Android for the Enterprise Ge#ng from Here to There 1 - - PowerPoint PPT Presentation

android for the enterprise
SMART_READER_LITE
LIVE PREVIEW

Android for the Enterprise Ge#ng from Here to There 1 - - PowerPoint PPT Presentation

Android for the Enterprise Ge#ng from Here to There 1 Confiden)al Overview 3LM addresses enterprise needs: security and device management. 2 Confiden)al Overview m


slide-1
SLIDE 1

Android ¡for ¡the ¡Enterprise ¡

Ge#ng ¡from ¡Here ¡to ¡There ¡

¡

1 ¡ Confiden)al ¡

slide-2
SLIDE 2

Confiden)al ¡ 2 ¡

Overview ¡

3LM addresses enterprise needs: security and device management.

slide-3
SLIDE 3

Confiden)al ¡ 3 ¡

Overview ¡

s e r v e r ¡ s

  • 4

w a r e ¡ p l a 6

  • r

m ¡

slide-4
SLIDE 4

Confiden)al ¡ 4 ¡

Overview ¡

slide-5
SLIDE 5

Confiden)al ¡ 5 ¡

Use ¡cases ¡

slide-6
SLIDE 6

Confiden)al ¡ 6 ¡

Use ¡cases ¡ Loss Remediation Minimize risk of data exposure on lost devices 1

Device is lost or stolen and reported to IT

2

IT locates device using 3LM console and locks it

3

If device cannot be retrieved, ALL or PART

  • f the data on the device can be wiped
slide-7
SLIDE 7

Confiden)al ¡ 7 ¡

Use Cases

Application Management

Manage which applications users can run

IT remotely deploys policy

  • n which

applications can be used on devices

1 4

IT remotely installs approved enterprise applications to devices

2 3

IT runs audit of devices and finds new unauthorized applications to block

!

IT REMOVES the unauthorized application and updates policy

Use ¡cases ¡ Use ¡cases ¡

slide-8
SLIDE 8

Confiden)al ¡ 8 ¡

Use Cases

Permissions-Based Resource Access

Lock down which resources remote users can access 1

IT enables remote access for user and defines which resources they can access across the secure link 3LM routes and enables or blocks access to internal resources based on user profile

2 Use ¡cases ¡ Use ¡cases ¡

slide-9
SLIDE 9

Confiden)al ¡ 9 ¡

Use Cases

Unique Configurations for Business

Track devices and whereabouts

Enable ‘breadcrumb’ tracking of devices to track history of location

  • f a device

Lock down and manage devices to limited purpose

Enable ‘Kiosk-mode’ type scenarios limiting devices to only use one

  • r a few applications

Use ¡cases ¡

slide-10
SLIDE 10

Confiden)al ¡ 10 ¡

How it works

Device and transport encryption Application Control Leverage data protection tools

  • Enforce strong passwords
  • Remote device lock when devices are lost
  • Remote data wipe – selective data or entire device

Set policy on hardware usage

  • Lock usage of Camera, Bluetooth, Wifi, SD Card, etc.

Track location

  • Fetch location of devices
  • Track location history (breadcrumb)

Secure remote access (VPN)

  • Enable remote access to internal enterprise resources
  • Set permissions by user on resource access

Monitor device health

  • Remote device health and status checking
  • Full device encryption and SD Card encryption using 192-bit AES
  • TLS and AES encryption of data transport over the air
  • Disable pre-installed applications
  • Remotely install applications and make permanent (user cannot remove)
  • Remotely remove applications
  • Set whitelist/blacklist of applications to be used
  • Manage application permissions post-install

How ¡it ¡works ¡ Features

Use Cases

Use ¡cases ¡

slide-11
SLIDE 11

Confiden)al ¡ 11 ¡

How ¡it ¡works ¡

slide-12
SLIDE 12

Confiden)al ¡ 12 ¡

How ¡it ¡works ¡ Experience

End User

3LM is running on device and is unnoticeable in normal usage. It does not require ‘launching’ an app of any sort for each use

  • nce provisioned.

IT can create and deploy policies to enable and disable software and hardware components as well as providing encryption for data protection. Policy management is performed from a remote console and gives IT complete control of 3LM enabled Android devices.

IT Administrator

slide-13
SLIDE 13

Confiden)al ¡ 13 ¡

Requirements

Handheld Server Components

  • 3LM features activated via app install and provisioning
  • 3LM framework embedded on the Android device
  • Subset of features for non-3LM devices
  • Android 2.2 and higher
  • 3LM router and 3LM enterprise server
  • Multiple network configuration options: based on who hosts what

How ¡it ¡works ¡

slide-14
SLIDE 14

Confiden)al ¡ 14 ¡

How it works

Server Components

3LM ¡ Router Enterprise ¡ Server

Server that handles setup and management of security of the data

  • transport. Can be hosted by 3LM or

located within a customer’s premise. Server that hosts the IT management console for setting up and managing policies on devices. Also acts as the interface to Microsoft Exchange and other back-end systems.

