Vulnerabilities / Threats // Insider Threats
6/10/2013
04:34 PM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Endpoint Data Protection: Tablet Trouble

Backup managers should look at bringing endpoint protection in-house and using it to protect tablets.

The Bring Your Own Device (BYOD) trend has made the IT department more popular with users -- but it has brought new challenges. Many of these challenges center on the fact that the device being brought in is increasingly not a laptop but a tablet. These tablets are no longer just consumption devices, they are creation devices (just look at the number of keyboard options for an iPad) and that means they have unique data on them that needs to be protected.

It is easy to assume that protection of these devices can be handled by the often-included file synchronization capabilities. In fairness, these utilities meet a lot of the data protection basics and a user should be able to recover accidentally deleted or overwritten files with them as well as replace a lost or stolen device. But all of this happens outside of corporate governance and counts on the user to know the ins and outs of their products.

At a minimum, this means that data impacting the organization is being created and modified but not under the organization's best practices for data protection and retention. As a worst case, IT may be asked to help recover files for a user that they are not familiar with, forcing them to learn multiple sync interfaces. Finally, most synchronization tools don't keep data forever and if they do it is a premium feature that most users don't purchase.

[ Considering a new storage system? Read Software-Defined Storage Vs. Traditional Storage Systems. ]

Backup managers should look at bringing endpoint protection in-house and not count on built in file synchronization to do the job. This endpoint protection most certainly needs to be expanded to the protection of tablets. While tablets are largely being ignored by traditional backup applications, a few have emerged that provide excellent protection of post-PC devices.

These applications include the capability to provide both file-sync and file-share capabilities as well as device backup and data retention. A few even include advanced capabilities like content search to aide in data compliance and remote wipe to protect corporate data from being lost or stolen.

While robust endpoint data protection may require the use of a standalone application, these applications are relatively easy for IT to operate and certainly easier than learning how to protect each individual device with its own utilities. More importantly a corporate device protection policy will allow the organization to protect and retain its data.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AG4IT
50%
50%
AG4IT,
User Rank: Apprentice
6/13/2013 | 2:41:14 PM
re: Endpoint Data Protection: Tablet Trouble
One approach to minimizing the data protection challenge of tablet use in BYOD is to separate the data and applications from the personal devices. This can be achieved by using virtualization and cloud technologies to publish corporate Windows applications or virtual desktops and accessing them from a browser.

One solution that facilitates this approach is Ericom AccessNow. AccessNow is an HTML5 RDP client that enables any device (including iPads, iPhones and Android devices) with an HTML5-compatible browser to access Windows applications and virtual desktops.

There's nothing to install on the end user device. Users simply click on a URL and run their applications and desktops inside a browser tab. This improves security by keeping sensitive applications and data in the data center, while reducing support issues, as IT staff don't need to worry about device compatibility with corporate applications.

There are many approaches to managing BYOD. This white paper - "BYOD is Here to Stay, But Organizations Must Adapt" - discusses some of these approaches:
http://www.ericom.com/wp-byod....

Please note that I work for Ericom
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web