byod
78 TopicsBIG-IP Edge Client 2.0.2 for Android
Earlier this week F5 released our BIG-IP Edge Client for Android with support for the new Amazon Kindle Fire HD. You can grab it off Amazon instantly for your Android device. By supporting BIG-IP Edge Client on Kindle Fire products, F5 is helping businesses secure personal devices connecting to the corporate network, and helping end users be more productive so it’s perfect for BYOD deployments. The BIG-IP® Edge Client™ for all Android 4.x (Ice Cream Sandwich) or later devices secures and accelerates mobile device access to enterprise networks and applications using SSL VPN and optimization technologies. Access is provided as part of an enterprise deployment of F5 BIG-IP® Access Policy Manager™, Edge Gateway™, or FirePass™ SSL-VPN solutions. BIG-IP® Edge Client™ for all Android 4.x (Ice Cream Sandwich) Devices Features: Provides accelerated mobile access when used with F5 BIG-IP® Edge Gateway Automatically roams between networks to stay connected on the go Full Layer 3 network access to all your enterprise applications and files Supports multi-factor authentication with client certificate You can use a custom URL scheme to create Edge Client configurations, start and stop Edge Client BEFORE YOU DOWNLOAD OR USE THIS APPLICATION YOU MUST AGREE TO THE EULA HERE: http://www.f5.com/apps/android-help-portal/eula.html BEFORE YOU CONTACT F5 SUPPORT, PLEASE SEE: http://support.f5.com/kb/en-us/solutions/public/2000/600/sol2633.html If you have an iOS device, you can get the F5 BIG-IP Edge Client for Apple iOS which supports the iPhone, iPad and iPod Touch. We are also working on a Windows 8 client which will be ready for the Win8 general availability. ps Resources F5 BIG-IP Edge Client Samsung F5 BIG-IP Edge Client Rooted F5 BIG-IP Edge Client F5 BIG-IP Edge Portal for Apple iOS F5 BIG-IP Edge Client for Apple iOS F5 BIG-IP Edge apps for Android Securing iPhone and iPad Access to Corporate Web Applications – F5 Technical Brief Audio Tech Brief - Secure iPhone Access to Corporate Web Applications iDo Declare: iPhone with BIG-IP Technorati Tags: F5, infrastructure 2.0, integration, cloud connect, Pete Silva, security, business, education,technology, application delivery, ipad, cloud, context-aware,infrastructure 2.0, iPhone, web, internet, security,hardware, audio, whitepaper, apple, iTunes2.5KViews0likes3CommentsBait Phone
You may be familiar with the truTV program Bait Car, where the police place a vehicle equipped with hidden cameras and radio trackers in various areas to catch a would be car thief in the act. It’s kinda fun to watch people ‘check out’ the car, check out the surroundings and decide to jump in and drive off. You get to see their excitement as they think that they’ve just won the jackpot along with the utter despair as officers remotely kill the car and the thief is surrounded. Even the excuses as to why they are driving it are hilarious. ‘I was just moving it for my friend, so they wouldn’t get a ticket, whose name I forgot and I also can’t remember where they live.’ In the UK, they got something similar except with mobile phones called ‘Operation Mobli.’ Plain clothes police purposely left "bait" phones embedded with tracking devices in nine pubs and bars across the towns of Hastings and St Leonards in Sussex. I’m not sure what makes and models of phones were left for the taking but none of the baited devices were stolen. In every case, an honest patron noticed the ‘forgotten’ phone and turned in to the bar staff. Some might describe this sting as a failure but according to the Sussex Police’s press release Sgt Ché Donald said, ‘This was an excellent result and my faith has been restored as the phones were honestly handed in.’ I often write about the potential perils of losing a smartphone crammed with private data and all the unfortunate circumstances that follow. If it gets into the wrong hands then that is the case yet we must also remember that there are plenty of good, honest folks out there who will do the right thing when they find something that doesn’t belong to them. Maybe they’ve seen police sting shows, maybe they’ve lost something themselves, maybe their parents raised them right or maybe it’s simply kindness and honesty that’s built into every one of us. Human’s are capable of the greatest good and the nastiest of evil, it’s all how we decide to play it. ps References: Operation Mobli deters mobile phone thieves in Hastings Police mobile phone sting fails when.. err.. no handsets stolen Mobile-phone 'sting' reveals honesty of Sussex pubgoers Police Sting Operation Yields No Mobile Phone Thefts It's legal: cops seize cell phone, impersonate owner What’s in Your Smartphone? Freedom vs. Control BYOD–The Hottest Trend or Just the Hottest Term Will BYOL Cripple BYOD?699Views0likes1CommentBIG-IP Edge Client v1.0.6 for iOS 7
With all your other iOS 7 updates (if you've made the plunge), if you are running the BIG-IP Edge Client on your iPhone, iPod or iPad, you may have gotten an AppStore alert for an update. If not, I just wanted to let you know that version 1.0.6 of the iOS Edge Client is available at the AppStore with iOS 7 support. Customers who use UDID in their access policies should have users update to this version. The BIG-IP Edge Client application from F5 Networks secures and accelerates mobile device access to enterprise networks and applications using SSL VPN and optimization technologies. Access is provided as part of an enterprise deployment of F5 BIG-IP Access Policy Manager, Edge Gateway, or FirePass SSL-VPN solutions. BIG-IP Edge Client for iOS Features: Provides accelerated mobile access when used with F5 BIG-IP Edge Gateway. Automatically roams between networks to stay connected on the go. Full Layer 3 network access to all your enterprise applications and files. ps Related: Manual: BIG-IP Edge Apps Client Compatibility Matrix BIG-IP Edge Client and BIG-IP Edge Portal for Apple iOS and Android software support policy Release Note: BIG-IP Edge Client for iOS 1.0.6 Advanced Edge Client Installation for Windows–The Mysteries of Windows Installer Revealed F5 BIG-IP Edge Client F5 BIG-IP Edge Portal F5 BIG-IP Edge Client for Android Technorati Tags: f5,big-ip,edge client,ssl-vpn,mobile,smartphone,ios7,apple,iphone,ipad,silva,remote access,security,secure access,apm Connect with Peter: Connect with F5:602Views0likes1CommentBIG-IP Edge Client v1.0.4 for iOS
If you are running the BIG-IP Edge Client on your iPhone, iPod or iPad, you may have gotten an AppStore alert for an update. If not, I just wanted to let you know that version 1.0.4 of the iOS Edge Client is available at the AppStore. The main updates in v1.0.4: IPv6 Support Localization New iPad Retina Graphics The BIG-IP Edge Client application from F5 Networks secures and accelerates mobile device access to enterprise networks and applications using SSL VPN and optimization technologies. Access is provided as part of an enterprise deployment of F5 BIG-IP Access Policy Manager, Edge Gateway, or FirePass SSL-VPN solutions. BIG-IP Edge Client for iOS Features: Provides accelerated mobile access when used with F5 BIG-IP Edge Gateway. Automatically roams between networks to stay connected on the go. Full Layer 3 network access to all your enterprise applications and files. I updated mine today without a problem. ps479Views0likes0CommentsDid you know that F5 BIG-IP can help smartly scale BYOD policy services ?
