Skip to main content

Managing Enterprise End-Point Devices

  • Conference paper
  • First Online:
Transactions on Engineering Technologies (WCE 2018)

Included in the following conference series:

  • 284 Accesses

Abstract

Enterprise systems have traditionally managed network security with firewalls, virtual private networks (VPNs), antivirus software, and computers imaged and deployed from within the enterprise system. This implies a fortress model, in which a clear boundary lies between what is inside the fortress and what is outside. Those assets inside are protected from the outside. This model does not match the current world. Mobile devices, which are outside the traditional fortress, are now a part of everyday life and thus a part of everyday business. Such devices are not add-ons to a managed core but instead are part of the core of the enterprise. A modern enterprise depends on collaboration and communication across devices regardless of platform, and security requires all devices to be registered and managed with mobility in mind. End-point device management is the process by which enterprise hardware and the software that runs on it are managed, updated, validated, and approved by the enterprise. Information about users, including which end-point device they are logged into, their geo-location, and other factors, are maintained within the enterprise. These are made available for maintenance and update, as well as access and privilege determination, restriction, and elimination. Rogue and compromised devices (and individuals) are removed from the registry and prevented from interacting with enterprise services. This enables the enterprise to tightly control the security properties of not just the connections to the services but also the end-point devices where these communications originate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. IBM Corporation: Web reference. Mobile Device Management (MDM). https://www.ibm.com/security/mobile/maas360/mobile-device-management. Last accessed on 18 Nov 2017

  2. AT&T Business: Web reference. CYBERSECURITY SOLUTIONS- Mobile Security. https://www.business.att.com/solutions/Family/cybersecurity/mobile-security/. Last accessed on 18 Nov 2017

  3. PC Magazine: Web reference. The Best Mobile Device Management (MDM) Solutions of 2017. https://www.pcmag.com/article/342695/the-best-mobile-device-management-mdm-software. Last accessed on 18 Nov 2017

  4. MindWireless – Strategic Telecom Management: Web reference. Enterprise Mobility Management. https://mindwireless.com/services/enterprise-mobility-management. Last accessed on 18 Nov 2017

  5. Konieczny, F., Trias, E., Taylor, N.: SEADE: countering the futility of network security. Air Space Power J. 29(5), 4 (2015)

    Google Scholar 

  6. Simpson, W.R., Foltz, K.E.: Enterprise end-point device management. In: Lecture Notes in Engineering and Computer Science: Proceedings of the World Congress on Engineering 2018, London, UK, pp. 331–336, 4–6 July 2018

    Google Scholar 

  7. TPM Main Specification Version 1.2, Revision 116, 1 March 201, TCG Published. https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-1-Design-Principles_v1.2_rev116_01032011.pdf

  8. Ferraiolo, H. et al.: NIST Special Publication 800-157, Guidelines for Derived Personal Identity Verification (PIV) Credentials, December 2014. https://doi.org/10.6028/NIST.SP.800-157

  9. PC Magazine, Encyclopedia: Web reference. Definition of heartbeat. Last accessed 15 November 2017. https://www.pcmag.com/encyclopedia/term/44190/heartbeat

  10. Hong, J.W., et al.: Enterprise network traffic monitoring, analysis, and reporting using web technology. J Netw Syst Manage. 9(1), (2001)

    Google Scholar 

  11. Stallings, W.: SNMP, SNMPv2, SNMPv3, and RMON 1 and 2, 3rd edn. Addison-Wesley (1999)

    Google Scholar 

  12. ITU-T, Information Technology, Common Management Information Protocol (CMIP)–Part 1: Specification, Recommendation X.711 (1991)

    Google Scholar 

  13. Techopedia home dictionary tags. Web reference. Bricking-definition and explanation. https://www.techopedia.com/definition/24221/bricking. Last accessed on 11/15/2017

  14. Simpson, W.R., Foltz, K.E.: Assured identity for enterprise level security. In: Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering 2017, London, UK, pp. 440–445, 5–7 July 2017

    Google Scholar 

  15. TechTarget Search Mobile Computing: Web reference. Remote wipe. http://searchmobilecomputing.techtarget.com/definition/remote-wipe. Last accessed on 11/15/2017

  16. Simpson W.R.: CRC Press, Enterprise level security – securing information systems in an uncertain world, May 2016. Auerbach Publications. ISBN 9781498764452, 397 pp.

    Google Scholar 

  17. Simpson, W.R., Foltz, K.E.: Enterprise level security: insider threat counter-claims. In: Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering and Computer Science 2017, San Francisco, USA, pp. 112–117, 25–27 October 2017

    Google Scholar 

  18. Simpson, W.R., Foltz, K.E.: Proceedings of the 22nd International Command and Control Research and Technology Symposium (ICCRTS), Escalation of access and privilege with enterprise level security, Los Angeles, CA, pp. TBD, September 2017

    Google Scholar 

  19. Simpson, W.R., Foltz, K.E.: Proceedings of the 19th International Conference on Enterprise Information Systems (ICEIS 2017), vol. 1, pp. 177–184, Porto, Portugal, 25–30 April, 2017, Enterprise Level Security with Homomorphic Encryption. SCITEPRESS – Science and Technology Publications.

    Google Scholar 

  20. Foltz, K.E., Simpson, W.R.: Enterprise considerations for ports and protocols. In: Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering and Computer Science 2016, San Francisco, USA, pp.124–129, 19–21 October 2016

    Google Scholar 

  21. Foltz, K.E., Simpson, W.R.: Simplified key management for digital access control of information objects. In: Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering 2016, London, UK, pp. 413–418, 29 June–1 July 2016

    Google Scholar 

  22. Foltz, K.E., Simpson, W.R.: Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI, Enterprise Level Security – Basic Security Model, vol. I, WMSCI 2016, Orlando, Florida, pp. 56–61, 8–11 March 2016

    Google Scholar 

  23. Foltz, K.E., Simpson, W.R.: Wessex Institute, Proceedings of the International Conference on Big Data, BIG DATA 2016. Access and Privilege in Secure Big Data Analysis. Alicante, Spain, pp. 193–205, 3–5 May 2016

    Google Scholar 

Download references

Acknowledgment

This work was supported in part by the U.S. Secretary of the Air Force and The Institute for Defense Analyses (IDA). The publication of this chapter does not indicate endorsement by any organization in the Department of Defense or IDA, nor should the contents be construed as reflecting the official position of these organizations. The authors would especially like to acknowledge the support of Dr. Margaret Myers without whose support and encouragement much of this would not be accomplished.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to William R. Simpson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Simpson, W.R., Foltz, K.E. (2019). Managing Enterprise End-Point Devices. In: Ao, SI., Gelman, L., Kim, H. (eds) Transactions on Engineering Technologies. WCE 2018. Springer, Singapore. https://doi.org/10.1007/978-981-32-9531-5_15

Download citation

Publish with us

Policies and ethics