Solutions for Business Needs Secure Mobility
Keep workers productive and secure anywhere—on laptops, smartphones and tablets.
Armed with state of the art consumer mobile devices, employees today demand that IT allow them to select their own laptops, smartphones and tablets and support them whether they are working in the office or remotely. Some organizations are even providing platform allowances for employees to purchase their own devices. This Bring Your Own Device (BYOD) movement has been fueled by the dramatic growth and adoption of mobile platforms such as Apple iOS and Google Android, which have become a critical component of business infrastructure. While increasing flexibility and productivity, this BYOD trend introduces a host of new security challenges for IT.
Dell SonicWALL Mobility solutions allow IT to embrace the BYOD trend instead of banning the use of popular devices. Solutions such as Dell™ SonicWALL™ Secure Remote Access (SRA), E-Class SRA, SonicWALL™ Mobile Connect™ and Clean VPN™ offer a powerful and simple-to-use security and policy compliance approach that enhances the security management of mobile device networks.
Secure mobile devices.
Dell SonicWALL Mobility solutions deliver policy-enforced remote access to network resources from a multitude of mobile device platforms, including Apple Mac OS®, iOS and Google® Android™. Dell™ SonicWALL™ Mobile Connect™, a single unified client app for Apple® iOS and Google® Android™, provides smartphone and tablet, users superior network-level access to corporate and academic resources over encrypted SSL VPN connections, ensuring confidentiality and data integrity for users outside of the corporate network when they are traveling and using hot spots.
Dell SonicWALL Mobility solutions provide flexible and secure remote access for laptops. Dell SonicWALL Aventail™ Connect delivers “in-office” experience, enabling full access to network resources from laptops running Windows, Mac OS and Linux operating systems.
Keep remote access simple.
Simple, fast, easy-to-use VPN connectivity is essential to ensure secure and private communications when connecting through uncontrolled WiFi hot spots. Dell SonicWALL Mobility solutions enhance productivity and business continuity with full-featured, easy-to-manage, clientless or thin-client “in-office” connectivity to network resources over WiFi and 4G/3G.
Mobile application intelligence and control.
Mobile devices can be conduits for malware to enter networks either inadvertently or intentionally. They can also consume volumes of bandwidth through the use of social media, YouTube®, Netflix® streaming and other bandwidth-intensive applications. Administrators need to be able to control any application used on their network, regardless of device type, when the user is connected to the corporate office.
Dell SonicWALL Clean VPN.
Dell SonicWALL is the only provider that solves the challenges of access, security and control with one integrated solution that combines Dell SonicWALL Clean VPN™ and application intelligence and control. When Dell SonicWALL SSL VPN solutions are deployed with a Dell SonicWALL Next-Generation Firewall, Dell SonicWALL Clean VPN scans tunneled traffic to block malware from the mobile communications as a conduit into the network. Dell SonicWALL Application Intelligence and Control can allow increased bandwidth for critical applications, while limiting bandwidth for unimportant or unacceptable traffic. Dell SonicWALL Clean VPN™ delivers the critical dual protection of SSL VPN and high-performance Next-Generation Firewall necessary to secure both VPN access and traffic. The multi-layered protection of Clean VPN enables organizations to decrypt and scan for malware on all authorized SSL VPN traffic before it enters the network environment.
Dell SonicWALL Clean Wireless.
Dell SonicWALL Clean Wireless delivers secure, simple and cost-effective distributed wireless networking by integrating universal 802.11 a/b/g/n wireless features with a Dell SonicWALL Next-Generation Firewall for deep packet inspection, application control and content filtering. Dell SonicWALL Clean 4G/3G delivers the same level of protection over cellular wireless networks.
Both laptops and smartphones require encrypted access through a VPN to ensure the confidentiality of communications outside the network.. Different security practices apply depending upon whether the mobile devices are connecting from outside or inside the network perimeter. The following best practices include approaches for both policy and technology.
Best Practices for Both Laptops and Smartphones Connecting from Outside the Network Perimeter
1. Establish reverse web proxy.
Reverse proxies can authenticate and encrypt web-based access to network resources agnostically for both laptops and smartphones from outside the perimeter.
2. Establish VPN tunnels.
Agent-based encrypted SSL VPN tunnels add easy “in-office” network-level access to critical client-server resources for both laptops and smartphones connecting from outside the perimeter.
3. Scan VPN traffic through a Next-Generation Firewall.
Integrated deployment with a Next-Generation Firewall (NGFW) establishes a Clean VPN™ that decrypts then scans all the content and decontaminates threats before they enter the network.
4. Add strong authentication.
A secure solution for laptops, smartphones and tablets should integrate seamlessly with standard authentication methods such as two-factor authentication or integrated one-time passwords.
Best Practices Specifically for Laptops Connecting from Outside the Network Perimeter
5. Deploy endpoint control for laptops.
For managed and unmanaged Windows®, Macintosh® and Linux laptops outside the perimeter, endpoint control can determine the presence of security applications and allow, quarantine or deny access based on security policy and user identity. (This is less important for smartphones due to their white-listed app distribution environment).
