Threat Level: green Handler on Duty: Chris Mohan

SANS ISC Internet Storm Center


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Latest Diaries

ISC StormCast for Monday, July 28th 2014 http://isc.sans.edu/podcastdetail.html?id=4079

Management and Control of Mobile Device Security

Published: 2014-07-28
Last Updated: 2014-07-28 01:14:06 UTC
by Guy Bruneau (Version: 1)
0 comment(s)

When we talk about mobile devices, all boundaries are gone. Depending where you work, it is likely that your mobile device (phone or tablet) has access to all the corporate data via wireless, in some case with very little restrictions.

Two points to take in consideration:

- Defining access control: Create one access policy that is applied and control all networks (wireless, VPN, wired)
- Use Mobile Device Management (MDM): Provide the ability to separate data from personal and company-owned assets with approved security controls for any devices whether they are company owned or personal.

These changes should provide greater network visibility allowing your organization to discover devices, measure bandwidth utilization, enforce policies, analyze traffic patterns to monitor for anomalous activity that can drain resources.

We would like to hear from you, what is your organization currently doing to manage mobile devices in your network?

-----------

Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot edu

0 comment(s)

If you have more information or corrections regarding our diary, please share.

Recent Diaries

"Internet scanning project" scans
published 2 days ago by Chris (2 comments)

Windows Previous Versions against ransomware
published 4 days ago by Bojan (4 comments)

New Feature: "Live" SSH Brute Force Logs and New Kippo Client
published 5 days ago by Dr. J. (9 comments)

WordPress brute force attack via wp.getUsersBlogs
published 5 days ago by Daniel (4 comments)

App "telemetry"
published 6 days ago by Daniel (7 comments)

Ivan's Order of Magnitude
published 6 days ago by Daniel (1 comment)

OWASP Zed Attack Proxy
published 6 days ago by Adrien de Beaupre (1 comment)

View All Diaries →

Latest Discussions

DSHIELD with fail2ban
created 2 weeks ago by Ernest (0 replies)

Router Upgrade
created 2 weeks ago by ICI2Eye (2 replies)

ENDPOINT SERVICE DEFINITIONS (TCP/UDP)
created 2 weeks ago by Ratatosk (1 reply)

Router- FW Upgrade
created 3 weeks ago by ICI2Eye (0 replies)

Malware infected ATMs in China via specialized device
created 3 weeks ago by Safensoft (0 replies)

View All Forums →

Latest News

View All News →