Enterprise Security and Android Platform Webinar

Views:
 
     
 

Presentation Description

Data and transaction security has become of paramount importance with increase in mobile application usage in enterprises. The challenges of the security issues faced have become a top priority in every enterprise. Businesses and IT departments are experiencing employees opting for Android phones as corporate communication tools over other Smartphone as they offer powerful apps and innovative hardware specs.

Comments

Presentation Transcript

Enterprise Security and Android Platform:

Enterprise Security and Android Platform Presented by Technology Consulting Group Endeavour Software Technologies 1

Slide 2:

Overview of Mobility and Mobile Security Introduction to Mobility Mobile Security Best Practices for Secure Software Development Android OS Security Architecture and deployment Android Attack Surfaces Enterprise features, What can we leverage ? Questions? Session Contents 2

Slide 3:

What is Mobility A Capability Communicate and Access On the Move Anytime From Anywhere Voice, Messages, Data Enterprise Mobility The ability of an enterprise to connect to people and control assets from any location . Technologies that support enterprise mobility include wireless networks, mobile applications, middleware, devices, and security and management software. Forrester Research Definition 3

Slide 4:

What is happening in the Corporate World? 4

Slide 5:

Mobile Security – Everywhere! 5

Slide 6:

Security Considerations for Enterprise Mobility Mobility Infrastructure Security is a key focus area. Ensuring existing policies is implemented Integration with existing tools, systems Keep devices light, manageable Mobile Middleware Platform Composite Applications Landscape and devices Mobile Device Management Mobile Data Synchronization Phased approach for Common Services and Mobile Applications Mobile Applications Distribution Enterprise distribution through OTA to specific devices 6

Slide 7:

Application Security – Must Include 7

Slide 8:

Enterprise Mobile Security – Do’s 8

Slide 9:

Protect the Brand Your Customers Trust Know Your Business and Support it with Secure Solutions Understand the Technology of the Software Ensure Compliance to Governance, Regulations, and Privacy Design, Develop and Deploy Software with Secure Features Enterprise Mobile Security – Best Practices 9

Slide 10:

Android Security Architecture 10

Slide 11:

Permission-based Model Linux + Android’s Permissio n Well defined at system level Approved by user at install High-level permissions restricted by Android runtime framework For example, an application that needs to monitor incoming SMS messages would specify <manifest xmlns:android="http://schemas.android.com/apk/res/android" package="com.android.app.myapp" > < uses-permission android:name="android.permission. RECEIVE_SMS " /> ...</ manifest> Android Security – Permission based model 11

Slide 12:

Remote Install/removal Google can remove or install apps remotely Users can install apps remotely from online Android Market http://market.android.com Android Security – Remote App Management 12

Slide 13:

Android Security - Sandbox 13

Slide 14:

Isolated applications is like having multi-user system Single UI/ Device  Secure sharing of UI and IO Appeals to user for all security decisions Phishing style attach risks Its not Java sandbox, its Linux sandbox. Native code not a barrier Any java App can execute shell, load JNI libraries, write and exec programs Reference – iSEC PARTNERS Android’s Attack Surfaces 14

Slide 15:

Remote wipe Remotely reset the device to factory defaults Improved security Addition of numeric pin, alphanumeric passwords to unlock the device Exchange calendars Auto-discovery Global Address List look-up Enterprise features (Froyo/ GingerBread) 15

Slide 16:

Enterprise features (Honeycomb) New device administration policies Encrypted storage Password expiration Password history Complex characters in password Configure HTTP proxy for each connected WiFi access point (AOS 3.1 only) Encrypted storage cards 16

Slide 17:

Questions ? 17

Thank You:

Thank You 18

authorStream Live Help