🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 12 - 05 - Discuss and Implement Enterprise-level Mobile SM Solutions - 02_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Mobile Device Security Exam 212-82 Mobile Content Management Solutions O Mobile content management (MCM) or mobile information management (MIM) solutions prOVide secure access to corporate QO It enables easy and secure sharing of content H between devices within an...

Certified Cybersecurity Technician Mobile Device Security Exam 212-82 Mobile Content Management Solutions O Mobile content management (MCM) or mobile information management (MIM) solutions prOVide secure access to corporate QO It enables easy and secure sharing of content H between devices within an enterprise File storage and file sharing services are the < E e i Vaultize Solutions = onten % o= rganizationa gateway...... n.D https://www.vaultize.com MCM — B two main components of MCM solutions....................: S’ Add smartphones, tablets, and other mobile devices Q 5..... n................ > gQ...... @. data on Database A D file server D Configure Apps : “* Mobilelron https://www.mobileiron.com ‘m % AppTec360° S https://www.apptec360.com : — A 7 T FO———— to devices using G D D content locker : : )@.......... & Employee I. All Rights Reserved. Reproduction is Strictly Prohibited, Mobile Content Management Solutions Mobile content provide secure management access to (MCM) or mobile corporate data information (documents, management spreadsheets, (MIM) email, solutions schedules, presentations, and other enterprise data) on mobile devices across the organizational networks without compromising with the speed. They enable easy and secure sharing of content between devices within an enterprise. File storage and file sharing services are the two main components of MCM solutions. MCM involves encrypting important information and allowing accessing, transmitting, or storing important information on only authorized apps using strong password protection policies. e Database Content Organizational gateway file server G Configure Apps D G D Deploycontent§ D to devices using : contentlocker Employee Figure 12.6: Mobile content management Module 12 Page 1525 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Mobile Device Security MCM = = = Exam 212-82 enables: Multi-channel content delivery capabilities that feature the management content repository while delivering the content to devices simultaneously. of a central Content access control: Access control to content includes o Authorization o Authentication o Access approval to content o Download control o Wipe-out for specific users o Time-specific access Specialized templating system: There are two approaches for adapting to mobile CMS templates. o Multi-client approach allows to view different versions of a site on the same domain and presents suitable templates based on the devices used by clients for viewing the website. o = Multi-site approach displays mobile sites on a targeted sub-domain. Location-based content current physical location. delivery provides content to mobile devices based on their Examples of MCM Solutions: » Vaultize (https.//www.vaultize.com) = Mobilelron (https://www.mobileiron.com) = AppTec360° (https://www.apptec360.com) Module 12 Page 1526 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Mobile Device Security Mobile Threat Defense Solutions L3 2 H 1 ! : o‘ ile rga efense ( ).al.ms 0 secure mobile devices against advanced malicious threats, network ’ attacks, and device vulnerabilities Mobile threat def MTD) aims t bil B : @ Mobilelron Threat Defense (MTD) https://www.mobileiron.com 1 E Pradeo Security Mobile Threat Defense i The agents installed on the devices scan them for various ‘ Wetpss//foreres proded.com mobile attacks using advanced threat intelligence 1 H : - # Zimperium Mobile Threat Defense (MTD) @ mobile endpoints :. i [ ‘ https://www.zimperium.com It uses machine learning and real-time analysis to protect @. MTD generate alerts for the enterprise mobility management (EMM) solutions to perform appropriate actions (switching mobiles into the quarantine state) | | Lo e Mobile —————————— Threat Defense - ? ° Wandera Mobile Threat Defense https://www.wandera.com Lookout MTD https://www.lookout.com Solutions Mobile threat defense (MTD)/mobile threat management (MTM)/mobile threat prevention (MTP) protects organizations and their employees from threats on iOS and Android mobiles using different security technologies. The agents installed on the devices scan them for various mobile attacks using advanced threat intelligence. It uses machine learning and real-time analysis to protect mobile endpoints. MTD generate alerts for the enterprise mobility management (EMM) solutions to perform appropriate actions (switching mobiles into the quarantine state). The MDM and MAM management tools only allow to set baseline management profiles for mobile devices and applications used within organizations. These two management tools lack insights related to app characteristics, protection against threats and user behaviors, reacting to threats dynamically, and providing continuous visibility of device health and trust. MTD extends EMM/MDM with additional security capabilities because it works with devices and secures them against the following attacks. * |t secures against device/physical threats by adding active threat detection and riskbased mobile management for more educated policy enforcement. = |t secures against malware. = |t secures against phishing. = |t secures against network attacks. Factors to Consider Before Selecting an MTD solution: The best suited MTD solution for an organization depends on = The OS employed by the organization Module 12 Page 1527 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Mobile Device Security Exam 212-82 Mobile approach (BYOD or COPE) Type of access given to employees on their devices The EMM employed by the organization Examples of MTD: Mobilelron Threat Defense (MTD) (https://www.mobileiron.com) Pradeo Security Mobile Threat Defense (https.//www.pradeo.com) Zimperium Mobile Threat Defense (MTD) (https://www.zimperium.com) Wandera Mobile Threat Defense (https://www.wandera.com) Lookout MTD (https.//www.lookout.com) Module 12 Page 1528 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Mobile Device Security Mobile Email Management Solutions Mobile email management (MEM) solutions ensures the security of the corporate email infrastructure and data T @ Features of MIEM solutions MEM Solutions \ v’ Pre-configures emails on devices remotely v' Ensures that only approved apps and devices can access the emails v’ Prevents unauthorized access of email O 42Gears MEM https://www.42gears.com @ Hexnode Mobile Email Management https://www.hexnode.com attachments v’ Pre-installs the email client to be used for e-mail A access Mimecast Mobile Email Management https://www.mimecast.com All Rights Reserved. Reproduction is Strictly Prohibited Mobile Email Management Solutions Mobile email management (MEM) solutions ensure infrastructure and data on mobile devices. MEM allows the security of the corporate email Controlling mobile devices that access emails = Prevention of data loss Enforcing strict compliance policies = Encrypting sensitive corporate data Common = = * MEM Key Features: Preconfiguring email on devices remotely: Using MDM, MEM allows o Creating email accounts by associating an email policy with employee devices. o Configuring the email signature and setting up a default email account for users. Ensure only approved apps and devices can access e-mail: Using MDM, MEM provides o An additional layer of encryption through S/MIMEMDM. o Configuring Simple Certificate Enrollment devices to secure emails using certificates. Protocol (SCEP) for iOS and Windows Prevent unauthorized access of email attachments: Using MDM, MEM assures o Securing email attachments during transit and after downloading. o Ensuring secure viewing and storage of key attachments using the built-in document viewer of MEM, and MDM apps. Module 12 Page 1529 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Mobile Device Security o Exam 212-82 Restricting document sharing to other devices or cloud services to prevent security breaches. * Pre-installing the email configurations of MDM client to be used for email access: The managed app allow o Customizing the requirements. managed o Distributing the app to devices. o Preconfiguring o Preconfiguring the app permissions. parameters email app functionalities (account type, domain to name, make the app ready for corporate usage after installation. suit the and email organizational signature) to Examples of MEM Solutions: » 42Gears MEM (https://www.42gears.com) * Hexnode Mobile Email Management (https://www.hexnode.com) * Mimecast Mobile Email Management (https://www.mimecast.com) Module 12 Page 1530 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser