The New World of Security for Business Travellers

Download Report

Transcript The New World of Security for Business Travellers

The New World of Security
for Business Travellers
Anurag Lal
Senior Vice President
Strategic Services & Business Development
Wi-Fi Business Development Summit, Milan
26th October 2005
THE SECURE MOBILITY DILEMMA:
Painful Business Compromises
DEMAND FOR ACCESS
Workforce
Productivity
On-Demand
Enterprise
Business Process
Optimization
Corporate
Agility
Availability
Global
Reach
Usability
Security
Control
NEED TO PROTECT
User
Regulatory Trade
Device
Network
IP on Customer
Identities Compliance Secrets Integrity Operations Devices Privacy
2
THE MOBILE RISK
Vulnerability Means Expense
3
EVOLUTION OF THREATS
SECURITY: #1 issue for Broadband Mobility
4
SECURITY SOLUTIONS TODAY
Piecemeal processes through “bundled” solutions
Security tools and connectivity service operate in silos
Danger from inconsistent or improper use of these tools
Endpoint protection only when touching enterprise
During Internet-only sessions, pre-VPN window, and
during VPN session
Accelerate remediation once new threat/antidote
discovered
Inability to combine best-of-breed point solutions
No security vendor are strong across the board
“Forklift upgrade” of existing security components
5
TRUSTED CONNECTIONS. NO COMPROMISE.
Device
Coordinated
protection of
identities,
endpoints,
networks and data
that ties together
authentication,
compliance and
network
authorization.
Identity
Automated
Assessment
& Remediation
User and Device
Authentication
Data
Enforced VPN
Network
Role-Based
Network
Security
6
SECURING THE CONNECTION PROCESS
INTERNET CONNECTION
LAN CONNECTION
Internet Access
Restricted
Trusted
Networks
Endpoint
Lockdown
Securing the
Connection
VPN Access
Policies Enforced
Dynamic
Policy
Retrieval
Remote
Vulnerability
Remediation
Coordinated
Network
Enforcement
Policy Orchestration Platform
Single point of control for managing and enforcing policies
7
DEVICE SECURITY
Almost 2,000 mobile phones are lost every day in the UK
(Source: Metropolitian Police, UK)
49% of organizations experienced laptop or mobile phone theft
(Source: CSI/FBI 2004 Computer Crime and Security Survey)
Protection of information
Username / Password (single factor)
authentication is not secure enough in
current environment.
Connection paradigm driving two factor
authentication to enable trusted
computing.
Mechanism for “digital fingerprinting”
and policy enforcement that ONLY
allows corporate authorized devices to
attach to the corporate LAN remotely.
8
SUMMARY
Mobility is rapidly evolving but it is not just about
connectivity
Security must be addressed from a holistic point of view
in order for gaps to be identified and closed
Policy Orchestration services tie internet and VPN
access to both strong device/user authentication and
endpoint policy compliance
9
Q&A
Anurag Lal
Senior Vice President
Strategic Services & Business Development
[email protected]
Securing Mobile Data Sessions
11