E C I V E D E MOBIL N I T N E M E MANAG ! D L R O W L THE REA PT E

25 Slides1.33 MB

E C I V E D E MOBIL N I T N E M E MANAG ! D L R O W L THE REA PT E C N O C , P I N T A JOE D E T A R O P R O C N I TECHNOLOGY K& N A B Y T I N U M M O JAMES BOCK, C TRUST S N E Z I T I C T S R JUDY LONG, FI NATIONAL BANK E E S S E N N E T , E N TOM PAY TY I S R E V I N U L A C TECHNOLOGI

SECURITY & COMPLIANCE MDM CHALLENGES ENFORCEMENT REDUCE SUPPORT COST OF MOBILE ASSETS PROVIDE APPLICATION & PERFORMANCE MANAGEMENT PROVIDE BETTER BUSINESS CONTINUITY MAKE EMPLOYEES MORE PRODUCTIVE & MORE SATISFIED

TO BYOD OR NOT TO BYOD? THAT IS THE QUESTION EACH BANK HAS TO DECIDE THIS FOR THEMSELVES WHILE WEIGHING THE PROS AND CONS OF EACH. MAKE SURE THAT YOUR POLICIES & PROCEDURES ADDRESS BYOD WHETHER OR NOT YOUR INSTITUTION SUPPORTS IT! IF YOU HAVE A GUEST WIRELESS NETWORK & YOU DON’T ALLOW BYOD . GUESS WHAT? YOU WILL VERY LIKELY HAVE EMPLOYEES USE THEIR PERSONAL DEVICES FOR BANKING PURPOSES. AT LEAST IF YOU ALLOW BYOD, YOU CAN MAKE THE RULES SURROUNDING IT!

THE MAAS360 10 COMMANDMENTS OF BYOD 1. CREATE THY POLICY BEFORE PROCURING TECHNOLOGY 2. SEEK THE FLOCK’S DEVICES 3. ENROLLMENT SHALL BE SIMPLE 4. THOU SHALT CONFIGURE DEVICES OVER-THE-AIR 5. GIVE THY USERS SELF-SERVICE 6. HOLD SACRED PERSONAL INFORMATION 7. PART THE SEAS OF CORPORATE & PERSONAL DATA 8. MONITOR THY FLOCK – HERD AUTOMATICALLY 9. MANAGE THY DATA USAGE 10. DRINK FROM THE FOUNTAIN OF ROI

ROI CONSIDERATIONS CORPORATE-OWNED MODEL DEVICE COST DATA PLAN COST BYOD COST OF SUBSIDIZING DATA PLAN ELIMINATED DEVICE COST REPLACING DEVICES EVERY FEW YEARS MANAGEMENT COST OF MOBILE WARRANTY PLANS BOTH OPTIONS TAKE IT TIME & EFFORT TO MANAGE

WHAT DOES A GOOD MDM PROGRAM CONTAIN FROM A BANKERS PROSPECTIVE? MOBILE DEVICE RISK ASSESSMENT GOOD POLICY FRAMEWORK ACCEPTABLE USE POLICY BYOD POLICY MOBILE DEVICE POLICY INFORMATION SECURITY POLICY DATA CLASSIFICATION POLICY

MDM FROM A TECHNOLOGY PERSPECTIVE: SOLUTIONS THAT PROVIDE COORDINATED VISIBILITY & CONTROL OVER ALL DEVICES & OPERATING SYSTEMS. ENFORCE PASSCODE PROTECTION, ENCRYPTION, & SECURITY UPDATES CONTROL NETWORK & APPLICATION SETTINGS REMOTELY LOCATE, BLOCK, OR WIPE (FULL & SELECTIVE) DEVICES THAT HAVE BEEN LOST, STOLEN, OR ARE NO LONGER AUTHORIZED. SECURE EMAIL, MESSAGING, & BROWSING WHITELISTING & BLACKLISTING BE EASY TO USE, CENTRALLY MANAGED, AND QUICK TO DEPLOY

INTEGRATION IS KEY A GOOD MDM SOLUTION WILL INTEGRATE WITH ACTIVE DIRECTORY, EMAIL PLATFORMS (EXCHANGE, OFFICE 365,ETC.), SHAREPOINT, INTRANET, WEB APPLICATIONS, AND ALL OF YOUR EXISTING INFRASTRUCTURE. SINGLE SIGN ON ACROSS APPLICATIONS FOR AUTHENTICATION.

WHAT KIND OF ACTIONS WILL MDM SOLUTION PERFORM? REFRESH DEVICE DETAILS IN REAL-TIME INCLUDING AN LOCATION. PERFORM HELP DESK OPERATIONS LIKE LOCKING A DEVICE OR RESETTING A FORGOTTEN PASSCODE. PERFORM A FULL WIPE OF A LOST DEVICE OR A SELECTIVE WIPE OF ONLY THE CORPORATE DATA WHILE MAINTAINING PERSONAL DATA OF AN EMPLOYEE OWNED DEVICE. CHANGE IOS POLICY. REMOTELY PUSH APPS TO DEVICES INCLUDING “HOME GROWN” APPS & PUBLISHED UPDATES. PREVENT DATA LEAKAGE – KEEP PERSONAL DATA SEPARATE FROM COMPANY DATA

SET & DISTRIBUTE POLICIES ENFORCE PASSCODE REQUIREMENTS CONFIGURE RESTRICTIONS ENFORCE ENCRYPTED DEVICE BACKUPS RESTRICT USE OF CAMERA, FACETIME, & SCREEN CAPTURES RESTRICT APPLICATION INSTALLATION RESTRICT SAFARI, YOUTUBE, ETC (BUILT IN APPLICATIONS) DISTRIBUTE WI-FI, VPN, PROXY, & EMAIL PROFILES/SETTINGS MANAGE ICLOUD CONTROLS AND SETTINGS EMAIL SECURITY – RESTRICT USERS FROM MOVING EMAILS BETWEEN ACCOUNTS AND RESTRICT 3RD PARTY APPS FROM SENDING EMAILS DETECTION OF JAIL BROKEN AND ROOTED DEVICES COMPLIANCE REPORTING

SECURE BROWSING A GOOD SOLUTION WILL PROVIDE: URL FILTERING BASED ON CATEGORIES AND INCLUDE THE ABILITY TO CUSTOMIZE WHITELISTS AND BLACKLISTS BLOCK KNOWN MALICIOUS WEBSITES RESTRICT COOKIES, DOWNLOADS, COPY, PASTE, & PRINTING FUNCTIONALITY NOTIFY USERS & ADMINISTRATORS OF VIOLATIONS PROVIDE DETAILED REPORTING WITH AN AUDIT TRAIL

SECURE DOCUMENT SHARING A GOOD MDM SOLUTION SHOULD ALSO PROVIDE A SECURE CONTAINER FOR DOCUMENTS THAT CAN BE EDITED ON THE DEVICE THIS WILL REDUCE THE RISK OF DATA LEAKAGE SET TIME BASED EXPIRATIONS FOR AUTOMATIC DOCUMENT DELETION WORK WILL ALL COMMON FILE TYPES SUCH AS MICROSOFT OFFICE & PDF FORMATS ENFORCE USER AUTHENTICATION

BOARD MINUTE PORTAL BEST PRACTICES CHOOSE DEVICE CAREFULLY. IOS IS RECOMMENDED BECAUSE OF SECURITY. CORPORATE OWNED DEVICE MANAGED SETTINGS USER FRIENDLY SOLUTION FULL CONTROL OF DATA ON DEVICE DISABLE SCREEN SHOT LOCATE LOST DEVICE ENABLE ENCRYPTION DEVICE BACKUP DEVICE WIPE RISK ASSESSMENT IPAD POLICY / AGREEMENT

