multiple device authentication for the cloud

26
Team G-Force: Jason, Veronica, Doug and Socrates Multiple Device Authentication for the Cloud MSIT 458 11.17.12

Upload: audi

Post on 13-Feb-2016

66 views

Category:

Documents


0 download

DESCRIPTION

Multiple Device Authentication for the Cloud. MSIT 458 11.17.12. Team G-Force: Jason, Veronica, Doug and Socrates. Multiple Device Authentication for the Cloud. Personal Ipad. Work Blackberry. Personal Dell Laptop circa 2011 with Windows 2010. Work Dell Laptop circa 2009 - PowerPoint PPT Presentation

TRANSCRIPT

Team G-Force: Jason, Veronica, Doug and Socrates

Multiple Device Authentication for the CloudMSIT 45811.17.12

11.17.12 2Team: G Force

Multiple Device Authentication for the Cloud

Trudy

WorkBlackberry

Personal IPhone

WorkDesktop

Personal Ipad

Personal Dell Laptop circa 2011

with Windows 2010

Work Dell Laptop circa 2009

with Windows 2007

11.17.12 3Team: G Force

When we started doing research for our project, we found that this scenario was taking place all over the world

11.17.12 4Team: G Force

The Change of Mobile Devices in the WorkplaceBS (before smartphones)The promise of productivity improvements quickly spread to the corporate world and employees were systematically armed with cell phones and PCs.Now employees could be contacted and work from anywhere Blackberries were the only game in town

AS (after smartphones)Corporations didn’t see the need to upgrade their employees to smartphonesSo people brought their personal smartphone to the office The smartphone was the new rock starA paradigm shift is taking place

BlackBerry 850 was the first BlackBerry device introduced in 1999.

Paradigm Shift Takes Place

11.17.12 5Team: G Force

At first IT turned a blind eye to the use of personal devices in the workplace until the impact of this trend became to great to ignore

11.17.12 6Team: G Force

Personal Routers Polluting NU Wireless Network

Northwestern students are coming tocampus more tech-savvy than ever before and with more wireless-ready devices.

Students setting up unauthorized personal wireless routers and access points in the Residence Halls are impacting wireless service.

“This is creating conflicts and service challenges for others using the Northwestern Wi-Fi network,” said Wendy Woodward, director of NUIT Technology Support Services. “We strongly recommend that students access the Northwestern wireless network directly and contact the NUIT Support Center if they have questions or

11.17.12 7Team: G Force

Instead of continuing to ignore the personal devices that employees were bringing into the workplace, a trend has began to emerge called:o BYOD: Bring Your Own Deviceo BYOT : Bring Your Own Technology

BYOD means that companies allow employees to use their own personal devices in the workplace instead of those issued by their company.

It is estimated that 90% of companies will offer BYOD by 2014

Introduction of BYOD

11.17.12 8Team: G Force

The Benefits of BYOD

The biggest benefit of allowing BYOD is employee satisfaction

Exposure to cutting edge technology

No more slow technology refresh and upgrade cycles

Here are just a few benefits:

11.17.12 9Team: G Force

Problems with BYODCompanies must think and plan before they jump on the BYOD bandwagonThe modification of corporate policy is the first thing to consider out before any changes• IT will need to be present! • Which devices will be permitted?• Will individuals have to take more responsibility

for trouble shooting and support• Who pays for the device?• What about the cloud?

There are many more considerations, some of which will be covered later in the presentation.

11.17.12 10Team: G Force

Cloud Computing is the latest buzz word:It sounds sexy, new and modernIt promises cost savings in a down economyIt brings its own privacy and security concernsWhen considered in conjunction with BYOD there is much to discuss!

Current: Old School…

User IDPassword SSL

11.17.12 Team: G Force

11.17.12 12Team: G Force

Implementation ArchitectureTAC Client

TAC Client

TAC Gateway

Gateway Architecture

11.17.12 13Team: G Force

How does it work?

11.17.12 14Team: G Force

First Packet Authentication occurs BEFORE connection is established.

How do we do it?

11.17.12 15Team: G Force

11.17.12 16Team: G Force

A more elegant solution : Authenticate the device before any data is transmitted!

Can our product allow us to compete with these companies?

Should we?

11.17.12 17Team: G Force

– Acceptable use policy on personal devices is difficult to manage

– Compliance mandates must still be followed (PCI, HIPAA, GLBA) if this data is accessed on BYOD• Incident detection & breaches

– Securing corporate and personal data from malware and malicious apps

– Shared device and auto-login

* Good Technology State of BYOD Report, Jan 2011

Security Risks

11.17.12 18Team: G Force

Productivity BenefitsBenefits Using BYOD can result in savings of up to $80 / mo / user* Mobility yields higher productivity benefits

Type of Worker Activity Value

Executive Collaboration $1,300

Field Sales Customer Face Time $700

Knowledge Worker Productivity $300

* Good Technology State of BYOD Report, Jan 2011

11.17.12 19Team: G Force

Legal Risks

Privacy & LiabilityCorporate device Employers have 100% access to data per SCOTUSPersonal device Employers do not necessarily have access rights to data

Medical informationPersonal picturesYour location

Confidentiality + Trade SecretsTrade secrets are no longer secret on personal devices

E-Discovery and electronic evidenceIntegrity – destruction of personal data via remote commandIntellectual Property ownership

11.17.12 20Team: G Force

Business Benefits Operating Expenses – no more data plans on income statement

Capital Expenses – no more devices on income statementFact: This is how people want to work

Who wants to carry personal and work devices?Recruitment of young talentIncrease of mobile productivity

11.17.12 21Team: G Force

Solution that fits many different business segments

“BlackRidge is thrilled to be working with Sypris Electronics on integrating our TAC technology within the Sypris key management framework,”

- Bob Graham, Chairman and CEO of BlackRidge Technology.

“We believe the combined solution will give government customers an unparalleled level of protection.”

- Bob Graham, Chairman and CEO of BlackRidge Technology.

11.17.12 22Team: G Force

How to manage personal devices in the enterprise…

1. Create Thy Policy Before Procuring Technology2. Seek The Flocks’ Devices3. Enrollment Shall Be Simple4. Thou Shalt Configure Devices Over the Air5. Thy Users Demand Self-Service6. Hold Sacred Personal Information7. Part the Seas of Corporate and Personal Data8. Manage Thy Data Usage9. Monitor Thy Flock—Herd Automatically10. Drink from the Fountain of ROI

By Rob Patey, art by Nathan Salla

11.17.12 23Team: G Force

Back – UpSlides

Multiple Device Authentication for the Cloud

Trend in Mobile Device Ownership

11.17.12 24Team: G Force

~235,000,000

11.17.12 25

Demographics of Smartphone Owners

11.17.12 26Team: G Force

Workplace Reality