Chapter 12 - 05 - Mobile Security Management Solutions PDF
Document Details
Uploaded by barrejamesteacher
null
Tags
Related
- Mobile Device Management Concepts PDF
- Chapter 12 - 05 - Mobile Security Management Solutions PDF
- Mobile Device Security (Certified Cybersecurity Technician) Exam 212-82 PDF
- Mobile Content Management Solutions PDF
- Chapter 12 - 05 - Enterprise Mobile Security Management Solutions PDF
- EC Council Certified Cybersecurity Technician (CCT) Module 12-L PDF
Summary
This document details mobile security management solutions for enterprises. It explains various tools and solutions used to manage mobile devices, including MDM, MAM, MCM, MTD, MEM, and EMM. The solutions help manage mobile devices across an organization from a central location.
Full Transcript
Certified Cybersecurity Technician Exam 212-82 Mobile Device Security Module Flow...
Certified Cybersecurity Technician Exam 212-82 Mobile Device Security Module Flow Discuss Security Risks and c Understand Understand Various Various Mobile Mobile Guidelines Associated with Device Connection Methods Enterprises Mobile Usage Policies Discuss and Implement o e Discuss Mobile Device Enterprise-level Mobile Security Concepts Management Convepts Management Solutions | e | || | Discuss Co on Mobile Mo o Discuss and Implement General Discuss Common Mobile bile Security Guidelines and Best o Usage Policies in Entexprises sec urity o Securlty Guidielines and Best Practices on Mobile Platforms o Copyright © byby EC-({ L. All Rights Reserved. Reserved, ReproductionisIs Strictly Prohibited Discuss and Implement Enterprise-level Mobile Security Management Solutions To handle the mobile security challenges in enterprises, organizations are implementing various mobile security management solutions. Mobile management solutions help an organization to manage mobiles devices across the organization from a central location. The objective of this section is to explain the benefits of such mobile management tools and solutions. It describes mobile devices management tools such as MDM solutions, MAM solutions, mobile content management (MCM) solutions, mobile threat defense (MTD) solutions, mobile email management (MEM) solutions, enterprise mobility management (EMM) solutions, and unified endpoint management (UEM) solutions. Module 12 Page 1518 Certified Cybersecurity Technician Copyright © by EG-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Mobile Device Security = Mobile Device Management Solutions __ «oi _ «l BB H MDM Solution Deployment Mobile device management (MDM) solutions MDM MOM server's. are used to deploy, secure, monitor, and |: See——— """"""""“'“°"_> @ manage company and employee-owned devices iy\ i 3. o MOM Agent @* > On Premise §i - = B = : Network 0 Security professionals use the MDM server g Defender MOM Agent 0 management console to remotely configure i LS the MDM agents installed on the devices @ i On Cloud /Saas (] mom Agent MDM agent Mobile Device Management Solutions (Cont’d) Miradore... {t AirWatch QO Miradore helps ensure device and data security as well as data §| @ https://www.vmware.com compliance across an organization i e ST ~ '@© Microsoft Intune https://www.microsoft.com O =0=0 @ MOELE AANACLVENT ML MANACEVENT o : o @ IBM Maas$360 https://www.ibm.com https://www.ibm.com C ® WYY COMPAY COMPIAY Raul @ XenMobile https://www.citrix.com Absolute Manage MDM http://www.absolute.com Mobile Device Management Solutions Mobile device management (MDM) is gaining significant importance with the adoption of policies such as BYOD across organizations. The increase in different types of mobile devices such as smartphones, laptops, and tablets has made it difficult for enterprises to make policies and manage the devices securely. MDM is a policy that helps in managing devices carefully while reducing support costs, mitigating security risks, and reducing business discontinuity. Module 12 Page 1519 Certified Cybersecurity Technician Copyright © by EG-Gouncil EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Mobile Device Security Mobile device management (MDM) solutions are used to deploy, secure, monitor, and manage company and employee-owned devices. Network defenders use the MDM server management console to remotely configure the MDM agents installed on the devices. -9 MDM server's manageme nt console s - L IL On Premise L Defender g VOMAgent = On Cloud /Saa$ MDM Agent Figure 12.2: MDM solution deployment Features of MDM Solutions = Security Management = Device Configuration Management = Device Inventory and Tracking = QOver-the-Air Application Distribution = Enterprise Policy Management o Password Enforcement o Data Encryption Enforcement = Enterprise Network Integration = Remote Data Wipe = Blacklisting/Whitelisting Apps and Devices Mobile Device Management (MDM) Solutions = Miradore Source: https://www.miradore.com Miradore helps ensure device and data security as well as data compliance across an organization. It can easily encrypt all confidential data, separate business and personal use, enforce safe passcodes and screen locks, and prevent the use of unwanted applications. Module 12 Page 1520 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Mobile Device Security ' = Imiradore MY STUFF lydpnimanny iy Dashboard o Online stat [ d Ow ty MOBILE MANAGEMENT : : : Q Device locations ol Enrollmentsby month €3 Configuration profile deployments MY COMPANY SYSTEM ( Q) By operator network O Android versions O 08 versions | SEamssssamania EEStETmErET ) [ [t i aainazaa naiinassa ii | ] E——] - |EFsmETER ST TS == === EE=n == ] |i Figure 12.3: Screenshot of Miradore Following are some examples of additional MDM solutions: = AirWatch (https://www.vmware.com) * Microsoft Intune (https://www.microsoft.com) * |BM MaaS360 (https.//www.ibm.com) = XenMobile (https://www.citrix.com) XenMobile =* Absolute Manage MDM (http://www.absolute.com) Module 12 Page 1521 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Mobile Device Security Mobile Application Management Solutions Mobile application management (MAM) is a software or service that enables network > defenders to secure, manage, and distribute enterprise applications on employee mobile devices Restrict Lo G0O TRt Vit e 9i » " application access =z o ixational fl =]. Spplication access = : rganizational Organizational - fl u data 03« el License [ Po— A ) — N management Personal data —: n o @ — Employee Install/Uninstall G% 3%5 X3 X o— application remotely CG@( Copyright © by EC-£ cl AN Rights Reserved. Reprod All Reproduction is Strictly Prohibited Microsoft Intune Intune MAM is a suite of Intune management features that lets users ’ ’ mobile apps fownd repured seman Corteprn I hetps://www.micresoft hetps://www.microsoft.com com ‘/AppStafion‘s MAM ‘/AppStatlon's ‘/Scalefuslon Application v ManageEngine Mobile ‘/Aptlorit Enterprise Mobile Device ‘/Apriorit ‘/Appaloosa \/Appaloosa https:// bileiron.com https://www.mobileiron.com Manag Management t Device Manager Plus and Application Management https://www.oppalocsa.io https://www.oppoloosa.io https://scalefusion.com https://www.manogeengine.com https://www.manogeengine.com https://www.opriorit.com Copyright © by E All I Rights Rights Reserved. Reserved. Reproduction Reproduction isks Strictly Prohibited Mobile Application Management Solutions Mobile application management (MAM) software and services enable an organization to secure, manage, and distribute enterprise applications on user mobile devices, without interfering with personal apps and data. Enterprise Application Management allows removing the access to a particular application for employees who left the organization. MAM can be applied to company-owned mobile devices and BYOD. It also enables the separation of enterprise apps and data from personal content on the same device. Module 12 Page 1522 Certified Cybersecurity Technician Copyright © by EG-Bouncil EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Mobile Device Security Restrict