Does your corporate IT like to smartly address secure device identity management for BYOD endpoints ? Does your enterprise like to deploy device policy management solutions that are highly scalable ? Then you are sure to benefit from what we have to offer. It is a no brainer that the trends of Mobility and workload migrations to Cloud are an added impetus for increased profiling, monitoring and administrative traffic pertaining to devices connecting to the Network. This applies not just at a corporate headquarters site but also at geographically distributed sites, large Branches and Provider-hosted facilities, which get the services delivered out of the provider data center housing identity management solutions. F5 LTM can now be deployed with Cisco Identity Service Engine (ISE), which is a market leading Network access security policy management platform, to load balance identity services traffic What scenarios need load balancing of Cisco ISE traffic ? As we look at ways to provision thousands of BYOD endpoints, ISE devices need to be clustered so the policy service nodes (which offer run time network device services such as posturing, profiling, guest web services, AAA) can effectively address up to about 250,000 endpoints. Identity management is much more than basic RADIUS authentication and includes device profiling, endpoint posturing, administrative activities, monitoring, troubleshooting and data logging. Once basic authentication is complete, these devices - which could be static such as in the case of a video IP surveillance camera or mobile such as in the case of an employee owned smart tablet – need to be continuously postured, policy administered and monitored. The policy service node in the ISE persona handles run time traffic, which increases as the number of endpoints handled increases. How does F5 LTM specifically help ? As you cluster the ISE devices, traffic needs to be load-balanced and in cases such as device profiling, flow persistence with the same policy service node needs to be ensured. The F5 BIG-IP LTM enables load-balancing for the ISE policy node clusters and helps with health monitoring of the same ISE servers. Most importantly, customizable F5 iRules can be created to handle ‘persistence traffic’ differently and ‘Persistence profiles’ can be applied across Virtual servers. What benefits can this Solution provide ? Customers deploying the F5 LTM and Cisco ISE solution can • Significantly improve performance, scalability and availability for secure corporate LAN access traffic (ISE RADIUS, Profiling, and Web Service) • Optimize corporate LAN authentication, profiling, and database replication traffic by ensuring stickiness with same node in the ISE cluster that services requests • Enable Health monitoring and High availability of ISE servers using F5 load balancer probes • Simplify configuration for network devices and facilitate addition, changes and removals of the same for centralized servers Solution demo at Cisco Live Milan Stopby the F5 Networks booth (stand P2) at Cisco Live Milan 2015 to chat with technical experts and see a demonstration of the solution and its benefits. To Learn Further Please visit www.cisco.com/go/ise for more on Cisco ISE and https://f5.com/products/modules/local-traffic-manager for F5 BIG-IP LTM.403Views0likes0CommentsThe Digital Dress Code
Coming to an office near you. If you thought the Bring Your Own Device (BYOD) craze was a headache, just wait until button cameras, smart watches, and spy glasses (already here) are a daily occurrence in the office. Workplace #wearables will be a huge challenge in the coming years as more devices, clothing and pretty much any 'thing' with a chip or sensor become commonplace in our society. The device explosion with IoT (Internet of Things) will be much larger than any of these mobile phones we carry around. A couple new reports examine the impact of IoT on businesses. PricewaterhouseCoopers (PwC) released a report on wearable technology after surveying 1,000 consumers, 314 of which use some form of wearable, as part of "The Wearable Future" report. Some key findings included that 77% of respondents thought that a top benefit of wearable technology is the potential to make employees more productive and efficient. Honestly, when I read that I immediately thought of my boss's hologram standing behind me in my home office watching my work. 70% expect that their office should allow the use of wearables...probably the same folks who wanted to bring their own tablet and 46% felt that organizations should fund wearables rather than the dreaded BYOD. The idea is that if the technology is simple to use and integrates with other devices, that should boost productivity and lift profits. Even so, there needs to be significant investment to ensure the camera shirt buttons can talk to Exchange, ya know. The biggest concerns, according to PwC, include the risk of security