Document not found! Please try again

Android for the Enterprise

13 downloads 2317 Views 3MB Size Report
IT remotely installs approved enterprise applications to devices. 2. 3. IT runs audit of devices and finds new unauthorized applications to block ! IT REMOVES the.
Android  for  the  Enterprise   Ge#ng  from  Here  to  There    

Confiden)al  

1  

Overview  

3LM addresses enterprise needs: security and device management.

Confiden)al  

2  

pla6orm  

Overview  

re   a w o4 s   r e serv

Confiden)al  

3  

Overview  

Confiden)al  

4  

Use  cases   Confiden)al  

5  

Use  cases  

Loss Remediation

Minimize risk of data exposure on lost devices

1

Device is lost or stolen and reported to IT

2

IT locates device using 3LM console and locks it

3

If device cannot be retrieved, ALL or PART of the data on the device can be wiped

Confiden)al  

6  

Use Cases Use   cases  

Application Management

Manage which applications users can run 1 IT remotely deploys policy on which applications can be used on devices

2

3

4

IT remotely installs approved enterprise applications to devices

IT runs audit of devices and finds new unauthorized applications to block

IT REMOVES the unauthorized application and updates policy

! Confiden)al  

7  

Use Cases Use   cases  

Permissions-Based Resource Access

Lock down which resources remote users can access IT enables remote access for user and defines which resources they can access across the secure link

1

3LM routes and enables or blocks access to internal resources based on user profile

2

Confiden)al  

8  

Use Cases Use   cases  

Unique Configurations for Business

Track devices and whereabouts Enable breadcrumb tracking of devices to track history of location of a device

Lock down and manage devices to limited purpose Enable Kiosk-mode type scenarios limiting devices to only use one or a few applications

Confiden)al  

9  

How Use itit   Cases works Use   cases   How   w orks  

Features

Device and transport encryption •  • 

Full device encryption and SD Card encryption using 192-bit AES TLS and AES encryption of data transport over the air

•  •  •  •  • 

Disable pre-installed applications Remotely install applications and make permanent (user cannot remove) Remotely remove applications Set whitelist/blacklist of applications to be used Manage application permissions post-install

•  •  • 

Enforce strong passwords Remote device lock when devices are lost Remote data wipe – selective data or entire device

Application Control

Leverage data protection tools

Set policy on hardware usage • 

Lock usage of Camera, Bluetooth, Wifi, SD Card, etc.

Track location •  • 

Fetch location of devices Track location history (breadcrumb)

•  • 

Enable remote access to internal enterprise resources Set permissions by user on resource access

Secure remote access (VPN) Monitor device health • 

Remote device health and status checking Confiden)al  

10  

How  it  works   Confiden)al  

11  

How  it  works  

Experience End User 3LM is running on device and is unnoticeable in normal usage. It does not require launching an app of any sort for each use once provisioned.

IT Administrator IT can create and deploy policies to enable and disable software and hardware components as well as providing encryption for data protection. Policy management is performed from a remote console and gives IT complete control of 3LM enabled Android devices. Confiden)al  

12  

How  it  works  

Requirements

Handheld •  •  •  • 

3LM features activated via app install and provisioning 3LM framework embedded on the Android device Subset of features for non-3LM devices Android 2.2 and higher

Server Components •  3LM router and 3LM enterprise server •  Multiple network configuration options: based on who hosts what

Confiden)al  

13  

How How  itit  works works  

Server Components

3LM Router

3LM Enterprise Server

Server that handles setup and management of security of the data transport. Can be hosted by 3LM or located within a customer s premise.

3LM   Router

Enterprise   Server

3LM Mail Relay

3LM VPN Service Optional Service that allows for secure remote access to internal corporate resources

VPN   Service

Server that hosts the IT management console for setting up and managing policies on devices. Also acts as the interface to Microsoft Exchange and other back-end systems.

Mail Relay

Optional Service that allows for integration with Microsoft Exchange through the 3LM secure transport channel

Multiple Configurations Possible Customer Premise

3LM Hosted

Customer Premise

VPN   Service

3LM   Router

Enterprise   Server

Mail Relay

Enterprise Hosted

3LM Hosted

VPN   Service

3LM   Router

Enterprise   Server

Hybrid Hosted Confiden)al  

Mail Relay

3LM   Router

Enterprise   Server

Full 3LM Hosted 14  

Enterprise Hosted Model 3LM   Router

·∙   Secure Data Transport

VPN   Service

·∙   Back-end Resource Access

ninoisivorP  ML3 3LM    Pgrovisioning   secivreS Services

·∙   Microsoft Exchange Integration

Customer Premise

puteS dDevice na gninProvisioning oisivorP ecivand eD dSetup eruceS Secured

Mail Relay

How How  itit  works works  

Enterprise   Server

VPN   Service Mail Relay

Enterprise   Server

Enterprise   Server

Mail Relay

3LM  Router

3LM  Router

Mail Relay

losnoC Data tnemeganaM   ·∙ ataD Console eruceS   ·∙ ·∙   Management ·∙   eSecure t nE Enterprise   tropsnarT tnemeganaM ycilo P   ·∙  es·∙ir  prePolicy Transport Management Server

