Vulnerabilities / Threats // Insider Threats
6/10/2013
04:34 PM
George Crump
George Crump
Commentary
50%
50%

Endpoint Data Protection: Tablet Trouble

Backup managers should look at bringing endpoint protection in-house and using it to protect tablets.

The Bring Your Own Device (BYOD) trend has made the IT department more popular with users -- but it has brought new challenges. Many of these challenges center on the fact that the device being brought in is increasingly not a laptop but a tablet. These tablets are no longer just consumption devices, they are creation devices (just look at the number of keyboard options for an iPad) and that means they have unique data on them that needs to be protected.

It is easy to assume that protection of these devices can be handled by the often-included file synchronization capabilities. In fairness, these utilities meet a lot of the data protection basics and a user should be able to recover accidentally deleted or overwritten files with them as well as replace a lost or stolen device. But all of this happens outside of corporate governance and counts on the user to know the ins and outs of their products.

At a minimum, this means that data impacting the organization is being created and modified but not under the organization's best practices for data protection and retention. As a worst case, IT may be asked to help recover files for a user that they are not familiar with, forcing them to learn multiple sync interfaces. Finally, most synchronization tools don't keep data forever and if they do it is a premium feature that most users don't purchase.

[ Considering a new storage system? Read Software-Defined Storage Vs. Traditional Storage Systems. ]

Backup managers should look at bringing endpoint protection in-house and not count on built in file synchronization to do the job. This endpoint protection most certainly needs to be expanded to the protection of tablets. While tablets are largely being ignored by traditional backup applications, a few have emerged that provide excellent protection of post-PC devices.

These applications include the capability to provide both file-sync and file-share capabilities as well as device backup and data retention. A few even include advanced capabilities like content search to aide in data compliance and remote wipe to protect corporate data from being lost or stolen.

While robust endpoint data protection may require the use of a standalone application, these applications are relatively easy for IT to operate and certainly easier than learning how to protect each individual device with its own utilities. More importantly a corporate device protection policy will allow the organization to protect and retain its data.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AG4IT
50%
50%
AG4IT,
User Rank: Apprentice
6/13/2013 | 2:41:14 PM
re: Endpoint Data Protection: Tablet Trouble
One approach to minimizing the data protection challenge of tablet use in BYOD is to separate the data and applications from the personal devices. This can be achieved by using virtualization and cloud technologies to publish corporate Windows applications or virtual desktops and accessing them from a browser.

One solution that facilitates this approach is Ericom AccessNow. AccessNow is an HTML5 RDP client that enables any device (including iPads, iPhones and Android devices) with an HTML5-compatible browser to access Windows applications and virtual desktops.

There's nothing to install on the end user device. Users simply click on a URL and run their applications and desktops inside a browser tab. This improves security by keeping sensitive applications and data in the data center, while reducing support issues, as IT staff don't need to worry about device compatibility with corporate applications.

There are many approaches to managing BYOD. This white paper - "BYOD is Here to Stay, But Organizations Must Adapt" - discusses some of these approaches:
http://www.ericom.com/wp-byod....

Please note that I work for Ericom
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2037
Published: 2014-11-26
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.

CVE-2014-6609
Published: 2014-11-26
The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.

CVE-2014-6610
Published: 2014-11-26
Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dia...

CVE-2014-7141
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.

CVE-2014-7142
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (crash) via a crafted (1) ICMP or (2) ICMP6 packet size.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?