breaches, invasion of privacy, tech dependence, having too many devices and on a more human level, not being able to relate to others or simply looking silly with all those attachments. PwC also looked at the industries that will capitalize on the wearable market. Entertainment will be more 'immersive and fun'; Social Media gets more real time updates from your clothes; Gaming can be more visually and physically engaging; Advertisers will want the space on your back; Healthcare will track your vitals; and Retail could offer “pleasant, efficient” shopping experiences. Business Insider recently released a report looking at the device growth They feel that by 2019, IoT devices will more than double the size of the smartphone, tablet, PC, wearable and connected car combined. That's huge. All the software, hardware, maintenance and management of IoT could add $1.7 trillion to the global economy by 2019. They also feel that the main benefit of IoT will be the efficiencies and cost savings by giving the user more control. But, there are sill few standards and even less compatibility so that needs work, not to mention the security risks inherent in these nouns. The processing power, storage, cameras, sensors and everything else will far surpass the USB-stick risks of years past, plus the potential of all this corporate data getting stored in personal clouds could spell big trouble. And how are all these nouns going to found on the internet? DNS of course! Once all these various wearables hit the office, DNS will be the thing that allows us people to find them threads. I truly feel that DNS will be one of the most strained technologies as more connections happen in the office and will be discussing this trend at the ThingsExpo - which is part of SYS-CON Media's CloudExpo in Santa Clara this week. ps Related: Employees Excited, Concerned About Wearables in the Workplace Medical Devices: Safeguarding the Healthcare Revolution How Smart, Connected Products Are Transforming Competition The 'Internet of Things' Will Be The World's Most Massive Device Market And Save Companies Billions Of Dollars As Wearables Get Hot, These 6 Industries Are Poised to Capitalize Why the Internet of Things will turn data computing on its head My Sensored Family The Internet of...(Drum Roll Please)...Band-Aids?!? The Breach of Things Technorati Tags: iot,things,wearables,workplace,sensors,silva,devices,byod,smart,f5,big data,privacy Connect with Peter: Connect with F5:402Views0likes0CommentsQ. The Safest Mobile Device? A. Depends
Depends?!? Well, isn't that the answer to a lot of things in this world? Often our answer depends on the context of the question. Sometimes the answer depends on who you ask since it may only be an opinion or a feeling. Sometimes the answer is based on a survey, which is a moment in time, and might change a day later. I write a lot about secure mobile access, especially to the enterprise, so I'm obviously interested in any stories about the risks of mobile devices. There were a couple over the last few weeks that really caught my attention since they seemed to completely contradict each other. Earlier in the month, SC Magazine had a story titled, RSA 2013: iOS safer than Android due to open app model, patching delays which covered much of what many already feel - due to Apple's controlled ecosystem, the apps that are available are less of a risk to a user. They made note of the McAfee Threats Report which says Android malware almost doubled from the 2nd to 3rd quarter of 2012. Then just last week, also from SC Magazine, an article titled, Study finds iOS apps to be riskier than Android appeared. What? Wait, I thought they were safer. Well, no apparently. But before I go any further, I do need to mention that the author of both articles, Marcos Colon (@turbomarcos) does reference his first article and says, 'Security concerns surrounding the Android platform have always taken a back seat to that of iOS, but a new study challenges that notion,' so slack has been extended. :-) Anyway, according to an Appthorityreport, iOS apps pose a greater risk and has more privacy issues (to users) than Android. Appthority's 'App Reputation Report' looked at 50 of the top free apps available on both platforms and investigated how their functionality affects user privacy. They looked for “risky” app etiquette like sending data without encryption, sharing information with 3rd-parties, and gaining access to the users' calendars. (Chart) In this particular study, in almost all the cases, iOS gave access to the most info. Of the 50 apps, all of them (100%) sent unencrypted data via iOS but 'only' 92% sent clear text on Android. Tracking user location: 60% on iOS verses 42% on Android. Sharing user data with third-parties: 60% on iOS verses 50% on Android. When it comes to accessing the user's contacts, something we really do not like, 54% of iOS apps accessed the contact list compared to