Enterprise Security and Android Platform Webinar

Information about Enterprise Security and Android Platform Webinar

Published on September 7, 2011

Author: est_rahul

Source: authorstream.com

Content

Enterprise Security and Android Platform: Enterprise Security and Android Platform Presented by Technology Consulting Group Endeavour Software Technologies 1 Slide 2: Overview of Mobility and Mobile Security Introduction to Mobility Mobile Security Best Practices for Secure Software Development Android OS Security Architecture and deployment Android Attack Surfaces Enterprise features, What can we leverage ? Questions? Session Contents 2 Slide 3: What is Mobility A Capability Communicate and Access On the Move Anytime From Anywhere Voice, Messages, Data Enterprise Mobility The ability of an enterprise to connect to people and control assets from any location . Technologies that support enterprise mobility include wireless networks, mobile applications, middleware, devices, and security and management software. Forrester Research Definition 3 Slide 4: What is happening in the Corporate World? 4 Slide 5: Mobile Security – Everywhere! 5 Slide 6: Security Considerations for Enterprise Mobility Mobility Infrastructure Security is a key focus area. Ensuring existing policies is implemented Integration with existing tools, systems Keep devices light, manageable Mobile Middleware Platform Composite Applications Landscape and devices Mobile Device Management Mobile Data Synchronization Phased approach for Common Services and Mobile Applications Mobile Applications Distribution Enterprise distribution through OTA to specific devices 6 Slide 7: Application Security – Must Include 7 Slide 8: Enterprise Mobile Security – Do’s 8 Slide 9: Protect the Brand Your Customers Trust Know Your Business and Support it with Secure Solutions Understand the Technology of the Software Ensure Compliance to Governance, Regulations, and Privacy Design, Develop and Deploy Software with Secure Features Enterprise Mobile Security – Best Practices 9 Slide 10: Android Security Architecture 10 Slide 11: Permission-based Model Linux + Android’s Permissio n Well defined at system level Approved by user at install High-level permissions restricted by Android runtime framework For example, an application that needs to monitor incoming SMS messages would specify <manifest xmlns:android="http://schemas.android.com/apk/res/android" package="com.android.app.myapp" > < uses-permission android:name="android.permission. RECEIVE_SMS " /> ...</ manifest> Android Security – Permission based model 11 Slide 12: Remote Install/removal Google can remove or install apps remotely Users can install apps remotely from online Android Market http://market.android.com Android Security – Remote App Management 12 Slide 13: Android Security - Sandbox 13 Slide 14: Isolated applications is like having multi-user system Single UI/ Device  Secure sharing of UI and IO Appeals to user for all security decisions Phishing style attach risks Its not Java sandbox, its Linux sandbox. Native code not a barrier Any java App can execute shell, load JNI libraries, write and exec programs Reference – iSEC PARTNERS Android’s Attack Surfaces 14 Slide 15: Remote wipe Remotely reset the device to factory defaults Improved security Addition of numeric pin, alphanumeric passwords to unlock the device Exchange calendars Auto-discovery Global Address List look-up Enterprise features (Froyo/ GingerBread) 15 Slide 16: Enterprise features (Honeycomb) New device administration policies Encrypted storage Password expiration Password history Complex characters in password Configure HTTP proxy for each connected WiFi access point (AOS 3.1 only) Encrypted storage cards 16 Slide 17: Questions ? 17 Thank You: Thank You 18

Related presentations


Other presentations created by est_rahul

Mobility in Healthcare
26. 03. 2010
0 views

Mobility in Healthcare

iPhone App for Airliners
26. 03. 2010
0 views

iPhone App for Airliners