2012年12月31日 星期一

Mobile Device Management (MDM) (4) - Core Function Features (Demo with AirWatch Cloud SaaS Version)

AirWatch can be offered as Cloud/SaaS and In-Premises. Let's play with it cloud provisioning model.

IT Administration log in the web based administration page on cloud. Air Watch has several datacentre globally. An new user account namely "amicewong" is setup. Adminstrator could choose to alert "amicewong" by SMS or by email. Let's choose SMS.
The end-user (amicewong) receive an SMS with an URL. End-user trigger the link. Browser on the smartphone (a Samsung Galaxy SIII / Android in this case) connects to the specified link. First time setup and phone enrollment start.

However, the enrollment process seems never end. It is supposed some issue happen.

As the administrator, I try to chat with AirWatch online support (to test their support response at the same time :)). I was told that AirWatch client app is required to be installed before enrollment.
On the "Play Store" of Google, the AirWatch MDM Agent is found, download and installed. Then assigned URL and pin from SMS is input for enrollment.
Installation and Enrollment is done.
Once the phone is encrollment, administrator can track the phone status including, model, version, compliance (rooted or not), location, application installed on the phone, etc.

Operation logs on the phone.

Administrator could keep track of existing application on the phone, as well as assigning application that need to be installed on each phone. Administrator can  also blocked and uninstalled unauthorized apps on the enrolled phones.



 Lets' say the enterprise require end-user to install a "push up" app.


Once assigned, end-user would receive an alert on the phone. End-user simply click and download from the Play Store. Installation starts.
 AirWatch has also development application, like Secure Locker, Secure Browser. The Secure Browser allow enterprise to keep track and control of the website that end user (could) visit on the smart phone.
(Secure Browser are sold with additional cost)
Administrator can also distribute necessary documents to enrolled phone. For confidential document, administrator can configure as "view online" only, without having the confidential document to be stored on the phone.


2012年12月29日 星期六

Mobile Device Management (MDM) - (3) Selection Critieria

Six Main Selection Criterias for MDM. (Gartner)
 
The first 3 are common must-have functions feature:
(1) Provisioning
(2) Policy Enforcement
(3) Administration Reporting
 
The following 3 differentiate different MDM Solutions
(4) Containerization
(5) Mobile Application Management
(6) Enterprise Contect Management


2012年12月16日 星期日

Cisco Security Good "Oldies"


Forgive me for sharing a little bit old documents here. Indeed they are not too old - published in 3-4 year ago. But people in IT usually treat documents released more than 6 months are "old".

In my opinion, if an "old" document is still referred by key vendors/parties, I would treasure the document's high value, and its importance. Also, some concrete standpoints are always true in IT arena.. Eg. 7 layers, Virus is always bad, Firewall is always good for your health, etc...

Please find the following documents from Cisco that I recommend. They are good oldies.  :D


Enterprise Internet Edge Design Guide
http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/IE_DG.pdf

IPSec VPN WAN Design Overview
http://www.cisco.com/en/US/docs/solutions/Enterprise/WAN_and_MAN/IPSec_Over.pdf

All reference:
Cisco - Design Zone Security
http://www.cisco.com/en/US/netsol/ns744/networking_solutions_program_home.html

Mobile Device Management (MDM) - (1) Gartner Magic Quadrant


The major purposes of mobile device management solution focus on "management" and little "security" riding the native feature of mobile. (The most securiy-related feature of a MDM is Remote Wipe as I could think of :P )

To further protect mobile phone asway from malware, spyware and virus. Please refer to Mobile Data Protection solution, in additional to and MDM.

Below is the Gartner Magic Quadrant of Mobile Device Management and Mobile Data Protection.

Among those MDM solution, AirWatch can be offered as a cloud service.



2012年12月14日 星期五

Mobile Device Management (MDM) - (2) Air Watch (Cloud or In-Premise)

AirWatch (http://www.air-watch.com/) mobile device management (MDM) solution could be deployed in either SaaS and also In-Premises.

Blue Circle: AW EIS is required if integration of MDM with internal application is required.
Red Circle: AW datacenter (in SaaS model) or AW mandatory module (in In-Premises model)
Green Cirle: User mobile phone



2012年12月6日 星期四

WooYun.org


While hacking activities originated from Chinese are getting more sophiticated, the security awareness in Chinese has been largely increased. WooYun.org (烏雲) is a Chinese forum for vendors and security researchers share and feedback on security vulnerabilities, threats and opinions.


2012年12月3日 星期一

Ethical Hacking -- Proxy Hunter

Proxy Hunter is a proxy application that lets you scan for proxy servers.
Proxy Hunter is also a malware if it is unintentionally installed in your PC.

Proxy Hunter could be an danagerous tools if it is used by Hacker or Botnet, as those found (free) Proxy may be utilized as Zombie and could hide the Hacker away when Hacker lauch a DDoS to his/her target.

The reason to share Proxy Hunter info here is let people know how a Hacker can look for resource launching DDoS attack. We are not aiming at promoting Hacking as a habit.

As Proxy Hunter could be a tools for devils, it is not easy to Google search a valid download link. Here is the portal you could find it

URL: http://download.pchome.net/
filename: proxyht310b.zip


After installation, open it, and YOU MUST read the Warning.
 
Considering the damage that a Proxy Hunter could do, and some PC users may unintentionally installed with a Proxy Hunter, your PC's AV software will not recommend a Proxy Hunter. Click "Allow" only when you are sure what you are doing now.
 

Launch Proxy Hutner. Following the Step-by-Step tutorial : (in Chinese)
URL:  http://www.360doc.com/content/09/1204/12/261866_10342617.shtml

Or this simple tutorial (in English):
http://www.proxysecurity.com/proxy-hunter.php



The searching may need several hours for a Class B.   ......to be continued....