Abstract
Enterprise systems have traditionally managed network security with firewalls, virtual private networks (VPNs), antivirus software, and computers imaged and deployed from within the enterprise system. This implies a fortress model, in which a clear boundary lies between what is inside the fortress and what is outside. Those assets inside are protected from the outside. This model does not match the current world. Mobile devices, which are outside the traditional fortress, are now a part of everyday life and thus a part of everyday business. Such devices are not add-ons to a managed core but instead are part of the core of the enterprise. A modern enterprise depends on collaboration and communication across devices regardless of platform, and security requires all devices to be registered and managed with mobility in mind. End-point device management is the process by which enterprise hardware and the software that runs on it are managed, updated, validated, and approved by the enterprise. Information about users, including which end-point device they are logged into, their geo-location, and other factors, are maintained within the enterprise. These are made available for maintenance and update, as well as access and privilege determination, restriction, and elimination. Rogue and compromised devices (and individuals) are removed from the registry and prevented from interacting with enterprise services. This enables the enterprise to tightly control the security properties of not just the connections to the services but also the end-point devices where these communications originate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
IBM Corporation: Web reference. Mobile Device Management (MDM). https://www.ibm.com/security/mobile/maas360/mobile-device-management. Last accessed on 18 Nov 2017
AT&T Business: Web reference. CYBERSECURITY SOLUTIONS- Mobile Security. https://www.business.att.com/solutions/Family/cybersecurity/mobile-security/. Last accessed on 18 Nov 2017
PC Magazine: Web reference. The Best Mobile Device Management (MDM) Solutions of 2017. https://www.pcmag.com/article/342695/the-best-mobile-device-management-mdm-software. Last accessed on 18 Nov 2017
MindWireless – Strategic Telecom Management: Web reference. Enterprise Mobility Management. https://mindwireless.com/services/enterprise-mobility-management. Last accessed on 18 Nov 2017
Konieczny, F., Trias, E., Taylor, N.: SEADE: countering the futility of network security. Air Space Power J. 29(5), 4 (2015)
Simpson, W.R., Foltz, K.E.: Enterprise end-point device management. In: Lecture Notes in Engineering and Computer Science: Proceedings of the World Congress on Engineering 2018, London, UK, pp. 331–336, 4–6 July 2018
TPM Main Specification Version 1.2, Revision 116, 1 March 201, TCG Published. https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-1-Design-Principles_v1.2_rev116_01032011.pdf
Ferraiolo, H. et al.: NIST Special Publication 800-157, Guidelines for Derived Personal Identity Verification (PIV) Credentials, December 2014. https://doi.org/10.6028/NIST.SP.800-157
PC Magazine, Encyclopedia: Web reference. Definition of heartbeat. Last accessed 15 November 2017. https://www.pcmag.com/encyclopedia/term/44190/heartbeat
Hong, J.W., et al.: Enterprise network traffic monitoring, analysis, and reporting using web technology. J Netw Syst Manage. 9(1), (2001)
Stallings, W.: SNMP, SNMPv2, SNMPv3, and RMON 1 and 2, 3rd edn. Addison-Wesley (1999)
ITU-T, Information Technology, Common Management Information Protocol (CMIP)–Part 1: Specification, Recommendation X.711 (1991)
Techopedia home dictionary tags. Web reference. Bricking-definition and explanation. https://www.techopedia.com/definition/24221/bricking. Last accessed on 11/15/2017
Simpson, W.R., Foltz, K.E.: Assured identity for enterprise level security. In: Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering 2017, London, UK, pp. 440–445, 5–7 July 2017
TechTarget Search Mobile Computing: Web reference. Remote wipe. http://searchmobilecomputing.techtarget.com/definition/remote-wipe. Last accessed on 11/15/2017
Simpson W.R.: CRC Press, Enterprise level security – securing information systems in an uncertain world, May 2016. Auerbach Publications. ISBN 9781498764452, 397 pp.
Simpson, W.R., Foltz, K.E.: Enterprise level security: insider threat counter-claims. In: Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering and Computer Science 2017, San Francisco, USA, pp. 112–117, 25–27 October 2017
Simpson, W.R., Foltz, K.E.: Proceedings of the 22nd International Command and Control Research and Technology Symposium (ICCRTS), Escalation of access and privilege with enterprise level security, Los Angeles, CA, pp. TBD, September 2017
Simpson, W.R., Foltz, K.E.: Proceedings of the 19th International Conference on Enterprise Information Systems (ICEIS 2017), vol. 1, pp. 177–184, Porto, Portugal, 25–30 April, 2017, Enterprise Level Security with Homomorphic Encryption. SCITEPRESS – Science and Technology Publications.
Foltz, K.E., Simpson, W.R.: Enterprise considerations for ports and protocols. In: Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering and Computer Science 2016, San Francisco, USA, pp.124–129, 19–21 October 2016
Foltz, K.E., Simpson, W.R.: Simplified key management for digital access control of information objects. In: Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering 2016, London, UK, pp. 413–418, 29 June–1 July 2016
Foltz, K.E., Simpson, W.R.: Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI, Enterprise Level Security – Basic Security Model, vol. I, WMSCI 2016, Orlando, Florida, pp. 56–61, 8–11 March 2016
Foltz, K.E., Simpson, W.R.: Wessex Institute, Proceedings of the International Conference on Big Data, BIG DATA 2016. Access and Privilege in Secure Big Data Analysis. Alicante, Spain, pp. 193–205, 3–5 May 2016
Acknowledgment
This work was supported in part by the U.S. Secretary of the Air Force and The Institute for Defense Analyses (IDA). The publication of this chapter does not indicate endorsement by any organization in the Department of Defense or IDA, nor should the contents be construed as reflecting the official position of these organizations. The authors would especially like to acknowledge the support of Dr. Margaret Myers without whose support and encouragement much of this would not be accomplished.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Simpson, W.R., Foltz, K.E. (2019). Managing Enterprise End-Point Devices. In: Ao, SI., Gelman, L., Kim, H. (eds) Transactions on Engineering Technologies. WCE 2018. Springer, Singapore. https://doi.org/10.1007/978-981-32-9531-5_15
Download citation
DOI: https://doi.org/10.1007/978-981-32-9531-5_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-32-9530-8
Online ISBN: 978-981-32-9531-5
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)