Vulnerabilities / Threats // Insider Threats
6/10/2013
04:34 PM
George Crump
George Crump
Commentary
50%
50%

Endpoint Data Protection: Tablet Trouble

Backup managers should look at bringing endpoint protection in-house and using it to protect tablets.

The Bring Your Own Device (BYOD) trend has made the IT department more popular with users -- but it has brought new challenges. Many of these challenges center on the fact that the device being brought in is increasingly not a laptop but a tablet. These tablets are no longer just consumption devices, they are creation devices (just look at the number of keyboard options for an iPad) and that means they have unique data on them that needs to be protected.

It is easy to assume that protection of these devices can be handled by the often-included file synchronization capabilities. In fairness, these utilities meet a lot of the data protection basics and a user should be able to recover accidentally deleted or overwritten files with them as well as replace a lost or stolen device. But all of this happens outside of corporate governance and counts on the user to know the ins and outs of their products.

At a minimum, this means that data impacting the organization is being created and modified but not under the organization's best practices for data protection and retention. As a worst case, IT may be asked to help recover files for a user that they are not familiar with, forcing them to learn multiple sync interfaces. Finally, most synchronization tools don't keep data forever and if they do it is a premium feature that most users don't purchase.

[ Considering a new storage system? Read Software-Defined Storage Vs. Traditional Storage Systems. ]

Backup managers should look at bringing endpoint protection in-house and not count on built in file synchronization to do the job. This endpoint protection most certainly needs to be expanded to the protection of tablets. While tablets are largely being ignored by traditional backup applications, a few have emerged that provide excellent protection of post-PC devices.

These applications include the capability to provide both file-sync and file-share capabilities as well as device backup and data retention. A few even include advanced capabilities like content search to aide in data compliance and remote wipe to protect corporate data from being lost or stolen.

While robust endpoint data protection may require the use of a standalone application, these applications are relatively easy for IT to operate and certainly easier than learning how to protect each individual device with its own utilities. More importantly a corporate device protection policy will allow the organization to protect and retain its data.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
AG4IT
50%
50%
AG4IT,
User Rank: Apprentice
6/13/2013 | 2:41:14 PM
re: Endpoint Data Protection: Tablet Trouble
One approach to minimizing the data protection challenge of tablet use in BYOD is to separate the data and applications from the personal devices. This can be achieved by using virtualization and cloud technologies to publish corporate Windows applications or virtual desktops and accessing them from a browser.

One solution that facilitates this approach is Ericom AccessNow. AccessNow is an HTML5 RDP client that enables any device (including iPads, iPhones and Android devices) with an HTML5-compatible browser to access Windows applications and virtual desktops.

There's nothing to install on the end user device. Users simply click on a URL and run their applications and desktops inside a browser tab. This improves security by keeping sensitive applications and data in the data center, while reducing support issues, as IT staff don't need to worry about device compatibility with corporate applications.

There are many approaches to managing BYOD. This white paper - "BYOD is Here to Stay, But Organizations Must Adapt" - discusses some of these approaches:
http://www.ericom.com/wp-byod....

Please note that I work for Ericom
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

CVE-2014-2716
Published: 2014-12-19
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.