1 / 26

Multiple Device Authentication for the Cloud

Multiple Device Authentication for the Cloud. MSIT 458 11.17.12. Team G-Force: Jason, Veronica, Doug and Socrates. Multiple Device Authentication for the Cloud. Personal Ipad. Work Blackberry. Personal Dell Laptop circa 2011 with Windows 2010. Work Dell Laptop circa 2009

audi
Download Presentation

Multiple Device Authentication for the Cloud

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Multiple Device Authentication for the Cloud MSIT 458 11.17.12 Team G-Force: Jason, Veronica, Doug and Socrates

  2. Multiple Device Authentication for the Cloud Personal Ipad Work Blackberry Personal Dell Laptop circa 2011 with Windows 2010 Work Dell Laptop circa 2009 with Windows 2007 Trudy Work Desktop Personal IPhone Team: G Force

  3. When we started doing research for our project, we found that this scenario was taking place all over the world Team: G Force

  4. The Change of Mobile Devices in the Workplace • BS (before smartphones) • The promise of productivity improvements quickly spread • to the corporate world and employees were systematically • armed with cell phones and PCs. • Now employees could be contacted and work from anywhere • Blackberries were the only game in town • AS (after smartphones) • Corporations didn’t see the need to upgrade their employees to smartphones • So people brought their personal smartphone to the office • The smartphone was the new rock star • A paradigm shift is taking place BlackBerry 850 was the first BlackBerry device introduced in 1999.  Team: G Force

  5. At first IT turned a blind eye to the use of personal devices in • the workplace until the impact of this trend became to great to • ignore Paradigm Shift Takes Place Team: G Force

  6. Personal Routers Polluting NU Wireless Network • Northwestern students are coming to • campus more tech-savvy than ever • before and with more wireless-ready • devices. • Students setting up unauthorized • personal wireless routers and access • points in the Residence Halls are impacting wireless service. • “This is creating conflicts and service challenges for others using the Northwestern Wi-Fi network,” said Wendy Woodward, director of NUIT Technology Support Services. • “We strongly recommend that students access the Northwestern wireless network directly and contact the NUIT Support Center if they have questions or Team: G Force

  7. Introduction of BYOD • Instead of continuing to ignore the personal • devices that employees were bringing into the • workplace, a trend has began to emerge called: • BYOD: Bring Your Own Device • BYOT : Bring Your Own Technology • BYOD means that companies allow employees to use • their own personal devices in the workplace instead of • those issued by their company. • It is estimated that 90% of companies will offer BYOD • by 2014 Team: G Force

  8. The Benefits of BYOD Here are just a few benefits: • The biggest benefit of allowing • BYOD is employee satisfaction • Exposure to cutting edge technology • No more slow technology refresh • and upgrade cycles Team: G Force

  9. Problems with BYOD • Companies must think and plan before they jump on the BYOD bandwagon • The modification of corporate policy is the first thing to consider out before any changes • IT will need to be present! • Which devices will be permitted? • Will individuals have to take more responsibility • for trouble shooting and support • Who pays for the device? • What about the cloud? • There are many more considerations, • some of which will be covered later in • the presentation. Team: G Force

  10. Cloud Computing is the latest buzz word: • It sounds sexy, new and modern • It promises cost savings in a down economy • It brings its own privacy and security concerns • When considered in conjunction with BYOD there is much to discuss! Team: G Force

  11. Current: Old School… SSL User ID Password 11.17.12 Team: G Force

  12. Implementation Architecture TAC Client TAC Client TAC Gateway Team: G Force

  13. Gateway Architecture Team: G Force

  14. How does it work? • First Packet Authentication occurs BEFORE connection is established. Team: G Force

  15. How do we do it? Team: G Force

  16. Should we? Can our product allow us to compete with these companies? A more elegant solution : Authenticate the device before any data is transmitted! Team: G Force

  17. Security Risks • Acceptable use policy on personal devices is difficult to manage • Compliance mandates must still be followed (PCI, HIPAA, GLBA) if this data is accessed on BYOD • Incident detection & breaches • Securing corporate and personal data from malware and malicious apps • Shared device and auto-login * Good Technology State of BYOD Report, Jan 2011 Team: G Force

  18. Productivity Benefits • Benefits • Using BYOD can result in savings of up to $80 / mo / user* • Mobility yields higher productivity benefits * Good Technology State of BYOD Report, Jan 2011 Team: G Force

  19. Legal Risks Privacy & Liability Corporate device  Employers have 100% access to data per SCOTUS Personal device  Employers do not necessarily have access rights to data Medical information Personal pictures Your location Confidentiality + Trade Secrets Trade secrets are no longer secret on personal devices E-Discovery and electronic evidence Integrity – destruction of personal data via remote command Intellectual Property ownership Team: G Force

  20. Business Benefits Operating Expenses – no more data plans on income statement Capital Expenses – no more devices on income statement Fact: This is how people want to work Who wants to carry personal and work devices? Recruitment of young talent Increase of mobile productivity Team: G Force

  21. Solution that fits many different business segments “BlackRidge is thrilled to be working with Sypris Electronics on integrating our TAC technology within the Sypris key management framework,” - Bob Graham, Chairman and CEO of BlackRidge Technology. “We believe the combined solution will give government customers an unparalleled level of protection.” - Bob Graham, Chairman and CEO of BlackRidge Technology. Team: G Force

  22. How to manage personal devices in the enterprise… • Create Thy Policy Before Procuring Technology • Seek The Flocks’ Devices • Enrollment Shall Be Simple • Thou Shalt Configure Devices Over the Air • Thy Users Demand Self-Service • Hold Sacred Personal Information • Part the Seas of Corporate and Personal Data • Manage Thy Data Usage • Monitor Thy Flock—Herd Automatically • Drink from the Fountain of ROI By Rob Patey, art by Nathan Salla Team: G Force

  23. Multiple Device Authentication for the Cloud Back – Up Slides Team: G Force

  24. Trend in Mobile Device Ownership ~235,000,000 Team: G Force

  25. Demographics of Smartphone Owners

  26. Workplace Reality Team: G Force

More Related