USING MDM FOR BOARD USING AN APP FORM AN MDM SOLUTION MINUTES PROVIDES DEVICE MANAGEMENT ALLOWS FOR FULL CONTROL OF DATA ON DEVICE ALLOWS FOR DEVICE WIPE ALLOWS TO ENCRYPT DATA ALLOWS FOR OPENING, DOWNLOADING, PRINTING RESTRICTIONS ALLOW OPENING IN SPECIFIED GEOGRAPHICAL RANGE USING AN MDM SOLUTION WILL COMBINE TWO SOLUTIONS IN ONE

AIRWATCH SECURE CONTENT LOCKER BY VMWARE FOUNDED IN 2003, AIRWATCH IS AN ATLANTA BASED ENTERPRISE, MOBILE DEVICE, MOBILE APPLICATION AND MOBILE CONTENT MANAGEMENT COMPANY. IN FEB 2014 VMWARE AQUIRED AIRWATCH IT PROVIDES SOLUTIONS THAT ARE COMPATIBLE WITH A VARIETY OF DEVICES INCLUDING IOS, ANDROID, BLACKBERRY AND WINDOWS PHONE. WON THE 2013 CLOUD STORAGE EXCELLENCE AWARD

AIRWATCH SECURE CONTENT LOCKER BY VMWARE Flexible Password Content Storage Protected Hosted in Device Location Cloud On Premise Geographical Hybrid Range Limits Device Wipe Disable Screen Set Time Shots Limits on Specify Wi-Fi Data Hotspot Set Data to be Disable Browser Viewed Online

PRACTICES 1.LOCK THE DEVICE WITH A PASSWORD OR PERSONAL IDENTIFICATION 2.NUMBER (PIN) 3.INSTALL APPS ONLY FROM TRUSTED SOURCES 4.BACK UP YOUR DATA 5.KEEP YOUR SYSTEM UPDATED 6.DO NOT HACK (JAIL-BREAK) YOUR DEVICE

MOBILE BEST PRACTICES (CONTINUED) 7.TURN OFF WI-FI AND BLUETOOTH SERVICES WHEN NOT IN USE 8.DO NOT AUTOMATICALLY CONNECT TO WIFI HOT SPOTS 9.DO NOT USE UNTRUSTED HOT SPOTS PUBLIC OR PRIVATE. UNTRUSTED WI-FI HOT SPOTS ARE SUSCEPTIBLE TO MANIN-THE-MIDDLE ATTACKS. 10.AVOID SENDING PERSONAL INFORMATION VIA TEXT OR EMAIL 11.BE CAREFUL WHAT YOU CLICK

FCNB CURRENTLY ONLY ALLOWS ACCESS TO HOW FCNB ENABLES BYOD EMAIL. FCNB SELECTED MOBILE IRON AS IT MOBILE DEVICE MANAGEMENT SYSTEM. EMPLOYEE MUST SIGN AND AGREE TO MOBILE POLICY. IN THE FUTURE FCNB WILL ALLOW ACCESS VIA SECURE CITRIX CONNECTION THE BANK IS NOT OBLIGATED OR RESPONSIBLE FOR PERSONAL EMAIL, TEXTS, ETC. THE BANK CONTROLS THE CORPORATE E-MAIL PROFILE FCNB RESTRICTS FORWARDING OF E-MAIL THROUGH PERSONAL ACCOUNTS.

HOW FCNB ENABLES BYOD CURRENTLY FIRST CITIZENS ONLY (CONTINUED) SUPPORTS IOS (IPHONE AND IPADS) AND SUPPORTED LEVELS OF THAT SOFTWARE. EMPLOYEES WILL BE HELD PERSONALLY RESPONSIBLE FOR ANY PROBLEMS CAUSED BY THEIR NEGLIGENCE AS DEEMED BY BANK MANAGEMENT. EMAIL HISTORY AVAILABLE ON THE MOBILE SMARTPHONES AND TABLETS WILL BE LIMITED. A “JAIL BROKE” OPERATING SYSTEM WILL AUTOMATICALLY BE WIPED BY MOBILE IRON.

HOW FCNB ENABLES BYOD (CONTINUED) THE BANK IS NOT RESPONSIBLE FOR THAT EMPLOYEE DATA. CORPORATE EMAIL AND DATA THAT IS MANAGED BY THE BANK’S MOBILE MANAGEMENT SYSTEM IS PROTECTED AND SEPARATED IN ITS OWN CONTAINER. EACH ATTACHMENT IS PROTECTED BY A SECURE GATEWAY AND CAN ONLY BE READ BY A TRUSTED READER. MOBILE IRON AUTOMATICALLY PROTECTS AGAINST MAN–IN–MIDDLE ATTACKS.

HOW FCNB ENABLES BYOD CONT. THE BANK CAN CHOOSE AT ANY TIME TO DO A SELECTIVE WIPE OF THE CORPORATE EMAIL AND DATA ON SMARTPHONES AND TABLETS. THE BANK WILL AUTOMATICALLY QUARANTINE A SMARTPHONE OR TABLET THAT HAS NOT CHECKED IN TO THE BANK’S MOBILE MANAGEMENT SYSTEM. THE BANK WILL AUTOMATICALLY COMPLETE A FULL WIPE OF THE SMARTPHONE OR TABLET IF THE DEVICE HAS NOT CHECKED IN AFTER THIRTY DAYS. THIS PREVENTS DATA COMPROMISE IN CASE THE MOBILE DEVICE HAS BEEN STOLEN AND TAKEN OFF LINE (I.E. SIM CARD SWAP).

WHY FCNB SELECTED APPLE IOS EVERY IOS APP CAN ONLY ACCESS ITS OWN DATA CONTAINER: THERE IS NO GENERAL ACCESS TO THE FILE SYSTEM. AS A RESULT, APPS CAN ONLY DAMAGE THEIR OWN DATA, UNLESS IT IS A “JAIL BROKEN” DEVICE. THE APP STORE IS TIGHTLY CURATED: APPS ARE TESTED BY APPLE BEFORE BEING MADE AVAILABLE TO THE PUBLIC SO INCIDENCES OF MALWARE ARE RARE. APPLE CONTROLS THE DISTRIBUTION OF NEW OPERATING SYSTEM UPGRADES: APPLE CAN QUICKLY MAKE UPGRADES AVAILABLE FOR THE ENTIRE IPHONE, IPAD, AND IPOD DEVICE COMMUNITY. IF A SECURITY ISSUE IS IDENTIFIED, IT FIXES IT AND ENSURES THAT ALL DEVICES HAVE EASY ACCESS TO THE NEWLYPATCHED IOS VERSION. THE TIMING OF THE FIX AND DISTRIBUTION IS ENTIRELY UNDER APPLE’S CONTROL.

WHY FCNB SELECTED APPLE IOS (CONTINUED) PASSCODE ENFORCEMENT PREVENTS UNAUTHORIZED ACCESS TO THE DEVICE. IT ALSO ACTIVATES IOS DATA PROTECTION TO ENHANCE BUILT-IN HARDWARE ENCRYPTION IN ORDER TO PROVIDE ADDITIONAL SECURITY FOR EMAIL MESSAGES, EMAIL ATTACHMENTS. MOBILE IRON SUPPORTS MULTIPLE DEVICES, SO IN THE FUTURE FCNB CAN ADD OTHER DEVICES AS NEEDED.

FCNB MOBILE BANKING MOBILE BANKING REQUIRES USER TO HAVE ONLINE BANKING ACCESS TWO FACTOR AUTHENTICATION IS NEEDED FOR ONLINE BANKING MOBILE DEVICE REQUIRES OUT-OF-BAND AUTHENTICATION

Back to top button