the red report: cdw.com/mobilesecurity mobile security …€¦ · jailbreaking or rooting if left...

7
THE RED REPORT: KEEPING DATA IN PLACE WHEN WORKERS ARE ON THE MOVE. e Challenges | e Solution e Benefits | e Services MOBILE SECURITY VOL 21

Upload: others

Post on 09-Aug-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Red RepoRT: CDW.com/mobilesecurity MOBILE SECURITY …€¦ · JAILBREAKING OR ROOTING If left unlocked and unencrypted, lost devices can result in lost organizational data. This

One

CD

W W

ay20

0 N

. Milw

auke

e Av

enue

Vern

on H

ills, IL

600

61

Th

e R

ed R

epo

RT:

Mobility means complexity. That’s why we offer you more than just products. We offer you the people and the plan to turn them into integrated solutions. Like hardware and software activation. Ongoing lifecycle support. Plus, partnerships with leading MDM and device platform vendors. With years of experience, our solution architects can help you develop a complete mobile security plan. One that safeguards your data without restricting your workers. It’s more than just products. It’s mobile security. Solved.

To learn more about how we’ve solved it before, or to speak with a solution architect about technologies for your organization, contact your CDW account manager or call 800.800.4239

Or, visit CDW.com/mobilesecurity

Why people Who get it need people Who get it.

The PeopleYour dedicated account manager is backed by a team of security solution architects.

The ProductsOur wide-ranging partnerships give you access to thousands of technology products in every area, including data center optimization, storage, mobility, continuity of operations and more.

The PlanWe offer a variety of services that make the most of your investment and make your job easier.

CDW.com/mobilesecurity

KEE

PIN

G D

ATA

IN P

LAC

E W

HEN

W

OR

KER

S A

RE

ON

TH

E M

OV

E.Th

e C

halle

nges

| Th

e So

lutio

nTh

e B

enef

its |

The

Serv

ices

1086

03/1

0860

4

FPO

Plea

se re

mem

ber t

o re

cycl

e.Fo

llow

CD

W o

n

The Red RepoRT:

Keeping dAtA in plACe When WoRKeRS ARe on the MoVe.

The Challenges | The SolutionThe Benefits | The Services

MOBILE SECURITY

VOL 21

John

Sam

ple

Acm

e Co

.12

3 An

ywhe

re S

tree

t, Su

ite 1

City

, Sta

te 0

0000

-000

0

Page 2: The Red RepoRT: CDW.com/mobilesecurity MOBILE SECURITY …€¦ · JAILBREAKING OR ROOTING If left unlocked and unencrypted, lost devices can result in lost organizational data. This

CDW.com/mobilesecurity

oUT oF The oFFICe ANd oUT oF CoNTRoL.

SoLVed.

When WoRKeRS ARe AWAy,SeCURity thReAtS Will plAy.

We get it. And we’ve helped many organizations move toward a complete mobile security solution to help protect their data at every turn.

Check out our white paper on Mobile Device Management at CDW.com/mobilesec

From remote branches to private homes. Across the office and around the globe. Mobile technologies are enabling your people to take their work wherever work takes them. But as they’re taking the world by storm, mobile security can run amok. After all, IT departments have more to secure than ever before. A variety of smartphones. Tablets. Notebooks. Disparate operating systems. And an array of mobile applications. With so much complexity, it can make security quite complicated, too. With a multilayered mobile security solution, we can help open your workers to the world without opening your network to a world of risk.

Page 3: The Red RepoRT: CDW.com/mobilesecurity MOBILE SECURITY …€¦ · JAILBREAKING OR ROOTING If left unlocked and unencrypted, lost devices can result in lost organizational data. This

02 The Challenges CDW.com/mobilesecurity

1Enterprise Mobility Survey, IDG, June 2012

The percentage of mobile devices at large organizations that are not secure.145%

Your mobile devices travel all over the world. Unless your mobile security strategy goes the distance, your organization’s data and resources could get lost along the way. Here are just some of the ways in which outward-bound data can take an unexpected turn:

deToURdATA

Tech-savvy users may jailbreak or root their devices in an effort to bypass certain built-in controls. This allows the installation of third-party applications, which could be malicious.

JAILBREAKING OR ROOTING

If left unlocked and unencrypted, lost devices can result in lost organizational data. This includes intellectual property and other confidential information.

Third-party apps can carry threats that compromise organizational data. A whopping 69 percent of users admit to installing these applications on their work devices.2

With the growing Bring Your Own Device (BYOD) trend, users are gaining access to sensitive data from personal devices. Left unmonitored and unregulated, however, they can create significant security challenges for IT.

BYOD

In the absence of data encryption, public access points such as Wi-Fi hotspots and cellular networks cannot be assumed safe.

UNSECURE ACCESS POINTSLOST DEVICES

Some users may save their e-mail and Virtual Private Network (VPN) passwords directly on their device — granting easy access to whomever may pick it up.

SAVED PASSWORDS

2 Kaneshige, T. “CIO Challenge with BYOD: Don’t Fall Down the Rabbit Hole,” CIO.com, May 17, 2012

UNAPPROVED APPLICATIONS

Page 4: The Red RepoRT: CDW.com/mobilesecurity MOBILE SECURITY …€¦ · JAILBREAKING OR ROOTING If left unlocked and unencrypted, lost devices can result in lost organizational data. This

04 The Solution CDW.com/mobilesecurity

The percentage of organizations that have implemented MDM solutions.333%

3 “Survey Employees to Target Mobility Improvements,” Forrester, April 25, 2012

SAFe tRAVelS StARt heReUsing the right mix of technologies and strategies, we can help build a comprehensive mobile security solution that helps your workers stay productive while helping your data stay put.

DEFINE POLICIESThis critical first step helps define mobile device limitations, establishing a code of conduct for their use, selection and deployment. Policies can outline which

devices are allowed on your network and how they can be used, not to mention the software and services used to provision, deploy and manage them.

CHOOSE YOUR MDM TOOLSWith all the Mobile Device Management (MDM) tools available, selecting the right ones is key. Consider the following questions:

• Does it cover a range of devices and operating systems?

• Can it help install, upgrade and remove applications?

• Can it manage a full or partial remote wipe if needed?

• Can it detect and enforce security policies?

2

ENCRYPT DATA AND NETWORKSThird-party encryption tools deliver consistent encryption and policy enforcement across a range of devices and operating systems.

VPN connections can encrypt data to your organization’s network, protecting against potentially unsecure Wi-Fi hotspots and cellular networks.

3

ENABLE ACCESS CONTROLSStrong authentication and digital certificates help ensure only authorized mobile users can access network resources.

A unified policy platform can set user and device access controls that deliver necessary services in profiling, posture and guest management.

4

UPGRADE WIRELESS NETWORKSAddress new demands in security by upgrading to the latest standards like 802.11n, gigabit switches, Power over

Ethernet (PoE) and wireless LAN controllers.

51

Page 5: The Red RepoRT: CDW.com/mobilesecurity MOBILE SECURITY …€¦ · JAILBREAKING OR ROOTING If left unlocked and unencrypted, lost devices can result in lost organizational data. This

06 The Benefits CDW.com/mobilesecurity

86% The percentage of organizations that cite productivity advantages as a top driver for investments in mobility.4

4Enterprise Mobility Survey, IDG, June 2012

SeCURe yoUR deViCeS. SeCURe the BeneFitS.

When you invest in mobile security, it’s not just about the data that isn’t lost, it’s also about the benefits you gain.

PRODUCTIVITY AND PEACE OF MINDWith the right policies, tools and technologies in place, remote users are able to roam free, worry-free. Heightened security facilitates greater worker productivity while IT enjoys greater peace of mind. IMPROVED MANAGEABILITY AND ROIMDM tools allow you to wrangle your widespread mobile devices — their security settings, applications and activities — through automated, centralized administration. A unified policy platform helps you create and manage centralized policies that set network access controls. This helps IT support BYOD initiatives with confidence. A BETTER OVERALL USER EXPERIENCEWhen mobile devices are preconfigured with the right MDM security settings, remote workers don’t have to worry about them. This boosts user satisfaction, which can result in greater worker productivity.

ENJOY THE RIDE:

Page 6: The Red RepoRT: CDW.com/mobilesecurity MOBILE SECURITY …€¦ · JAILBREAKING OR ROOTING If left unlocked and unencrypted, lost devices can result in lost organizational data. This

08 The Services

FeAtURed pARtneRS

To see how we can help secure your devices with a complete mobile security solution, contact your CDW account manager or call 800.800.4239

Or for more information, visit CDW.com/mobilesecurity

Partnerships & Certifications • Certified Cisco Systems Integrator• Certified Ethical Hacker (CEH)• Certified Information Systems Auditor (CISA)• Cisco Certified Internetwork Expert — Security• Cisco Master Security Specialization• Certified Information Systems Security Professional (CISSP)• Certified Secure Software Lifecycle Professional (CSSLP)• Global Certified Incident Handler (GCIH)• Global Information Assurance Certification (GIAC)• Global Security Essentials Certification (GSEC)• HIPAA Academy Certified• Homeland Security Certified• Mail Security for Exchange Sales Expert• PCI Approved Scanning Vendor

CDW.com/mobilesecurity

The terms and conditions of product sales are limited to those contained on CDW’s website at CDW.com; notice of objection to and rejection of any additional or different terms in any form delivered by customer is hereby given; CDW®, CDW•G® and PEOPLE WHO GET IT™ are trademarks of CDW LLC; all other trademarks and registered trademarks are the sole property of their respective owners

We give mobile security a big boost: We can evaluate your WLAN capacity as well as assist in mobile device application development, Mobile Device Management, network access controls and vendor integrations.

FEATURED SERVICE:

SeCURity ASSeSSMentS

As mobile devices turn your organization on its head, we can help your IT department regain its footing. With a variety of solutions and services, we can help you take the first steps toward mobile security while mapping your solution to your strategic priorities:

AirWatch’s Mobile Device Management (MDM) solution enables you to manage deployments of mobile devices. The solution provides the ability to quickly enroll devices in your enterprise environment, configure and update device settings over the air, enforce security policies and compliance, secure mobile access to corporate resources and remotely lock and wipe managed devices. With AirWatch®, you can manage a diverse fleet of Android™, Apple®, BlackBerry®, Symbian® and Windows® devices in a single console.

BoxTone’s Enterprise Mobility Management (EMM) platform delivers centralized, automated control of all mobile devices and tablets, including iPhone®, iPad®, Android and BlackBerry, as well as the apps that run on them. Built to CIO and CISO specifications, BoxTone® aligns mobility management with core IT services, extending existing resources and processes to fully secure, manage and govern mobility on par with all other critical IT systems.

The Cisco® Identity Services Engine (ISE) focuses on the pervasive service enablement of Cisco TrustSec ® for borderless networks. The ISE delivers all the necessary services required by enterprise networks — AAA, profiling, posture and guest management — on a common platform. As a core component of the SecureX™ framework, Cisco ISE provides a unified policy platform that ties organizational security policies to business components such as security and network infrastructure, user identity, resources and IT operational processes. Cisco ISE allows customers to create and manage centralized policies, while Cisco TrustSec delivers policies and enforcement through the network.

SonicWALL® Secure Remote Access (SRA) solutions offer SSL VPN access to mission-critical resources from virtually any endpoint — including desktops, notebooks, smartphones and tablets. SonicWALL provides a wide range of scalable remote access solutions that fit organizations of every size, from small- to medium-sized organizations to the largest global enterprise.

• Wireless site surveys and security testing

• Internal and external vulnerability assessments

• Data Loss Prevention (DLP) risk assessments

• Hardware activation services

• Complete lifecycle support

One

CD

W W

ay20

0 N

. Milw

auke

e Av

enue

Vern

on H

ills, IL

600

61

Th

e R

ed R

epo

RT:

Mobility means complexity. That’s why we offer you more than just products. We offer you the people and the plan to turn them into integrated solutions. Like hardware and software activation. Ongoing lifecycle support. Plus, partnerships with leading MDM and device platform vendors. With years of experience, our solution architects can help you develop a complete mobile security plan. One that safeguards your data without restricting your workers. It’s more than just products. It’s mobile security. Solved.

To learn more about how we’ve solved it before, or to speak with a solution architect about technologies for your organization, contact your CDW account manager or call 800.800.4239

Or, visit CDW.com/mobilesecurity

Why people Who get it need people Who get it.

The PeopleYour dedicated account manager is backed by a team of security solution architects.

The ProductsOur wide-ranging partnerships give you access to thousands of technology products in every area, including data center optimization, storage, mobility, continuity of operations and more.

The PlanWe offer a variety of services that make the most of your investment and make your job easier.

CDW.com/mobilesecurity

KEE

PIN

G D

ATA

IN P

LAC

E W

HEN

W

OR

KER

S A

RE

ON

TH

E M

OV

E.Th

e C

halle

nges

| Th

e So

lutio

nTh

e B

enef

its |

The

Serv

ices

1086

03/1

0860

4

FPO

Plea

se re

mem

ber t

o re

cycl

e.Fo

llow

CD

W o

n

The Red RepoRT:

Keeping dAtA in plACe When WoRKeRS ARe on the MoVe.

The Challenges | The SolutionThe Benefits | The Services

MOBILE SECURITY

VOL 21

John

Sam

ple

Acm

e Co

.12

3 An

ywhe

re S

tree

t, Su

ite 1

City

, Sta

te 0

0000

-000

0

Page 7: The Red RepoRT: CDW.com/mobilesecurity MOBILE SECURITY …€¦ · JAILBREAKING OR ROOTING If left unlocked and unencrypted, lost devices can result in lost organizational data. This

08 The Services

FeAtURed pARtneRS

To see how we can help secure your devices with a complete mobile security solution, contact your CDW account manager or call 800.800.4239

Or for more information, visit CDW.com/mobilesecurity

Partnerships & Certifications • Certified Cisco Systems Integrator• Certified Ethical Hacker (CEH)• Certified Information Systems Auditor (CISA)• Cisco Certified Internetwork Expert — Security• Cisco Master Security Specialization• Certified Information Systems Security Professional (CISSP)• Certified Secure Software Lifecycle Professional (CSSLP)• Global Certified Incident Handler (GCIH)• Global Information Assurance Certification (GIAC)• Global Security Essentials Certification (GSEC)• HIPAA Academy Certified• Homeland Security Certified• Mail Security for Exchange Sales Expert• PCI Approved Scanning Vendor

CDW.com/mobilesecurity

The terms and conditions of product sales are limited to those contained on CDW’s website at CDW.com; notice of objection to and rejection of any additional or different terms in any form delivered by customer is hereby given; CDW®, CDW•G® and PEOPLE WHO GET IT™ are trademarks of CDW LLC; all other trademarks and registered trademarks are the sole property of their respective owners

We give mobile security a big boost: We can evaluate your WLAN capacity as well as assist in mobile device application development, Mobile Device Management, network access controls and vendor integrations.

FEATURED SERVICE:

SeCURity ASSeSSMentS

As mobile devices turn your organization on its head, we can help your IT department regain its footing. With a variety of solutions and services, we can help you take the first steps toward mobile security while mapping your solution to your strategic priorities:

AirWatch’s Mobile Device Management (MDM) solution enables you to manage deployments of mobile devices. The solution provides the ability to quickly enroll devices in your enterprise environment, configure and update device settings over the air, enforce security policies and compliance, secure mobile access to corporate resources and remotely lock and wipe managed devices. With AirWatch®, you can manage a diverse fleet of Android™, Apple®, BlackBerry®, Symbian® and Windows® devices in a single console.

BoxTone’s Enterprise Mobility Management (EMM) platform delivers centralized, automated control of all mobile devices and tablets, including iPhone®, iPad®, Android and BlackBerry, as well as the apps that run on them. Built to CIO and CISO specifications, BoxTone® aligns mobility management with core IT services, extending existing resources and processes to fully secure, manage and govern mobility on par with all other critical IT systems.

The Cisco® Identity Services Engine (ISE) focuses on the pervasive service enablement of Cisco TrustSec ® for borderless networks. The ISE delivers all the necessary services required by enterprise networks — AAA, profiling, posture and guest management — on a common platform. As a core component of the SecureX™ framework, Cisco ISE provides a unified policy platform that ties organizational security policies to business components such as security and network infrastructure, user identity, resources and IT operational processes. Cisco ISE allows customers to create and manage centralized policies, while Cisco TrustSec delivers policies and enforcement through the network.

SonicWALL® Secure Remote Access (SRA) solutions offer SSL VPN access to mission-critical resources from virtually any endpoint — including desktops, notebooks, smartphones and tablets. SonicWALL provides a wide range of scalable remote access solutions that fit organizations of every size, from small- to medium-sized organizations to the largest global enterprise.

• Wireless site surveys and security testing

• Internal and external vulnerability assessments

• Data Loss Prevention (DLP) risk assessments

• Hardware activation services

• Complete lifecycle support