6. Create a secure virtual desktop for laptops.
Secure virtual desktop environments can prevent users from leaving sensitive data behind on unmanaged Windows laptops by removing all files and links generated during the VPN session upon disconnection.
7. Enforce cache cleaner technology for laptops.
A cache cleaner can remove all browser-based tracking information from a Windows or Macintosh laptop once the user logs off or closes the browser.
Best Practices for Both Laptops and Smartphones Connecting from Inside the Network Perimeter
8. Scan WiFi traffic through a Next-Generation Firewall.
Integrating a Next-Generation Firewall with 802.11a/b/g/n wireless connectivity creates a Clean Wireless™ network when the laptop or smartphone user is inside the perimeter.
9. Control application traffic.
In general, mobile device apps are either critical business solutions or personal time-wasters. An application intelligence and control solution can enable IT to define and enforce how application and bandwidth assets are used.
10. Prevent data leakage.
Data leakage protection technology applied to laptops and smartphones inside the perimeter can scan inbound and outbound traffic and take policy-driven action to block or allow file transmission based upon watermarked content. It can also forward non-compliant watermarked files to IT, HR or management for further remediation.
11. Block inappropriate web access.
Content filtering for both laptops and smartphones (and even corporate desktops) used inside the perimeter can enforce company browsing policies for mobile users and help them comply with regulatory mandates by ensuring a non-hostile network environment.
12. Block outbound botnet attacks.
Anti-malware scanning can identify and block outbound botnet attacks launched from laptops and smartphones connected from inside the perimeter.
Dell SonicWALL mobility solutions.
Dell SonicWALL Mobility solutions can help organizations implement best practices to secure mobile device use within corporate network environments and outside corporate reach. Integrating the powerful capabilities of Dell SonicWALL Next-Generation Firewalls running application intelligence and control with Dell SonicWALL Secure Remote Access (SRA) solutions creates Clean VPN™ that delivers the critical dual protection of SSL VPN and high-performance Next-Generation Firewall necessary to secure both VPN access and traffic. The multi-layered protection of Clean VPN enables organizations to decrypt and scan for malware on all authorized SSL VPN traffic before it enters the network environment.
Dell™ SonicWALL™ Aventail® E-Class Secure Remote Access (SRA) Series, SRA Series for Small- to Medium-Sized Businesses (SMB), and Dell SonicWALL Next-Generation Firewalls deliver easy-to-use, policy-driven SSL VPN access to critical network resources from Windows®, Windows Mobile, Apple® Mac OS®, iOS, Linux®, and Google® Android™ devices plus optional Web Application Firewall and multi-platform remote support. Dell™ SonicWALL™ Mobile Connect™, a single unified client app for Apple® iOS and Google Android, provides smartphone and tablet users superior network-level access to corporate and academic resources over encrypted SSL VPN connections, ensuring confidentiality and data integrity for users outside of the corporate network when they are traveling and using hot spots.
The Dell SonicWALL SRA Series offers small- to medium-sized businesses granular unified policy, two-factor authentication, load balancing and high availability..
The Dell SonicWALL E-Class SRA Series delivers full-featured, easy-to-manage, clientless or thin-client in-office connectivity for up to 20,000 concurrent mobile users from a single appliance. Built on the powerful Dell SonicWALL Aventail SSL VPN platform, E-Class SRA using granular endpoint control interrogation connects only authorized users to approved resources.
Get answers to the tough questions.
When evaluating mobile security solutions, consider the following questions:
- Do you need to provide remote access to email, client/server and host-based/server-based applications, file shares, printing or Virtual Desktop Infrastructure (VDI) solutions?
- Do you support road warriors and other remote users on Windows®, Macintosh®, or Linux® mobile devices?
- Do you want to reduce costs and overhead by simplifying remote access deployment and management costs for employees, business partners and contractors?
- Are you concerned about viruses, malware and other attacks to your network if you were to provide remote access to your partners and your employees?
Dell SonicWALL Secure Remote Access solutions.
Dell™ SonicWALL™ Secure Remote Access (SRA) offers client less network-level access for Windows, Windows Mobile, Apple® MacOS®, iOS, Linux, and Google Android®, plus optional Web Application Firewall and multi-platform remote support. Dell™ SonicWALL™ Aventail® E-Class SRA delivers full-featured, easy-to-manage, client less or thin-client in-office connectivity for up to 20,000 concurrent mobile-enterprise users from a single appliance. Dell SonicWALL Clean VPN™ delivers the critical dual protection of high-performance Next-Generation Firewall and SSL VPN necessary to secure both VPN access and traffic.
The proliferation of mobile device technology has fueled the Consumerization of IT. Upgrading to the latest Dell SonicWALL mobility solution gives employers the flexibility to provide employees, business partners and contractors secure remote access to corporate resources from a wide variety of device types. The solution is easy to deploy and manage and lowers the overall cost of providing secure access.
Access is clientless or through lightweight web-delivered clients, easing deployment, eliminating administrative overhead and minimizing support calls. The Dell™ SonicWALL™Mobile Connect™ unified client app for iOS is easily downloaded by end users from the App Store℠.
Flexible OS support.
