Page 28 - Mobile Data Loss
P. 28
22 Mobile Data Loss
3. Client certificate mutual authentication handshake fails
4. No per-App VPN tunnel is set up
5. No data communicated
6. Data breach is prevented
A secure mobile gateway also can support mobile-specific encrypted
protocols, such as per-App VPN over SSL/TLS. This was released in
iOS 7, and gained mass support across public apps in iOS 8 and iOS 9.
Supporting a VPN at the app-level allows the administrator to further
refine what apps can access the corporate network. In contrast, a VPN
typically allows all apps to access the network, including malicious
apps. A per-App VPN provides additional layers or security as well as
better efficiencies and ease-of-access for the user.
LOCKDOWNS AND RESTRICTIONS
Lockdown and restriction APIs have been available from device manu-
facturers for some time, and allow EMM solutions to leverage these
APIs to disable features. These include unwanted network services
(Bluetooth, IRDA, NFC, etc.), device level features (camera, screen-
shot, etc.), and a plethora of other lockdowns. These vary across the
different mobile operating systems.
Furthermore, many EMM solutions allow these to be applied to
manage mobile devices in different ways. For example, for a mobile
POS, unwanted services such as Bluetooth or NFC can be disabled to
avoid targeted attacks. But disabling these on BYOD devices may not
be desirable since users commonly use these services for Bluetooth head-
sets, NFC-based retail purchases, and more. It’s important to ensure
when implementing these controls to evaluate each of the use-cases and
perhaps different lockdown and restriction policies for each scenario.
LIVE MONITORING, AUDIT LOGS, EVENTS, AND REPORTING
EMM solutions provide inherent live monitoring of mobile devices. This
can be mobile device monitoring, device security posture monitoring,
network access monitoring, and more. Additionally, EMM can integrate
with SIEM, Big Data Analytic products, App Reputation, Mobile
Threat Prevention, Network Access Control, and proxy solutions. All of
these provide the ability for logging, alerting, correlation, and reporting.