260 likes | 409 Views
Multiple Device Authentication for the Cloud. MSIT 458 11.17.12. Team G-Force: Jason, Veronica, Doug and Socrates. Multiple Device Authentication for the Cloud. Personal Ipad. Work Blackberry. Personal Dell Laptop circa 2011 with Windows 2010. Work Dell Laptop circa 2009
E N D
Multiple Device Authentication for the Cloud MSIT 458 11.17.12 Team G-Force: Jason, Veronica, Doug and Socrates
Multiple Device Authentication for the Cloud Personal Ipad Work Blackberry Personal Dell Laptop circa 2011 with Windows 2010 Work Dell Laptop circa 2009 with Windows 2007 Trudy Work Desktop Personal IPhone Team: G Force
When we started doing research for our project, we found that this scenario was taking place all over the world Team: G Force
The Change of Mobile Devices in the Workplace • BS (before smartphones) • The promise of productivity improvements quickly spread • to the corporate world and employees were systematically • armed with cell phones and PCs. • Now employees could be contacted and work from anywhere • Blackberries were the only game in town • AS (after smartphones) • Corporations didn’t see the need to upgrade their employees to smartphones • So people brought their personal smartphone to the office • The smartphone was the new rock star • A paradigm shift is taking place BlackBerry 850 was the first BlackBerry device introduced in 1999. Team: G Force
At first IT turned a blind eye to the use of personal devices in • the workplace until the impact of this trend became to great to • ignore Paradigm Shift Takes Place Team: G Force
Personal Routers Polluting NU Wireless Network • Northwestern students are coming to • campus more tech-savvy than ever • before and with more wireless-ready • devices. • Students setting up unauthorized • personal wireless routers and access • points in the Residence Halls are impacting wireless service. • “This is creating conflicts and service challenges for others using the Northwestern Wi-Fi network,” said Wendy Woodward, director of NUIT Technology Support Services. • “We strongly recommend that students access the Northwestern wireless network directly and contact the NUIT Support Center if they have questions or Team: G Force
Introduction of BYOD • Instead of continuing to ignore the personal • devices that employees were bringing into the • workplace, a trend has began to emerge called: • BYOD: Bring Your Own Device • BYOT : Bring Your Own Technology • BYOD means that companies allow employees to use • their own personal devices in the workplace instead of • those issued by their company. • It is estimated that 90% of companies will offer BYOD • by 2014 Team: G Force
The Benefits of BYOD Here are just a few benefits: • The biggest benefit of allowing • BYOD is employee satisfaction • Exposure to cutting edge technology • No more slow technology refresh • and upgrade cycles Team: G Force
Problems with BYOD • Companies must think and plan before they jump on the BYOD bandwagon • The modification of corporate policy is the first thing to consider out before any changes • IT will need to be present! • Which devices will be permitted? • Will individuals have to take more responsibility • for trouble shooting and support • Who pays for the device? • What about the cloud? • There are many more considerations, • some of which will be covered later in • the presentation. Team: G Force
Cloud Computing is the latest buzz word: • It sounds sexy, new and modern • It promises cost savings in a down economy • It brings its own privacy and security concerns • When considered in conjunction with BYOD there is much to discuss! Team: G Force
Current: Old School… SSL User ID Password 11.17.12 Team: G Force
Implementation Architecture TAC Client TAC Client TAC Gateway Team: G Force
Gateway Architecture Team: G Force
How does it work? • First Packet Authentication occurs BEFORE connection is established. Team: G Force
How do we do it? Team: G Force
Should we? Can our product allow us to compete with these companies? A more elegant solution : Authenticate the device before any data is transmitted! Team: G Force
Security Risks • Acceptable use policy on personal devices is difficult to manage • Compliance mandates must still be followed (PCI, HIPAA, GLBA) if this data is accessed on BYOD • Incident detection & breaches • Securing corporate and personal data from malware and malicious apps • Shared device and auto-login * Good Technology State of BYOD Report, Jan 2011 Team: G Force
Productivity Benefits • Benefits • Using BYOD can result in savings of up to $80 / mo / user* • Mobility yields higher productivity benefits * Good Technology State of BYOD Report, Jan 2011 Team: G Force
Legal Risks Privacy & Liability Corporate device Employers have 100% access to data per SCOTUS Personal device Employers do not necessarily have access rights to data Medical information Personal pictures Your location Confidentiality + Trade Secrets Trade secrets are no longer secret on personal devices E-Discovery and electronic evidence Integrity – destruction of personal data via remote command Intellectual Property ownership Team: G Force
Business Benefits Operating Expenses – no more data plans on income statement Capital Expenses – no more devices on income statement Fact: This is how people want to work Who wants to carry personal and work devices? Recruitment of young talent Increase of mobile productivity Team: G Force
Solution that fits many different business segments “BlackRidge is thrilled to be working with Sypris Electronics on integrating our TAC technology within the Sypris key management framework,” - Bob Graham, Chairman and CEO of BlackRidge Technology. “We believe the combined solution will give government customers an unparalleled level of protection.” - Bob Graham, Chairman and CEO of BlackRidge Technology. Team: G Force
How to manage personal devices in the enterprise… • Create Thy Policy Before Procuring Technology • Seek The Flocks’ Devices • Enrollment Shall Be Simple • Thou Shalt Configure Devices Over the Air • Thy Users Demand Self-Service • Hold Sacred Personal Information • Part the Seas of Corporate and Personal Data • Manage Thy Data Usage • Monitor Thy Flock—Herd Automatically • Drink from the Fountain of ROI By Rob Patey, art by Nathan Salla Team: G Force
Multiple Device Authentication for the Cloud Back – Up Slides Team: G Force
Trend in Mobile Device Ownership ~235,000,000 Team: G Force
Workplace Reality Team: G Force