Chapter 12 - 05 - Enterprise Mobile Security Management Solutions PDF

Summary

This chapter discusses and implements solutions for enterprise-level mobile security management. It covers critical topics including mobile device management (MDM), mobile application management (MAM), mobile threat management (MTM), and their role in securing corporate data.

Full Transcript

Certified Cybersecurity Technician Exam 212-82 Mobile Device Security Enterprise Mobility Management Solutions < Enterprise mobility management (EM...

Certified Cybersecurity Technician Exam 212-82 Mobile Device Security Enterprise Mobility Management Solutions < Enterprise mobility management (EMM) is aa comprehensive ManageEngine ManageEngine Mobile Mobile Device Device Manager Manager Plus Plus Q solution for MDM, MAM, MTM, MCM, and MEM https:// https:// geengine.com ine.com 42Gears Enterprise Mobility Management e (EMM) Mobile Email Mobile Device https://www.42gears.com Mobile Email R Management Management (MEM) (Mmbm) (MDM) (MEM) P Scalefusion EMM Enterprise https://scalefusion.com Mobility Mobile Content Management M';:lle ?":e:'t Mobile Threat Mobile Threat Management (EMM) "';B ':: A (McMm) (Mcm) Solution Management (MTM) (MTM™) -~ IBM Security MaaS360® https://www.ibm.com https://www.ibm.com Mobile Application Management M.“";:::;m i Zebra Enterprise Mobility Management (MAM) O ©)) (EMM) Tool Kit (EMM) Tool Kit https://www.zebra.com IL. All Rights Reserved. ReproductionisIs Strictly Prohibited, Prohibited. Enterprise Mobility Management Mlanagement Solutions Enterprise mobility management (EMM) is a comprehensive solution responsible for MDM, MAM, MTM, MCM, and MEM. It safeguards the enterprise data accessed and used by employee mobile devices. Mobile Device Mobile Email Management Management (MDM) (MEM) Enterprise Mobility Mobile Content Management Mobile Threat Management (EMM) Management (Mcm) (McM) Solution (MTM) Mobile Application Management (MAM) Figure 12.7: Enterprise Mobility Management Solution Specifically, EMM is responsible for: = Device management to provide the foundation for EMM solutions by o Enabling automatic device configuration o Allowing employees to be productive on the mobile devices they like to use Module 12 Page 1531 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Mobile Device Security o Wiping enterprise data from mobile devices selectively without interfering with personal data o Securing and managing mobile devices across multiple OSes (Android, iOS, macOS, and Windows 10) Content management o Encrypt email attachments o Establish DLP controls to secure corporate content o Secure corporate data distribution to mobile devices by applying content level policies (e.g., device-independent encryption keys, authentication, and file sharing) Application management o Protect applications on any device o Create and manage an enterprise app store o Provide authentication for end users on the device o Separate business and personal apps on mobile devices o User and identity management Mobile threat management o Protect organizations and their employees from threats on iOS and Android mobiles using different security technologies MEM o Provide security to the corporate email infrastructure and data on mobile devices Examples of EMM Solutions: ManageEngine Mobile Device Manager Plus (https.//www.manageengine.com) 42Gears Enterprise Mobility Management (EMM) (https://www.42gears.com) Scalefusion EMM (https://scalefusion.com) IBM Security MaaS360® (https.//www.ibm.com) Zebra Enterprise Mobility Management (EMM) Tool Kit (https://www.zebra.com) Module 12 Page 1532 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Technician Exam 212-82 Mobile Device Security Mobile Unified Endpoint Management Solutions v U Mobileiron UEM Unified endpoint management (UEM) solutions ensure remote https://www.mobileiron.com bttps=//srerwmoblleiron.com g provisioning, managing, controlling, and securing Internet-enabled devices from a single interface lfll |fl| Ivanti Unified Endpoint Manager https://www.ivanti.com Features of UEM » Remote, manual, or automatic pushing of updates ] Workspace ONE Y Workspace ONE https://www.vmware.com > Configuration for on-device security policies Ry v——— Y » Supporting employee-owned devices : Y. : : ManageEngine Desktop Central » Erasing Erasing the the data data of of lost lost or or stolen stolen devices devices remotely remotely B 8 ManageEngine i S s Desktope Central Y https://www.manogeengine.com » Tracking device Tracking device usage usage Y » Threat detection and mitigation i fl 42Gears UEM UEM Y 42Gears > API framework for custom applications : https://www.a2gears.com https://www.a2geors.com Y Unified Endpoint Management Solutions Unified endpoint management (UEM) solutions help in managing and controlling Internet- enabled mobile devices, desktops, applications, and content across the organization from a single interface. It provides security, management, and provisioning of mobile devices. UEM solutions address the problems of IT managers by extending MDM and EMM solutions. Features and Capabilities of UEM UEM solutions handle the unique security requirements in mobile enterprises by providing: App containerization Multi-OS environment Closed-loop automation features Certificate-based identity management Security for enterprise email, apps, and content Self-service features to simplify IT management DLP features to define open-in and copy/paste functions Help users maintain compliance with the corporate policies Secure multi-user profiles to securely allow users to share a single device Highly effective security measures that are invisible to the end users Per-app VPN technology that provides corporate network access to authorized apps only Page 1533 Module 12 Page 1533 EG-Council Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights All Rights Reserved. Reserved. Reproduction Reproduction isis Strictly Strictly Prohibited. Prohibited. Certified Cybersecurity Technician Exam 212-82 Mobile Device Security Allow users to find and install critical enterprise apps (corporate email, calendar, etc.) Separate and manage highly sensitive personal and corporate data on mobile devices. Remote, manual, or automatic pushing of updates Configuration for on-device security policies Supporting employee-owned devices Erasing the data of lost or stolen devices remotely Tracking device usage Threat detection and mitigation API framework for custom applications UEM Components The key components that define the attributes of UEM solutions are: CMT CMT provides IT infrastructure to ensure the efficient working of mobile enterprises while enhancing the service to end users. MDM MDM provides a foundation for UEM solutions by allowing the IT team to o Secure corporate email o Certificate-based security o Automatic device configuration o Allow employees to be productive on the mobile devices they like to use o Wipe enterprise data from mobile devices selectively without interfering with personal data o Secure and manage mobile devices across multiple OSes (Android, iOS, macOS, and Windows 10) MAM MAM provides IT infrastructure to o Protect applications on any device o Create and manage an enterprise app store o Provide authentication for end users on a device o Separate business and personal apps on mobile devices Module 12 Page 1534 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Mobile Device Security = MCM MCM provides IT infrastructure to o Encrypt email attachments o Establish DLP controls to secure corporate content o Secure corporate data distribution to mobile devices by applying content level policies (device-independent encryption keys, authentication, and file sharing) Examples of UEM Solutions for Mobile Engagement: = Mobileiron UEM (https://www.mobileiron.com) = |vanti Unified Endpoint Manager (https://www.ivanti.com) = Workspace ONE UEM (https://www.vmware.com) = ManageEngine Desktop Central (https://www.manageengine.com) » 42Gears UEM (https://www.42gears.com) Module 12 Page 1535 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser