Vulnerabilities / Threats // Insider Threats
6/10/2013
04:34 PM
George Crump
George Crump
Commentary
50%
50%

Endpoint Data Protection: Tablet Trouble

Backup managers should look at bringing endpoint protection in-house and using it to protect tablets.

The Bring Your Own Device (BYOD) trend has made the IT department more popular with users -- but it has brought new challenges. Many of these challenges center on the fact that the device being brought in is increasingly not a laptop but a tablet. These tablets are no longer just consumption devices, they are creation devices (just look at the number of keyboard options for an iPad) and that means they have unique data on them that needs to be protected.

It is easy to assume that protection of these devices can be handled by the often-included file synchronization capabilities. In fairness, these utilities meet a lot of the data protection basics and a user should be able to recover accidentally deleted or overwritten files with them as well as replace a lost or stolen device. But all of this happens outside of corporate governance and counts on the user to know the ins and outs of their products.

At a minimum, this means that data impacting the organization is being created and modified but not under the organization's best practices for data protection and retention. As a worst case, IT may be asked to help recover files for a user that they are not familiar with, forcing them to learn multiple sync interfaces. Finally, most synchronization tools don't keep data forever and if they do it is a premium feature that most users don't purchase.

[ Considering a new storage system? Read Software-Defined Storage Vs. Traditional Storage Systems. ]

Backup managers should look at bringing endpoint protection in-house and not count on built in file synchronization to do the job. This endpoint protection most certainly needs to be expanded to the protection of tablets. While tablets are largely being ignored by traditional backup applications, a few have emerged that provide excellent protection of post-PC devices.

These applications include the capability to provide both file-sync and file-share capabilities as well as device backup and data retention. A few even include advanced capabilities like content search to aide in data compliance and remote wipe to protect corporate data from being lost or stolen.

While robust endpoint data protection may require the use of a standalone application, these applications are relatively easy for IT to operate and certainly easier than learning how to protect each individual device with its own utilities. More importantly a corporate device protection policy will allow the organization to protect and retain its data.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AG4IT
50%
50%
AG4IT,
User Rank: Apprentice
6/13/2013 | 2:41:14 PM
re: Endpoint Data Protection: Tablet Trouble
One approach to minimizing the data protection challenge of tablet use in BYOD is to separate the data and applications from the personal devices. This can be achieved by using virtualization and cloud technologies to publish corporate Windows applications or virtual desktops and accessing them from a browser.

One solution that facilitates this approach is Ericom AccessNow. AccessNow is an HTML5 RDP client that enables any device (including iPads, iPhones and Android devices) with an HTML5-compatible browser to access Windows applications and virtual desktops.

There's nothing to install on the end user device. Users simply click on a URL and run their applications and desktops inside a browser tab. This improves security by keeping sensitive applications and data in the data center, while reducing support issues, as IT staff don't need to worry about device compatibility with corporate applications.

There are many approaches to managing BYOD. This white paper - "BYOD is Here to Stay, But Organizations Must Adapt" - discusses some of these approaches:
http://www.ericom.com/wp-byod....

Please note that I work for Ericom
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-5084
Published: 2015-08-02
The Siemens SIMATIC WinCC Sm@rtClient and Sm@rtClient Lite applications before 01.00.01.00 for Android do not properly store passwords, which allows physically approximate attackers to obtain sensitive information via unspecified vectors.

CVE-2015-5352
Published: 2015-08-02
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time ...

CVE-2015-5537
Published: 2015-08-02
The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properly implement CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a different vulnerability than CVE-2014-3566.

CVE-2015-5600
Published: 2015-08-02
The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumptio...

CVE-2015-1009
Published: 2015-07-31
Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!