Upload
amd-developer-central
View
375
Download
1
Tags:
Embed Size (px)
DESCRIPTION
Presentation SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell at the AMD Developer Summit (APU13) November 11-13, 2013.
Citation preview
Protec'ng Mobile Data
• Norman Shaw • CEO
• ExactTrak Ltd
Discussion points
• Why protec9ng mobile data is difficult ? • What is going wrong ? • What can be done ? • Address the differing needs of enterprise and consumer • Some innova9ve solu9ons • Maximise the commercial opportuni9es • A glimpse into the future
There are a lot of good solu'ons:
but s9ll there are problems
Polarised Target Markets
Enterprise
Consumer
Restricts freedom of use Not secure enough for enterprise
Just some of the problems
• 76% have lost a laptop, tablet or mobile with sensi9ve data • 84% use personal emails to send sensi9ve informa9on • 50% use public cloud services to send sensi9ve files • More than 30% have lost a USB drive containing confiden9al informa9on • 63% of IT managers lack visibility of mobile data within their organisa9on
Wall Street Journal Aug 2013 5000 interviews
and then there is ….
B Y O D
50% of firms with BYOD policies have had a security breach 32% do not have a BYOD contract 40% don’t password-‐protect their mobile devices 51% connect their devices to unsecured wireless networks 52% enable their “Bluetooth discoverable” mode. Dell survey 2013
ring
isaster
wn
our
Legal issues
• Who owns the data • Who has control • What are my rights • Rights to walk away
• Right to delete
Dele'ng data
1881 devices lost. 680 recovered Remote delete requests
Recovered % deleted
• iOS 317 43%
• Android 193 57%
• Blackberry 170 61%
What are we protec'ng?
Enterprise data Personal informa9on Hardware Reputa9ons
all of the above?
What are we protec'ng data from?
• Employees
• Stupidity • Ignorance • Loss • Thec • Fraud
Privacy
• We know what you are doing
• Who can see my files • Prism
Consumer vs. Enterprise
• Twin approach strategy
• Something for everyone
Obstacles to overcome
• Opera9ng system
• Updates cause problems
• Roo9ng
• Reset
What is needed
• Easy to use
• Addresses Enterprise and consumer needs
• Mul9 plaeorm
• Mul9 form factor
• Deployment Secure and Flexible
• Make the user part of the solu9on
Security Guardian
4 -‐64 GB memory Secure laptop Access GPS
Ba9ery
Data Delete Memory Switch Remote Control
EncrypBon
Management console
• Cloud based • Management & user interface • Loca9on via GPS, GSM & WiFi • Geozones • Timed access • OTA configura9on • Remote turn On and Off • Remote data destruct • Verifiable audit trail and repor9ng
Moving forward
GeJng on the Route of Trust
Trusted Execu9on Environment
A power train
The ExactTrak approach
Home Work
Enterprise Personal
Access privileges VPN Profiles Apps Email Files etc.
Ticking the boxes
• Route of Trust starts at power On • Opera9ng System independent • Total separa9on of work /personal informa9on • Individual keys to protect privacy
Commercial opportuni'es
How many products with TrustZone Sold as a service License Management Console licenses Corporate / Enterprise user licenses Consumer user licenses Upgrades depending on service / func9on White label, OEM and bespoke customisa9on Ac9va9on fee for ODM / OEM Partnership with exis9ng MDM service providers
300m and growing ?
Future
• Embedded GSM modem for any9me security
• Self provisioning SIM on chip • Informa9on Lifecycle Management • Remote Key Management • Wearable gadgets
Discussion points
• Why protec9ng mobile data is difficult ? • What is going wrong ? • What can be done ? • Address the differing needs of enterprise and consumer • Some innova9ve solu9ons • Maximise the commercial opportuni9es • A glimpse into the future