·∙   Microsoft dne-kcaB   ·∙ Exchange sseccA ecruoseR VPN   Integration Service

revreS

·∙   Back-end

 ML3 retuoR

tfosorciM   ·∙

3LM  Provisioning   Services

3LM   Router

VPN   Service

3LM Hosted Facility

ML3 retuoR  

egnahcxE  NPV Resource Access noitargetnI ecivreS

liaM yaleR

otsuC

Customer Premise Confiden)al  

15  

How How  itit  works works  

Hybrid Hosted Model Customer Premise

Enterprise   Server

VPN   Service

·∙   Secure Data Transport

Enterprise   Server

·∙   Back-end Resource Access

detsoH ML3 3LM ytilicaF  Router

Mail Relay

retuoR  

3LM   Router

VPN   Service

·∙   Microsoft Exchange Integration

3LM Hosted Facility ML3

Mail Relay

Customer Premise

 gn3LM   inoisPirovisioning   vorP  ML3 seServices civreS

Mail Relay

VPN   Service

Enterprise   Server

Enterprise   Server Mail Relay

tfosorciM   ·∙ ·∙   Back-end egnahcxE liaM Resource Access noitargetnI yaleR

VPN   Service

Enterprise   Server

 NPV VPN   ecivreS Service

 ML3 retuoR

soft nge ration

d

otsuC

·∙   Microsoft dne-kcaB   ·∙ Exchange ecruoseR Integration

Data ort

3LM  Router Mail sseccA Relay

revreS Server

3LM  Provisioning   Services

3LM  Provisioning   Services

ataD eruceS   ·∙ ·∙   Secure Data nE tropsnarT Transport  esirpretEnterprise  

3LM Hosted Facility

3LM  Router 3LM   Router

·∙   Back-end Resource Access

VPN   Service

Confiden)al  

Customer Premise 16  

Cloud/3LM Hosted Model  gni3LM   noisivPorovisioning   rP  ML3 Services secivreS

Enterprise   Server

ML3 retuoR  

 Router

·∙   Secure Data Transport

·∙   Back-end Resource Access

detsoH ML3 ytilicaF 3LM

3LM   Router

VPN   Service

·∙   Microsoft Exchange Integration

Customer Premise

3LM Hosted Facility

3LM  Monitoring   Services Mail Relay

How How  itit  works works  

Enterprise   Server

VPN   Service

Enterpris Server Mail Relay

IT Management

ecivreS

Secure Data Transport

 ML3 retuoR

3LM  Provisioning   Services

3LM   Router dne-kcaB   ·∙  NPV sseccA ecruoseR

ataD eruceS   ·∙ tropsnarT

3LM Hosted Facility

3LM  Router  esirpretnE revreS

tfosorciM   ·∙ egnahcxE noitargetnI

Enterprise   Server

Management Console

liaM yaleR

Confiden)al  

17  

Device  Framework   Confiden)al  

18  

Device   Framework  

Extending Android

Opportunities •  •  •  • 

Leverage existing, mature modules such as eCryptFS, tun Possibility to contribute code back into AOSP Deep Android OS understanding Thriving ecosystem

Challenges •  Maintaining platform extensions on top of unknown future changes •  Reduced functionality for non-3LM devices •  Must exist within the constraints

Confiden)al  

19  

Device   Framework  

OEM Collaboration

Benefits •  Helps us re-validate and improve our design •  Helps strengthen our core “feature” set •  Visibility into the whole ecosystem •  A unique differentiator: there is a limit on what you can do with apps … and the path through VM-land is far from proven

Challenges •  Patch lifecycle: ensuring all change sets are correctly applied •  Debugging problems on unavailable codebase •  Customized OS software, and hardware

Confiden)al  

20  

Device   Framework  

Case Study: SD Encryption

Onboard Flash Memory

Removable SD card

192-bit AES using eCryptFS

192-bit AES using dmCrypt

Confiden)al  

21  

Device   Framework  

Case Study: SD Encryption

The easy part •  dmCrypt already available on the device! •  Use the stock credential storage module

The harder part •  Multiple SD devices, variety of partitioning schemes •  Various use models, custom media control apps

Other proprietary extensions •  Use of SD card for OTA storage (/cache too small…)

Confiden)al  

22  

Server  Infrastructure   Confiden)al  

23  

Server   Infrastructure  

Putting it all Together

Main components •  •  •  •  • 

Provisioning server Message router Enterprise server E-mail / VPN components But also: Monitoring, Load balancing and clustering, DB shards

Hosting challenges •  Multiple hosting modes (cloud, intranet) •  Connection throttling (among other EC2 challenges) •  Switching between networks; internal hosting: scale in vs. scale out

Confiden)al  

24  

Server   Infrastructure  

Reliability and Tuning

Framework Hell •  SSL (Harmony, Netty, thread [un]safety, bugs in EDH implementation) •  Crypto providers (Android: an oldish built-in Bouncy Castle) •  C#...

Performance •  Memory demands: 100K’s of live connections •  Fast asynch I/O, clustering

Confiden)al  

25  

Ques)ons?   [email protected]   [email protected]   Confiden)al  

26