Byod in corporate networks -
8
BYOD in corporate networks Andreas Meyer & Peter Swedin
-
Upload
peter-swedin -
Category
Technology
-
view
769 -
download
0
description
Short talk on how to embrace the Bring your Own Device trend without compromising security.
Transcript of Byod in corporate networks -
![Page 1: Byod in corporate networks -](https://reader035.fdocuments.net/reader035/viewer/2022081404/5594580b1a28ab5e2f8b4749/html5/thumbnails/1.jpg)
BYOD in corporate networks
Andreas Meyer & Peter Swedin
![Page 2: Byod in corporate networks -](https://reader035.fdocuments.net/reader035/viewer/2022081404/5594580b1a28ab5e2f8b4749/html5/thumbnails/2.jpg)
Intro
![Page 3: Byod in corporate networks -](https://reader035.fdocuments.net/reader035/viewer/2022081404/5594580b1a28ab5e2f8b4749/html5/thumbnails/3.jpg)
Threats
![Page 4: Byod in corporate networks -](https://reader035.fdocuments.net/reader035/viewer/2022081404/5594580b1a28ab5e2f8b4749/html5/thumbnails/4.jpg)
Opportunities
![Page 5: Byod in corporate networks -](https://reader035.fdocuments.net/reader035/viewer/2022081404/5594580b1a28ab5e2f8b4749/html5/thumbnails/5.jpg)
Prevent the threats, enable the opportunities
![Page 6: Byod in corporate networks -](https://reader035.fdocuments.net/reader035/viewer/2022081404/5594580b1a28ab5e2f8b4749/html5/thumbnails/6.jpg)
Objective: Corporate controlled enviroment on consumer device
![Page 7: Byod in corporate networks -](https://reader035.fdocuments.net/reader035/viewer/2022081404/5594580b1a28ab5e2f8b4749/html5/thumbnails/7.jpg)
Solution
![Page 8: Byod in corporate networks -](https://reader035.fdocuments.net/reader035/viewer/2022081404/5594580b1a28ab5e2f8b4749/html5/thumbnails/8.jpg)
Pro tips
• Never allow unmanaged devices in the corporate sensitive network zone
• Create a parallel infrastructure for unmanaged devices
• Sandbox and whitelist where applicable • Use/create risk and authentication
matrixes • Blind faith in reputable brands is… blind.