in mobile environment
Alexandru LUCA
PKI / Crypto – Mobile Security
Septembrie 2016
2
"By 2020, smartphone
security and management
architectures will dominate
the endpoint computing
environment, while
traditional PC image
management will decline
except on dedicated
appliance-style devices."
Source: “Managing PCs, Smartphones and Tablets and the Future Ahead”
by Ken Dulaney, Terrence Cosgrove, May 5, 2014 3
"By 2020, smartphone
security and management
architectures will dominate
the endpoint computing
environment, while
traditional PC image
management will decline
except on dedicated
appliance-style devices."
Source: “Managing PCs, Smartphones and Tablets and the Future Ahead”
by Ken Dulaney, Terrence Cosgrove, May 5, 2014 4
The world has changed…
Change the
Way People Work
Disrupt Enterprise
Architectures
Mainframe / PC Internet Mobile
Mini Era Era Era Era New Leaders Emerge
5
New business challenges in enterprise
6
Mobile is Here to Stay in the Enterprise
7
“
Modern operating
systems and mobile user
requirements recast the
enterprise security model
” 8
Mobile Information Security
System
9
Complete system to secure mobile
communication and devices
{ Trust4Mobile
EMM} certSIGN Product to encrypt
mobile communications:
Mobile Device Management voice, messages, file transfer
Manages access to Data and Cross-platform transfer of
Applications encrypted files
Content management with Digital Certificates are stored
advanced DLP capabilities on the phone or on a smart
Centralized management card
{ Trust4Sign
certSIGN product for mobile
devices for digitally sign
Virtualization Solution } documents
Secure Container within the
memory of the phone where
sensitive information is
automatically encrypted { Confluence4Mobile
VPN Connections for Secure
Central Document
Data Transfer
Management and Workflow
Secured access to corporate E-
mail and intranet resources
10
What information should be protected?
Documents
Voice calls
Messages
Personal data
...
11
Integrated Security Solution
Users
Virtualization Virtualization
Solution Solution
Smart Card and Smart Card and
Digital Certificate Digital Certificate
Trust4Mobile Trust4Mobile
Trust4Sign Trust4Sign
Confluence4Mobile Confluence4Mobile
12
Enterprise Mobility Management
13
Enterprise Mobility Management
15
Secure Email
Electronic Signature
E-mail Encryption
Access from PC and Mobile Device
Advanced DLP policies
“Open in” with secured managed
apps
16
Securing communication
(voice, text and files)
17
Deliver services to business &
governmental clients
Secure Communication
over Mobile Data Network
Central System
managed by Client
CryptoVOIPs
Initiate Call Initiate Call
SIP Server
19
Trust4Mobile user interface
Agenda
Define recipients
Initiate calls
Recent calls
Messages
Send/ receive encrypted
messages
Messages encrypted while stored
on the phone and in transit
Files
Send encrypted files to recipients
available in contact list
My profile
Configuration of application
Username
SSL/TLS connection configuration
20
Trust4Mobile Central System
21
Key benefits of the solution – privacy by
design
Encryption keys generated and
managed directly on the phone
Users have complete control over the
keys
Integration with smart cards (EAL4+ or
FIPS 140-2 level 2 certified)
Messages are permanently encrypted
on the phone
Peer to peer phone calls and messages
transmission
Does not require access to:
Location services
Contacts
22
Secured document management
on mobile devices
23
Documents management and documents
workflow on mobile devices
Management of electronic
documents
Management of electronic
workflow
Tasks management
Electronic archiving
Management of the users,
roles and access rights
Electronic signature for hybrid
environment (mobile & PC)
24
Documents management and document
workflow @ user
level
25
Key elements as “final conclusion”
26
Thank you!
Alexandru Luca
Tel: +40 734 302 650
Email: alexandru.luca@certsign.ro
27