Dell SonicWALL mobility solutions provide policy-enforced remote access to network resources from mobile device platforms such as iOS, Google Android® and Windows® Mobile, as well as traditional laptop platforms, including Mac OS®, Windows and Linux®.
Dell SonicWALL Mobility solutions lower IT costs by centralizing management to a single gateway that extends secure remote access via SSL VPN for both internal and mobile users across multiple mobile device platforms to all network resources including web-based, client/server, host-based and Virtual Desktop Infrastructure (VDI) solutions.
- view pdf
In the big picture, telecommuters help companies lower their operating costs. When telecommuters use their own space, power and cooling to work from home, savvy employers adjust their facilities practices to pocket that savings. Download this e-book today to read the top ten trends in telecommuting.17 Aug 2012 / PDF: 1.390 MB / EB-35
- view pdf
With company-issued, IT-controlled laptops, IT has traditionally had the option to lock down the operating system to prevent the installation of potentially insecure or non-approved applications. This consumerization of IT (as well as the budgetary incentive of offsetting inventory costs) has led companies to establish bring your own device (BYOD)14 Dec 2011 / PDF: 1.770 MB / EB-236
policies that enable employees to select their own personal mobile devices for use at work
- view pdf
Many technologies that enterprises adopt for their information systems often have roots in consumer applications.1 More employees are extending their workday and increasing office efficiency by leveraging the same technology they use to enhance their personal livesin particular, smartphone and tablet devices. Many corporate end users do not allow IT to dictate which smartphone or tablet platform they can use. A growing number will use whatever application, device or technology they want, regardless of corporate IT policies.2 IT has effectively lost its ability to completely mandate the choice of smartphone or tablet access in a corporate setting. This ebook details the 10 best practices for controlling smartphone and tablet access to corporate networks.1 Feb 2012 / PDF: 4.490 MB / EB-238
- view pdf
Teleworking continues to take off as an attractive business practice, with increasing numbers of employers offering related programs to their employees in an effort to cut commuting and facilities costs while boosting morale and retention. With mobile technologies ranked among the top 10 technology priorities for 2010, savvy business leaders have clearly caught on to the broader trend of user mobility. However, taking full advantage of the benefits of user mobility obviously depends on being able to address the related security challenges. Learn 1) how consumerization of IT is changing the way we do business, 2) the most effective way of handing device proliferation, and 3) how SonicWALL can help you fully realize the benefits of having a truly mobile workforce.30 Nov 2011 / PDF: 0.600 MB / SB-13
- view pdf
A Clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications.22 Jul 2010 / PDF: 0.120 MB / WP-17
- view pdf
Smartphones have joined laptops as de facto network endpoints in corporations, academic institutions and government entities. In managing security for these mobile devices, IT must be aware of the differences, as well as similarities, between laptop and smartphone platforms. With these distinctions in mind, IT can apply best practices to ensure the confidentiality and security of corporate communications from both inside and outside of the network perimeter.30 Nov 2011 / PDF: 0.060 MB / WP-1
- view pdf
Smartphones and tablets are everywhere today equally found in the hands of consumers or employees of enterprise organizations. But for all their apparent user-friendly features, these mobile devices can represent a significant threat to corporate data. This paper examines what IT departments need to know before deciding on the right smartphone and tablet platform for their business needs,and presents useful advice on how SonicWALL® solutions can help meet those needs.27 Apr 2012 / PDF: 0.070 MB / WP-109
- view webinar
Join SonicWall and Forrester Research Director, Robert Whiteley to learn how 2010 will usher in a new wave of investment in mobility technologies among savvy enterprises. Robert Whiteley will discuss findings from Forrester’s extensive studies into the work habits and mobility needs of information workers, task workers and a growing class of workers – the “mobile wannabe” – who, together, are making up a larger and larger portion of your workforce. This session will explore: • Who are the mobile workers of today and what does the mobile workforce of the future hold in store for IT? • What tools, in terms of networks, devices and applications, matter to these workers • What steps can IT take today to engender and secure an environment of mobility – and therefore productivity – for these workers? About Rob Whiteley Robert serves Infrastructure & Operations professionals. Prior to joining the Infrastructure & Operations team, Robert was a research director on the security and risk team. He led Forrester's research efforts on IT security frameworks; governance, risk, and compliance (GRC); identity and access management (IAM); application security; data security; and IT infrastructure security. He also provided Forrester's coverage of specific security topics that includes network access control (NAC), network segmentation, and branch office security. About Chris Witeck: As a Director of the Product Management Team at SonicWALL, Chris Witeck drives the development road map for the all SonicWALL SSL VPN products and services. His responsibilities include defining product requirements, establishing relationships with key customers to drive those requirements, and helping to define strategic marketing partnerships.1 Apr 2010 / ODW-99
- view webinar
Join SonicWALL's Patrick Sweeney, VP of Product Management, as he offers up practical advice on how to enable mobility in your workforce. People are increasingly demanding the ability to use their personal communications devices to access email and network resources when they are away from the office. Come learn how to embrace this trend to allow people to use iPhones, iPads, Android phones and more not only at home but also at work.9 Dec 2011 / ODW-124