only 20% on Android. One of biggest differences, according to the article, is that at least on Andriod users are presented with a list of content the app wants to hook and the user can decide - on iOS, permissions can be changed once the app is installed. To claim one device is either 'safer,' or 'riskier' is somewhat a moot point these days. Any time you put your entire life on a device and then rely on that device to run your life, there is risk. Any time we freely offer up private information, there is a risk. Any time we rely on others to protect our privacy and provide security, there is a risk. Any time we allow apps access to personal information, there is risk. But like any potential vulnerability, individuals and organizations alike, need to understand the potential risk and determine if it something they can live with. Security is risk management. To top all this off and really what made me write this, was an @GuyKawasaki tweet titled Love Logo Swaps and among the many twists on brands, was this one: And it all made sense. ps Related: RSA 2013: iOS safer than Android due to open app model, patching delays Study finds iOS apps to be riskier than Android Smartphone hacking comes of age, hitting US victims 6 Steps To Address BYOD: A Security Management Roadmap 10 Awesome Logo Swaps Inside Look - F5 Mobile App Manager Is BYO Already D? Will BYOL Cripple BYOD? Freedom vs. Control BYOD–The Hottest Trend or Just the Hottest Term BYOD 2.0 – Moving Beyond MDM with F5 Mobile App Manager Technorati Tags: mobile device,smartphone,ios,android,privacy,safety,security,silva,byod,mam,f5,risk Connect with Peter: Connect with F5:341Views0likes0CommentsWhere Do You Wear Your Malware?
The London Stock Exchange, Android phones and even the impenetrable Mac have all been malware targets recently. If you’re connected to the internet, you are at risk. It is no surprise that the crooks will go after whatever device people are using to conduct their life – mobile for example, along with trying to achieve that great financial heist….’if we can just get this one big score, then we can hang up our botnets and retire!’ Perhaps Homer Simpson said it best, ‘Ooh, Mama! This is finally really happening. After years of disappointment with get-rich-quick schemes, I know I'm gonna get Rich with this scheme...and quick!’ Maybe we call this the Malware Mantra! Malware has been around for a while, has changed and evolved over the years and we seem to have accepted it as part of the landmines we face when navigating the internet. I would guess that we might not even think about malware until it has hit us….which is typical when it comes to things like this. Out of sight, Out of mind. I don’t think ‘absence makes the heart grow fonder’ works with malware. We certainly take measures to guard ourselves, anti-virus/firewall/spoof toolbars/etc, which gives us the feeling of protection and we click away thinking that our sentinels will destroy anything that comes our way. Not always so. It was reported that the London Stock Exchange was delivering malvertising to it’s visitors. The LSE site itself was not infected but the pop-up ads from the site delivered some nice fake warnings saying the computer was infected and in danger. This is huge business for cybercriminals since they insert their code with the third-party advertiser and never need to directly attack the main site. Many sites rely on third-party ads so this is yet another area to be cautious of. One of the things that Web 2.0 brought was the ability to deliver or feed other sites with content. If you use NoScript with Firefox on your favorite news site (or any major site for that matter), you can see the amazing amount of content coming from other sources. Sometimes, 8-10 or more domains are listed as content generators so be very careful as to which ones you allow. With the success of the Android platform, it also becomes a target. This particular mobile malware looks and acts like the actual app. The problem is that it also installs a backdoor to the phone and asks for additional permissions. Once installed, it can connect to a command server and receive instructions; including sending text messages, add URL’s/direct a browser to a site along with installing additional software. The phone becomes part of a botnet. Depending on your contract, all these txt can add up leading to a bill that looks like you just bought a car. In fact, Google has just removed 21 free apps from the Android Market saying its malware designed to get root access to the user’s device. They were all masquerading as legitimate games and utilities. If you got one of these, it’s highly recommended that you simply take your phone back to the carrier and swap it for a new one, since there’s no way of telling what has been compromised. As malware continues to evolve, the mobile threat is not going away. This RSA2011 recap predicts mobile device management as the