TO-DATA CENTER COMMUNICATIONS

�� Securing a cloud environment communication structure is straightforward. Leveraging standard partner access techniques, B2B designs, or co-location facility access are skills that IT network professionals have done for many years.

�� 931�WXQQHOV��66/�*DWHZD\V��RU�leased lines are all viable and trusted models.

����( ������#���

.'���"�������"���� ���

-'���"������"��

)������$���*�

,'��������������"����������

�������" �����"���%(������� ������������+���������������� �������������������������

��

���

��

�������������������#�����

�����������

�����������

��������������

� ������

� ������

���� �����������

�!������������� ����� ��������������� ��������������� �����

�����������

Page 7: oid eakage om Mobile - InformationWeek · 2013-02-15 · One of the biggest challenges facing IT today is the inherent insecurity of mobile devices now being used by the enterprise,

FraMehaWK White paper

7

2. CLOUD SECURITY

�� This is a hot topic. Cloud vendors ranging from Amazon �SXEOLF��WR�7HUUHPDUN��FDUULHU�FORXGV��KDYH�FUHDWHG�9LUWXDO�Private Network clouds. These are clouds that have both ÀUHZDOO�DQG�URXWLQJ�EDVHG�FRQWUROOHG�DFFHVV��

�� A number of vendors even allow dedicated server versions, enabling even more control for a price.

�� In the old days of networking, the same discussion about ´WUXVWLQJ�WKH�FORXGµ�RFFXUUHG�LQ�the telecom space – all private QHWZRUNV�DVLGH�IURP�GDUN�ÀEUH�lit lines are shared. Today no one thinks twice about it.

3. SECURE CLOUD-TO-MOBILE COMMUNICATIONS

Basic secure communications to mobile devices are available. Secure tunnels, encrypted data streams, and authentication IRU�GHYLFHV�SHRSOH�DUH�DOO�ZHOO�XQGHUVWRRG��,I�\RX�ZDQW�WR�XVH�cloud computers to run the software client, you will generally use a terminal services offering.

7R�XQGHUVWDQG�KRZ�PRELOH�DFFHVV�WR�FORXG�FRPSXWHUV�ZRUN�YLD�WHUPLQDO�VHUYLFHV��ÀUVW�ZH�QHHG�WR�EUHDN�apart a computer.

On a laptop or desktop, the keyboard, mouse, and monitor (also known as the primary components of the User Interface (ClientUI )) talk directly to the OS (ClientApp)Thus an application client is two pieces: ClientUI + ClientApp

��������������

� ������

� ������

��������������

� ������

� ������

Page 8: oid eakage om Mobile - InformationWeek · 2013-02-15 · One of the biggest challenges facing IT today is the inherent insecurity of mobile devices now being used by the enterprise,

FraMehaWK White paper

8

With terminal services, the application (ClientApp) executes on a big server and then you connect the NH\ERDUG�PRXVH�PRQLWRU��&OLHQW8,��YLD�D�UHDOO\�ORQJ�FDEOH��WKH�QHWZRUN��

1RZ�OHW·V�VKRZ�KRZ�WHUPLQDO�VHUYLFHV�ZRXOG�ZRUN�ZKHQ�XVLQJ�D�FORXG�EDVHG�DUFKLWHFWXUH�

Secure terminal services (similar to dumb terminals, but smarter) have been around and are secure by WKHLU�QDWXUH�RI�PLQLPDO�GDWD�ÁRZ���&LWUL[�,&$��7HUDGLFL�3&R,3�DQG�0LFURVRIW�5'3�5HPRWH);�DUH�JRRG�H[DPSOHV�WKDW�KDYH�EHHQ�SURYHQ�LQ�WKH�9',�PDUNHWV�

��� ���������������������

� ��������������������

� �����������������������

������ ���������

����������������������������������

� � !�����������

����������

����� ����������

��� �� ���

���������

�����������

� � !�����������

�����������������������

Page 9: oid eakage om Mobile - InformationWeek · 2013-02-15 · One of the biggest challenges facing IT today is the inherent insecurity of mobile devices now being used by the enterprise,

FraMehaWK White paper

9

IF THE CLOUD CAN HANDLE THE SECURITY ISSUES, HOW DO YOU DELIVER A QUALITY USER EXPERIENCE?