3LM Router 3LM Enterprise Server

Multiple Configurations Possible

3LM ¡ Router Enterprise ¡ Server

Enterprise Hosted Hybrid Hosted Full 3LM Hosted

Customer Premise

3LM ¡ Router Enterprise ¡ Server

Customer Premise 3LM Hosted

3LM ¡ Router Enterprise ¡ Server

3LM Hosted

VPN ¡ Service Mail Relay

Optional Service that allows for secure remote access to internal corporate resources

3LM VPN Service

Optional Service that allows for integration with Microsoft Exchange through the 3LM secure transport channel

3LM Mail Relay

VPN ¡ Service Mail Relay VPN ¡ Service Mail Relay

How ¡it ¡works ¡

slide-15
SLIDE 15

Confiden)al ¡ 15 ¡

How it works

Enterprise Hosted Model

Customer Premise

Enterprise ¡ Server

Enterprise ¡ Server

3LM ¡Router

3LM ¡ Router

·√ ¡ Secure Data Transport ·√ ¡ Management Console ·√ ¡ Policy Management ·√ ¡ Microsoft Exchange Integration ·√ ¡ Back-end Resource Access

VPN ¡ Service Mail Relay VPN ¡ Service Mail Relay

3LM ¡Provisioning ¡ Services Secured Device Provisioning and Setup

How ¡it ¡works ¡

slide-16
SLIDE 16

Confiden)al ¡ 16 ¡

How it works

Hybrid Hosted Model

Customer Premise

3LM Hosted Facility

Enterprise ¡ Server 3LM ¡Router

3LM ¡Provisioning ¡ Services

VPN ¡ Service Mail Relay Enterprise ¡ Server 3LM ¡ Router

·√ ¡ Secure Data Transport ·√ ¡ Microsoft Exchange Integration ·√ ¡ Back-end Resource Access

VPN ¡ Service Mail Relay

How ¡it ¡works ¡

slide-17
SLIDE 17

Confiden)al ¡ 17 ¡

How it works

Cloud/3LM Hosted Model

3LM Hosted Facility

Enterprise ¡ Server Enterprise ¡ Server 3LM ¡Router

3LM ¡Provisioning ¡ Services 3LM ¡Monitoring ¡ Services

3LM ¡ Router

Secure Data Transport Management Console IT Management

How ¡it ¡works ¡

slide-18
SLIDE 18

Confiden)al ¡ 18 ¡

Device ¡Framework ¡

slide-19
SLIDE 19

Confiden)al ¡ 19 ¡

Extending Android

Opportunities Challenges

  • Leverage existing, mature modules such as eCryptFS, tun
  • Possibility to contribute code back into AOSP
  • Deep Android OS understanding
  • Thriving ecosystem
  • Maintaining platform extensions on top of unknown future changes
  • Reduced functionality for non-3LM devices
  • Must exist within the constraints

Device ¡ Framework ¡

slide-20
SLIDE 20

Confiden)al ¡ 20 ¡

OEM Collaboration

Benefits Challenges

  • Helps us re-validate and improve our design
  • Helps strengthen our core “feature” set
  • Visibility into the whole ecosystem
  • A unique differentiator: there is a limit on what you can do with apps

… and the path through VM-land is far from proven

  • Patch lifecycle: ensuring all change sets are correctly applied
  • Debugging problems on unavailable codebase
  • Customized OS software, and hardware

Device ¡ Framework ¡

slide-21
SLIDE 21

Confiden)al ¡ 21 ¡

Case Study: SD Encryption

Device ¡ Framework ¡ Onboard Flash Memory Removable SD card

192-bit AES using eCryptFS 192-bit AES using dmCrypt

slide-22
SLIDE 22

Confiden)al ¡ 22 ¡

Case Study: SD Encryption

The harder part Other proprietary extensions

  • Multiple SD devices, variety of partitioning schemes
  • Various use models, custom media control apps
  • Use of SD card for OTA storage (/cache too small…)

Device ¡ Framework ¡

The easy part

  • dmCrypt already available on the device!
  • Use the stock credential storage module
slide-23
SLIDE 23

Confiden)al ¡ 23 ¡

Server ¡Infrastructure ¡

slide-24
SLIDE 24

Confiden)al ¡ 24 ¡

Putting it all Together

Main components Hosting challenges

  • Provisioning server
  • Message router
  • Enterprise server
  • E-mail / VPN components
  • But also: Monitoring, Load balancing and clustering, DB shards
  • Multiple hosting modes (cloud, intranet)
  • Connection throttling (among other EC2 challenges)
  • Switching between networks; internal hosting: scale in vs. scale out

Server ¡ Infrastructure ¡

slide-25
SLIDE 25

Confiden)al ¡ 25 ¡

Reliability and Tuning

Framework Hell Performance

  • SSL (Harmony, Netty, thread [un]safety, bugs in EDH implementation)
  • Crypto providers (Android: an oldish built-in Bouncy Castle)
  • C#...
  • Memory demands: 100K’s of live connections
  • Fast asynch I/O, clustering

Server ¡ Infrastructure ¡

slide-26
SLIDE 26

Confiden)al ¡ 26 ¡

Ques)ons? ¡ jobs@3lm.com ¡ info@3lm.com ¡