theme for RSA2012. And in related news, F5 recently released our Edge Portal application for the Android Market – malware free. Up front, I’m not a Mac user. I like them, used them plenty over the years and am not opposed to getting one in the future, just owned Windows devices most of my life. Probably due to the fact that my dad was an IBM’r for 30 years. Late last week, stories started to appear about some beta malware targeting Macs. It is called BlackHole RAT. It is derived from a Windows family of trojans and re-written to target Mac. It is spreading through torrent sites and seems to be a proof-of-concept of what potentially can be accomplished. Reports say that it can do remote control of an infected machine, open web pages, display messages and force re-boots. There is also some disagreement around the web as to the seriousness of the threat but despite that, criminals are trying. Once we all get our IPv6 chips installed in our earlobes and are able to take calls by pulling on our ear, a la Carol Burnett style, I wonder when the first computer to human virus will be reported. The wondering is over, it has already happened. ps Resources: London Stock Exchange site shows malicious adverts When malware messes with the markets Android an emerging target for cyber criminals Google pulls 21 apps in Android malware scare More Android mobile malware surfaces in third-party app repositories Infected Android app runs up big texting bills Ignoring mobile hype? Don't overlook growing mobile device threats "BlackHole" malware, in beta, aims for Mac users Mac Trojan uses Windows backdoor code I'll Believe Mac malware is a problem when I see it BlackHole RAT is Really No Big Deal 20 years of innovative Windows malware Edge Portal application on Android Market311Views0likes0CommentsYou Are the Device in 2016
… and the controller and data generator. Were you surprised with that new car in your driveway sporting a huge bow this holiday season? Yea, me neither. But we did get a new gaming console that doesn’t require you to hold a controller in your hand. You know The One. It has a camera that picks up your body movements and turns that into action on your screen. It’ll even scan your face and create a digitized, animated You right in front of your eyes. You can then choose your You to play games. Now I realize some of you have had these for several years but we’ve been stuck in 2010 at our house…at least with gaming consoles. For 2016, You are now the device, controller and data generator. The Consumer Electronics Show (CES) is this week and plenty of new gadgets are being unveiled to interact with our lives. Starting at the bottom, smart shoes might be the next big thing to hit stores this year. According to the manufacturer, you’ll be able to control the temperature of the shoe with a mobile app and it’ll count your steps more accurately than the thing you wear on your wrist or carry in your pocket. The temperature control idea is interesting since one of the ways to stay comfortable in the summer heat is to keep your feet cool. There’s also self-lacing shoes on display. A fitness company also unboxed smart footwear that tracks time and date, duration, distance and splits, without a runner having to carry other devices. As we move up the body, a smart belt called Belty is grabbing people’s attention. Like any other belt, it fits through your pant loops but the motorized insides will adjust loose when sitting and tighten up when you stand. You can also have it vibrate to remind you to stand every so often if you’re on your bottom too long. It keeps track, via a smartphone app, not only of your steps but also your expanding or diminishing waistline over time. Will it shame you come next Thanksgiving? Maybe not, but the sounds and sights of a roomful people unhinging their pants after a big meal might become an era gone by. There are also new fitness trackers, smart shirts, smartwatches, gesture controlled cars, grocery shopping fridges, and even a digital laser hair treatment that you put on your scalp for 90 seconds every night and the company claims that it’ll restore thinning hair. Home hubs will be built into smart televisions and fridge cams will allow you to see if the light really goes out when you close the door. Sensors in our society have become commonplace and while in the past they’ve been used to track weather, traffic conditions and how much we weigh, they are now attached to our bodies gathering information about us and reporting back. Forget about BYOD, we’re back to the old, ever popular BYOB – Bring Your Own Body. ps Related: Wearables Head to Tail Oh, Is That The Internet You're Wearing? The Digital Dress Code Connecting the Threads IoT Influence on Society Our Five Senses on Sensors Hacking the Internet of Things looms over CES Technorati Tags: f5,iot,things,ces,sensors,wearables,silva Connect with Peter: Connect with F5:305Views0likes0Comments