What we have essentially discussed is how a cloud-based application hosting style approach can be WUXVWHG���7KH�EDVLF�VHFXULW\�PRGHO�RI�90�EDVHG�DSS�KRVWLQJ�ZDV�QHYHU�LQ�TXHVWLRQ���<RX�PD\�UHFDOO�LQ�scenario #1 (solve-the-problem), the issues were the poor performance and poor usability.

the eUreKa MOMeNt: it’S aBOUt the prOtOCOL Introducing Framehawk

Improving Performance 7R�LPSURYH�WKH�SHUIRUPDQFH�DVSHFWV�RI�PRELOLW\��WKH�ORJLF�ZH�GLVFXVVHG�DERYH�QHHGV�WR�EH�VLJQLÀFDQWO\�PRGLÀHG�²�DQRWKHU�UHTXLUHPHQW�PXVW�EH�DGGHG�

IF (trusted communication exists between cloud and data center) AND (cloud is secure) AND (secure communications exist between cloud and mobile device) AND (performant communications exist between cloud and mobile device) THEN (cloud is suitable for deploying corporate mobile apps)

To be really effective, the high-speed communications between the mobile device and the cloud need to be able to work in low-bandwidth and unreliable network scenarios (e.g. 3G).

�� 7RGD\·V�FRPPRQO\�XVHG�SURWRFROV��,&$��3&R,3��5'3��91&��ZHUH�EXLOW�IRU�RQ�FDPSXV�RU�FURVV�campus networks. These networks have plenty of bandwidth and low latency. They are generally ZHOO�PDQDJHG�DFURVV�WKH�FRUSRUDWH�LQIUDVWUXFWXUH���([WHQGLQJ�WKHLU�XVDJH�RXWVLGH�WKH�ÀUHZDOOV�UHVXOWV�in varying levels of degradation. Generally, they are useful for the occasional access model, but are QRW�GHVLUDEOH�IRU�GDLO\�DFFHVV���7KH�VWDQGDUG�VKRXOGHU�VKUXJ�DQVZHU�LV�´RK��ZHOO��WKH�VSHHG�RI�OLJKW�FDQQRW�EH�FKDQJHGµ

�� Solution: If we can use technology control planes from halfway around the planet, and can talk WR�VSDFHFUDIW�DFURVV�WKH�JDOD[\��ZK\�FDQ·W�ZH�WDON�WR�D�FRPSXWHU�VRPHZKHUH�HOVH�RQ�(DUWK"��7R�solve the performance problem, Framehawk created its own communications protocol called the Lightweight Framebuffer Protocol (LFP), which works with the laws of physics better by leveraging some advanced mathematics.

�� :K\�GRHV�/)3�ZRUN"��/)3�LV�a patented new architecture that was developed by former NASA programmers with the goal of 15,000 mile performant communication RQ�ODWHQF\�ORVV�MLWWHU�VHQVLWLYH�mobile carriers with devices ZLWKRXW�UHTXLULQJ�D�VSHFLÀF�chipset.

�������������������!#���������� ��������$����������������������

��

���

���������

���

���������������

����#�������� ���

����������

�����������

����#�������� ���

Page 10: oid eakage om Mobile - InformationWeek · 2013-02-15 · One of the biggest challenges facing IT today is the inherent insecurity of mobile devices now being used by the enterprise,

FraMehaWK White paper

10

DeLiVeriNG Great MOBiLe USaBiLitYSolving the performance problem for mobile devices is still not enough. Delivering applications that are not designed for mobile at high speed can leave you with a high-speed but poor user experience. So to complete our logic, we need one more requirement:

IF (trusted communication exists between cloud and data center) AND (cloud is secure) AND (secure communications exist between cloud and mobile device) AND (performant communications exist between cloud and mobile device) AND (the user experience can be optimized) THEN (cloud is suitable for deploying corporate mobile apps)

Optimizing the user experience where the applications are accessed via the cloud requires a few different techniques:

�� Direct UI improvements – areas where the customer interacts with the application

�� A way to engage multiple legacy applications simultaneously while keeping them protected from each other

�� Allow different classes of services to safely be interacted with.

1RWH��$QRWKHU�)UDPHKDZN�ZKLWH�SDSHU�ZLOO�GLVFXVV�PHWKRGV�WR�FUHDWH�´PRELOH�ÀUVWµ�DSSOLFDWLRQV�DQG�legacy mash-ups, extending these cloud-based techniques.�� $�ZD\�WR�HQDEOH�1(:�PRELOH�ÀUVW�DSSV�WR�ZRUN�QDWLYHO\�� A way to integrate legacy applications as desired

UI Improvements for the terminal service genre requires gesture and sensor conversion that is device contextual while allowing the user to interact naturally. Additionally, screen size optimizations for scale and aspect ratio need to occur since devices range from 4:3 to 16:9 and everything in between.

Framehawk has developed a system of translation to enable any devices (current and future, regardless of form factor) to work with any Framehawk-powered cloud service.

0XOWL�PRGDO�DFFHVV�RI�DSSOLFDWLRQV enables different classes of applications to be used regardless of origin. This enables an employee productivity workspace to be created and assembled instantly from Internet and private data center sources, without fear of data leakage across those services or to the native device apps as well. This solution protects against the Dropbox example mentioned earlier.

�� !���$"������$��!')�� ����"������ ��� �*�����!����������������������������� ������

��

��

��

�����!��� ��� ��"���

�"%�������!���

�������&�����!�������!$��

���

��!�)��������%���

�����!����

���������!�

��!�)��������%���

Page 11: oid eakage om Mobile - InformationWeek · 2013-02-15 · One of the biggest challenges facing IT today is the inherent insecurity of mobile devices now being used by the enterprise,

FraMehaWK White paper

11

Framehawk was engineered from the start to enable this protection. See below:

BriNGiNG tOGether MOBiLe SeCUritY, perFOrMaNCe, aND USaBiLitYPutting it altogether requires a secure cloud, secure transmission, and a secure endpoint. And, to make it usable to your users, a natural gesture translation system needs to overlay the communication infrastructure.

All of these techniques are available today, with Framehawk. Framehawk has the full platform to work with your enterprise or enterprise partners. With Framehawk, you:

�� 'RQ·W�UHZULWH�OHJDF\�DSSV

�� 'RQ·W�LQYHVW�LQ�QHZ�ULVN�PLWLJDWLRQ�V\VWHPV

�� 'RQ·W�LQYHVW�LQ�QHZ�VRIWZDUH�GLVWULEXWLRQ�V\VWHPV�IRU�\RXU�FRUH�HQWHUSULVH�DSSOLFDWLRQV

�� 'RQ·W�SRUW�\RXU�DSSOLFDWLRQV�WR�HYHU\�SODWIRUP�HYHU\�FRXSOH�RI�\HDUV

�� Do get in the market today with mobile access to enterprise applications and satisfy your employee and customer needs

�� Do leverage cloud economics to create rich application services

�� Do focus your efforts

�� Do keep your data secure without worry about user behaviors with their devices

�������������������������

���������������������������������

�� ��������� ����

����

Page 12: oid eakage om Mobile - InformationWeek · 2013-02-15 · One of the biggest challenges facing IT today is the inherent insecurity of mobile devices now being used by the enterprise,

FraMehaWK White paper

12

Application opportunities addressed here today:

Leveraging the basic techniques above, there are several different application scenarios that should be considered.

�� For general productivity apps in BYOD scenarios

�� For existing legacy applications

�� For existing web applications

For all of these situations, the Framehawk Canvas is available today.

$�VHSDUDWH�ZKLWHSDSHU�ZLOO�IRFXV�RQ�WKH�H[WHQGLQJ�WKLV�SODWIRUP�WR�LQFOXGH�PRELOH�ÀUVW�DQG�OHJDF\�QHZ�mash-ups for dynamic and immersive mobile device applications.

SUMMarYThe possibility of data leakage from mobile devices is one of many challenges that IT organizations are facing with the BYOD phenomenon and the move to the next-generation, mobilized enterprise. Perhaps FRXQWHU�LQWXLWLYHO\�DW�ÀUVW��WKH�FORXG�RIIHUV�WKH�RSSRUWXQLW\�WR�VROYH�WKLV�SUREOHP��EXW�RQO\�LI�DQ�DSSURSULDWH�secure architecture and application delivery capability such as the Framehawk Platform is used.

For additional information about the Framehawk Platform, visit our website or contact us directly.

CONtaCt US:

[email protected] Phone: +1-415-371-9110

Twitter: @Framehawk www.framehawk.com

Framehawk, Inc. �����QG�6W����UG�ÁRRU

San Francisco, CA 94105

© 2012 Framehawk, Inc. All rights reserved. Framehawk, Framehawk Canvas, Framehawk Cloud, Framehawk Lightweight Framebuffer Protocol, Framehawk Platform, and Framehawk Software Development Kit, and Framehawk Studio are trademarks of Framehawk, Inc.