bryan padgett - census.gov · 3 march 2015 technology focus apps and end point security key...

14
3 March 2015 1 Bryan Padgett BYOD Enabling Technologies

Upload: others

Post on 16-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Bryan Padgett - Census.gov · 3 March 2015 Technology Focus Apps and End Point Security Key Benefits Supports 95% of current mobile devices Protects access to file system, networks

3 March 2015 1

Bryan Padgett

BYOD Enabling Technologies

Page 2: Bryan Padgett - Census.gov · 3 March 2015 Technology Focus Apps and End Point Security Key Benefits Supports 95% of current mobile devices Protects access to file system, networks

2

Our Vision for BYOD

3 March 2015 AGILEX PROPRIETARY

Page 3: Bryan Padgett - Census.gov · 3 March 2015 Technology Focus Apps and End Point Security Key Benefits Supports 95% of current mobile devices Protects access to file system, networks

3

The BYOD Challenge – Platform Diversity

3 March 2015

0

0.1

0.2

0.3

0.4

0.5

0.6

Google Apple Microsoft BlackBerry Symbian

53.1%

41.6%

3.4% 1.8% .1%

U.S. Smartphone Platform Market Share, December 2014Source: comScore MobiLens

Page 4: Bryan Padgett - Census.gov · 3 March 2015 Technology Focus Apps and End Point Security Key Benefits Supports 95% of current mobile devices Protects access to file system, networks

4

The BYOD Challenge – Consumer vs. Enterprise

3 March 2015

Consumer Devices,

Individual Liability

Government Apps,

Network Endpoints

Respondent Data

(e.g. – Title 13)

Page 5: Bryan Padgett - Census.gov · 3 March 2015 Technology Focus Apps and End Point Security Key Benefits Supports 95% of current mobile devices Protects access to file system, networks

5

Key Requirements to Achieve Mission Success

3 March 2015

Comprehensive

Security

User

Acceptance

Enterprise

Control

Platform and

Device Choice

Personal and

Business

Separation

Transparent

Privacy

Protections

User

Authentication

Data Encryption

Data Loss

Prevention

Provisioning and

Decommissioning

Policy Enforcement

Monitoring and

Alerts

Page 6: Bryan Padgett - Census.gov · 3 March 2015 Technology Focus Apps and End Point Security Key Benefits Supports 95% of current mobile devices Protects access to file system, networks

6

Current BYOD Technology Alternatives

3 March 2015

Enterprise Mobility Management (MDM, MAM)1

2 App Wrapping and SDKs

3 Dual Persona Containers

4 Virtualization (VDI, VMI)

5 Data Wrapping

Page 7: Bryan Padgett - Census.gov · 3 March 2015 Technology Focus Apps and End Point Security Key Benefits Supports 95% of current mobile devices Protects access to file system, networks

7

Enterprise Mobility Management (MDM, MAM)

3 March 2015

Technology

FocusEnterprise Devices (GFE)

Key

Benefits

Supports at least 95% of current mobile devices

Provides greatest number of policy and device configuration

controls

Provides app catalogs

Challenges

and

Limitations

Proprietary solutions

Lacks privacy controls expected by end users

App protection limited to black and white lists with policy-based actions

Devices are limited to one MDM profile

Requires app wrapping or SDK solution to address all security requirements

Page 8: Bryan Padgett - Census.gov · 3 March 2015 Technology Focus Apps and End Point Security Key Benefits Supports 95% of current mobile devices Protects access to file system, networks

8

App Wrapping and SDKs

3 March 2015

Technology

FocusApps and End Point Security

Key

Benefits

Supports 95% of current mobile devices

Protects access to file system, networks and data sharing

Performs authentication and data encryption at the app-level

Provides separation between business and personal environments

Protects user privacy

Automates provisioning and removal of apps

Challenges

and

Limitations

Proprietary solutions

Currently limited to iOS and Android platforms

Requires app binaries thus reducing the availability of public apps

App may need to be wrapped every time a new version is released

Often requires an MDM that adds complexity and user privacy concerns

Page 9: Bryan Padgett - Census.gov · 3 March 2015 Technology Focus Apps and End Point Security Key Benefits Supports 95% of current mobile devices Protects access to file system, networks

9

Dual Persona Containers

3 March 2015

Technology

FocusSecure Containers

Key

Benefits

Protects access to file system, networks and data sharing

Provides separation between business and personal environments

Often include additional security controls at the OS or hardware

layer

Protects user privacy

Automates provisioning and removal of apps

Challenges

and

Limitations

Proprietary solutions

Limited platform and device choice based on OS and OEM

Often requires app wrapping or an SDK

Often requires an MDM that adds complexity and user privacy

concerns

Page 10: Bryan Padgett - Census.gov · 3 March 2015 Technology Focus Apps and End Point Security Key Benefits Supports 95% of current mobile devices Protects access to file system, networks

10

Virtualization (VDI / VMI)

3 March 2015

Technology

FocusVirtualized Infrastructure

Key

Benefits

Supports at least 95% of current mobile devices

Does not store any data on the device

Provides secure connection to virtualized environment

Provides separation between business and personal

environments

Protects user privacy

Automates provisioning and removal of apps

Challenges

and

Limitations

Proprietary solutions

Does not support partially disconnected operations

VMI currently limited to Android platform

Page 11: Bryan Padgett - Census.gov · 3 March 2015 Technology Focus Apps and End Point Security Key Benefits Supports 95% of current mobile devices Protects access to file system, networks

11

Data Wrapping

3 March 2015

Technology

FocusData and End Point Security

Key

Benefits

Supports 95% of current mobile devices

Protects access to file system, networks and data sharing

Does not require an SDK or app wrapping

Protects user privacy

Provides app catalogs

Automates provisioning and removal of apps

Challenges

and

Limitations

Proprietary solutions

Currently limited to iOS and Android platforms

Currently limited to free commercial and in-house developed apps

Technologies are new and undergoing review for compliance

with applicable Federal standards

Page 12: Bryan Padgett - Census.gov · 3 March 2015 Technology Focus Apps and End Point Security Key Benefits Supports 95% of current mobile devices Protects access to file system, networks

12

Viability of BYOD Enabling Technologies

• Enterprise Mobility Management (EMM) and Dual

Persona Container technologies are best suited for

managing government furnished mobile devices

• Virtualization technologies, such as virtual mobile

infrastructure, are designed for use cases in which the user

will have a persistent network connection such as a

business campus or urban environment

• Data and app wrapping technologies when coupled with

enterprise app stores and virtual private networks have the

highest overall viability for supporting a BYOD approach

3 March 2015

Page 13: Bryan Padgett - Census.gov · 3 March 2015 Technology Focus Apps and End Point Security Key Benefits Supports 95% of current mobile devices Protects access to file system, networks

13

Benefits of a BYOD Approach Eliminates the cost and logistics of acquiring mobile devices

Expedites deployment of mobile surveys and start of data collection activities

Reduces training requirements for mobile platforms and devices

Improves the user experience and employee job satisfaction

Key Takeaways

3 March 2015

User

Acceptance

Comprehensive

Security

Enterprise

Control

Mobile Strategy Mobile Security Framework Operational Support Model

Mobile App Development Environment Data/App Wrapping

Enterprise App Catalog Virtual Private Network Authentication Method

Page 14: Bryan Padgett - Census.gov · 3 March 2015 Technology Focus Apps and End Point Security Key Benefits Supports 95% of current mobile devices Protects access to file system, networks

Bryan Padgett

Thank You

[email protected]

703.889.3839

@federalmobility