Chapter 12 - 05 - Mobile Security Management Solutions PDF
Document Details
Uploaded by barrejamesteacher
null
Tags
Related
- Mobile Device Management Concepts PDF
- Mobile Device Security (Certified Cybersecurity Technician) Exam 212-82 PDF
- Chapter 12 - 05 - Mobile Security Management Solutions PDF
- Mobile Content Management Solutions PDF
- Chapter 12 - 05 - Enterprise Mobile Security Management Solutions PDF
- EC Council Certified Cybersecurity Technician (CCT) Module 12-L PDF
Summary
This document discusses enterprise-level mobile security management solutions, covering various mobile security management tools and solutions. It explains the benefits of mobile management tools and solutions. It describes mobile devices management tools, such as MDM solutions, MAM solutions, and others.
Full Transcript
Certified Cybersecurity Technician Mobile Device Security Exam 212-82 Module Flow Discuss Security Risks and Guidelines Associated with Enterprises Mobile Usage Policies Understand Various Mobile Device Connection Methods o Discuss and Implement Enterprise-level Mobile Security Management Solutions...
Certified Cybersecurity Technician Mobile Device Security Exam 212-82 Module Flow Discuss Security Risks and Guidelines Associated with Enterprises Mobile Usage Policies Understand Various Mobile Device Connection Methods o Discuss and Implement Enterprise-level Mobile Security Management Solutions Discuss Mobile Device Management Concepts o Discuss Common Mobile Usage Policies in Entexprises Discuss and Implement General Security Guidelines and Best Practices on Mobile Platforms Copyright © by Discuss and Implement Management Solutions Enterprise-level EC-{ L. All Rights Reserved, Reproductionis Strictly Prohibited Mobile Security To handle the mobile security challenges in enterprises, organizations are implementing various mobile security management solutions. Mobile management solutions help an organization to manage mobiles devices across the organization from a central location. The objective of this section is to explain the benefits of such mobile management tools and solutions. It describes mobile devices management tools such as MDM solutions, MAM solutions, mobile content management (MCM) solutions, mobile threat defense (MTD) solutions, mobile email management (MEM) solutions, enterprise mobility management (EMM) solutions, and unified endpoint management (UEM) solutions. Module 12 Page 1518 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Mobile Device Security Exam 212-82 = Mobile Device Management Solutions _ «l B H Mobile device management (MDM) solutions. are used to deploy, secure, monitor, and manage company and employee-owned : MDM MOM server's """"""""“'“°"_> devices \ i 3 > i 0 Solution Deployment Security professionals use the MDM server management console to remotely configure the MDM agents installed on the devices i Defender On Premise = LS On Cloud /Saas (] mom agent Mobile Device Management Solutions (Cont’d) Miradore O... Miradore helps ensure device and data security as well as data compliance across an organization MOELE MANACEVENT Y COMPIAY Raul O =0=0 C { | i @ @ ® AirWatch https://www.vmware.com Microsoft Intune https://www.microsoft.com https://www.ibm.com XenMobile https://www.citrix.com Absolute Manage MDM http://www.absolute.com Mobile Device Management Solutions Mobile device management (MDM) is gaining significant importance with the adoption of policies such as BYOD across organizations. The increase in different types of mobile devices such as smartphones, laptops, and tablets has made it difficult for enterprises to make policies and manage the devices securely. MDM is a policy that helps in managing devices carefully while reducing support costs, mitigating security risks, and reducing business discontinuity. Module 12 Page 1519 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Mobile Device Security Mobile device management (MDM) solutions are used to deploy, secure, monitor, and manage company and employee-owned devices. Network defenders use the MDM server management console to remotely configure the MDM MDM server's manageme nt console agents installed on the devices. -9 - L s IL On Premise Defender L g = VOMAgent MDM Agent On Cloud /Saa$ Figure 12.2: MDM solution deployment Features of MDM Solutions = Security Management = Device Configuration Management = Device Inventory and Tracking = QOver-the-Air Application Distribution = Enterprise Policy Management o Password Enforcement o Data Encryption Enforcement = Enterprise Network Integration = Remote Data Wipe = Blacklisting/Whitelisting Apps and Devices Mobile Device Management (MDM) Solutions = Miradore Source: https://www.miradore.com Miradore helps ensure device and data security as well as data compliance across an organization. It can easily encrypt all confidential data, separate business and personal use, enforce applications. Module 12 Page 1520 safe passcodes and screen locks, and prevent the use of unwanted Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Mobile Device Security Exam 212-82 ' = Imiradore MY STUFF lydpnimanny Dashboard o Online stat [ MOBILE MANAGEMENT MY COMPANY d : Q ty : Device locations SYSTEM Ow ol Enrollmentsby month O Android versions : €3 Configuration profile deployments O 08 versions ( Q) By operator network | SEamssssamania |ST EE=n ) [ naiinassa i | E——] == ] i Figure 12.3: Screenshot of Miradore Following are some examples of additional MDM solutions: = * AirWatch (https://www.vmware.com) Microsoft Intune (https://www.microsoft.com) * |BM MaaS360 (https.//www.ibm.com) = XenMobile (https://www.citrix.com) * Absolute Manage MDM (http://www.absolute.com) Module 12 Page 1521 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Mobile Device Security Mobile Application Management Solutions Mobile application management (MAM) is a software or service that enables network defenders to secure, manage, and distribute enterprise applications on employee mobile devices Restrict application access G0 Vit =z el o : [ management i Po— A ixational rganizational data ) — Install/Uninstall 03« N Personal data —: application remotely " fl - n G 5 3 X o @ — Employee o— Copyright © by Microsoft EC-£ cl AN Rights Reserved. Reproduction is Strictly Prohibited Intune Intune MAM is a suite of Intune management features that lets users ’ ’ mobile apps fownd repured seman Corteprn I hetps://www.micresoft com ‘/AppStatlon's MAM https:// bileiron.com ‘/Scalefuslon Application Manag t https://scalefusion.com v ManageEngine Mobile Device Manager Plus https://www.manogeengine.com ‘/Apriorit Enterprise Mobile Device and Application Management https://www.opriorit.com Copyright © by E \/Appaloosa https://www.oppalocsa.io All Rights Reserved. Reproductionis Strictly Prohibited Mobile Application Management Solutions Mobile application management (MAM) software and services enable an organization to secure, manage, and distribute enterprise applications on user mobile devices, without interfering with personal apps and data. Enterprise Application Management allows removing the access to a particular application for employees who left the organization. MAM can be applied to company-owned mobile devices and BYOD. It also enables the separation of enterprise apps and data from personal content on the same device. Module 12 Page 1522 Certified Cybersecurity Technician Copyright © by EG-Bouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Mobile Device Security Restrict application access