Page 28 - Mobile Data Loss
P. 28

22    Mobile Data Loss


          3. Client certificate mutual authentication handshake fails
          4. No per-App VPN tunnel is set up
          5. No data communicated
          6. Data breach is prevented

             A secure mobile gateway also can support mobile-specific encrypted
          protocols, such as per-App VPN over SSL/TLS. This was released in
          iOS 7, and gained mass support across public apps in iOS 8 and iOS 9.
          Supporting a VPN at the app-level allows the administrator to further
          refine what apps can access the corporate network. In contrast, a VPN
          typically allows all apps to access the network, including malicious
          apps. A per-App VPN provides additional layers or security as well as
          better efficiencies and ease-of-access for the user.



          LOCKDOWNS AND RESTRICTIONS

          Lockdown and restriction APIs have been available from device manu-
          facturers for some time, and allow EMM solutions to leverage these
          APIs to disable features. These include unwanted network services
          (Bluetooth, IRDA, NFC, etc.), device level features (camera, screen-
          shot, etc.), and a plethora of other lockdowns. These vary across the
          different mobile operating systems.

             Furthermore, many EMM solutions allow these to be applied to
          manage mobile devices in different ways. For example, for a mobile
          POS, unwanted services such as Bluetooth or NFC can be disabled to
          avoid targeted attacks. But disabling these on BYOD devices may not
          be desirable since users commonly use these services for Bluetooth head-
          sets, NFC-based retail purchases, and more. It’s important to ensure
          when implementing these controls to evaluate each of the use-cases and
          perhaps different lockdown and restriction policies for each scenario.


          LIVE MONITORING, AUDIT LOGS, EVENTS, AND REPORTING

          EMM solutions provide inherent live monitoring of mobile devices. This
          can be mobile device monitoring, device security posture monitoring,
          network access monitoring, and more. Additionally, EMM can integrate
          with SIEM, Big Data Analytic products, App Reputation, Mobile
          Threat Prevention, Network Access Control, and proxy solutions. All of
          these provide the ability for logging, alerting, correlation, and reporting.
   23   24   25   26   27   28   29   30   31   32   33