{"id":15007,"date":"2014-09-23T17:22:47","date_gmt":"2014-09-23T17:22:47","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2608"},"modified":"2020-02-26T10:55:56","modified_gmt":"2020-02-26T15:55:56","slug":"new-features-in-ios-8-in-light-of-byod-and-corporate-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/new-features-in-ios-8-in-light-of-byod-and-corporate-security\/15007\/","title":{"rendered":"New features in iOS 8 in light of BYOD and corporate security"},"content":{"rendered":"<p>iOS 8 arrived almost a week ago with less than the usual fanfare. The few visual changes are insignificant, but it has a lot going on under the hood especially in terms of security.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>Apple revealed that it had patched 53 vulnerabilities from earlier versions and some are quite serious. For instance, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-4364\" target=\"_blank\" rel=\"noopener nofollow\">this one<\/a>, allowed remote attackers to calculate credentials by offering LEAP authentication from a crafted Wi-Fi access point and then performed a cryptographic attack against the MS-CHAPv1 hash.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>New features in iOS 8 in light of BYOD and corporate security #enterprisesec #BYOD<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FyJ3j&amp;text=+New+features+in+iOS+8+in+light+of+BYOD+and+corporate+security+%23enterprisesec+%23BYOD\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Other more dangerous vulnerabilities could have allowed local users to escalate privileges, install unverified apps, or run the code with kernel or system privileges.<\/p>\n<p>Even though iOS 8 arrived with digital band-aids, bandages, plasters, and digital insecticides to eradicate those bugs, there\u2019s even more.<\/p>\n<p>Interestingly, Apple emphasizes security features oriented to enterprise. This is by no means surprising, given that for years iOS devices have been dominating once-glorious Blackberry\u2019s ancestral lands: The share of Apple\u2019s smartphones may be slimmer than that of Android, but iOS holds 88% of enterprise apps activation, <a href=\"http:\/\/media.www1.good.com\/documents\/rpt-mobility-index-q2-2014.pdf\" target=\"_blank\" rel=\"noopener nofollow\">according to Q2, 2014 data<\/a> from Enterprise mobile services vendor Good Technology. Android is growing, but remains far behind for now.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/09\/06020135\/wide3-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2610\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/09\/06020135\/wide3-1.png\" alt=\"wide\" width=\"1000\" height=\"667\"><\/a><\/p>\n<p>That also means there is a strong demand for BYOD security features in the enterprise segment. How has Apple responded?<\/p>\n<p>1. <strong>Expanded data protection<\/strong>: passcode protection of all the major data types, including all third-party apps together with native Calendar, Contacts, Mail, Messages, Notes and Reminders. Apps are protected with a passcode until after the device is unlocked following a reboot.<\/p>\n<p><strong>2. Per message S\/MIME<\/strong>: allows users to sign and encrypt individual messages for stronger control over mail encryption. This may be important, since it is not imperative to encrypt every single message (not all e-mail software is able to handle S\/MIME), but it is a proper security practice to encrypt end-to-end sensitive messages. Apple has <a href=\"http:\/\/support.apple.com\/kb\/HT4979\" target=\"_blank\" rel=\"noopener nofollow\">an explanation for the procedure<\/a> on its Support website.<\/p>\n<p><strong>3<\/strong>.<strong>MDM features<\/strong> include new <strong>device restrictions<\/strong> to prevent users from adding their own restrictions or wiping their devices. This is an obvious enterprise-oriented feature \u2013 insurance against occasional (or not-so-occasional) wiping of a corporate-owned device by its current user. IT departments can also see the last time a device was backed up to iCloud so they know whether it\u2019s safe to perform certain tasks. A new remote management UI makes enrolling and understanding the impact of MDM easier and more transparent for users. MDM also enables IT staff to help users authenticate to enterprise apps using certificate-based single sign-on (SSO).<\/p>\n<p><strong>4. Certificate-support for SSO<\/strong> in iOS 8 allows the use of certificate-based single sign-on for users to authenticate to enterprise apps. Or, simply put, users are able to switch between enterprise apps without having to enter their passwords every time.<\/p>\n<p><strong>5. Document management rules<\/strong>: IT departments are able to control which apps can open documents downloaded from enterprise domains using Safari. They can also set up rules for controlling which apps can open documents from iCloud Drive. Also iBooks, ePub, PDF docs can be now \u201cautomatically\u201d pushed to user devices using the aforementioned MDM tools. When the materials are no longer necessary, they can be removed remotely.<\/p>\n<p><strong>6. Always-on VPN<\/strong> remains available in iOS 8, despite rumors that it will go away. Users still won\u2019t need to manually reconnect to their company\u2019s VPN every time they need to access it.<\/p>\n<p><strong>7. Content filtering APIs<\/strong> will enable third-party networking (VPN) developers to create tools to prevent users from having access to inappropriate content, whether users try to access it through a browser or in an app. This is a somewhat \u201cdraconic\u201d measure, but employers have a right to prevent employees from accessing online casinos or adult sites during the day using corporate networks. It\u2019s not about productivity alone; it\u2019s also about security.<\/p>\n<p>On a darker note, iOS 8 also generates some extra potential threats. We mentioned them <a href=\"https:\/\/business.kaspersky.com\/ios-8-arrives-security-consequences\/1959\" target=\"_blank\" rel=\"noopener nofollow\">in our earlier post<\/a>. The first is a single password (passcode) for almost everything. Passwords are a notorious weak spot in any security system.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>iOS holds leadership in enterprise, so there\u2019s a clear demand for MDM features #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FyJ3j&amp;text=iOS+holds+leadership+in+enterprise%2C+so+there%26%238217%3Bs+a+clear+demand+for+MDM+features+%23enterprisesec+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Then there is a new level of openness for iOS. While the developers would welcome those 4000 APIs crafted just for them, this is also a risk of a wider than ever attack surface. Apple, of course, made a lot of effort to prevent attacks from happening, and it has very rarely allowed anything malicious to slip under the radar into the Apple Store. Still, the more developers can do, the higher the risk of bad code \u2013 bugs, flaws, vulnerabilities, and attacks tailored just for them.<\/p>\n<p>All developers can make mistakes, and <a href=\"http:\/\/www.blog.kaspersky.com\/keyboard-spies-now-on-iphones\/\" target=\"_blank\" rel=\"noopener nofollow\">bad things have happened to iOs.<\/a> It\u2019s possible there is no way to beat software vulnerabilities for good, but properly setting protective measures and \u201csecurity-in-mind\u201d features such as the ones listed above allow us to minimize the risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>iOS-based devices have a large share in the enterprise, which assures a strong demand for BYOD-oriented security features. A number of them arrive in iOS 8.<\/p>\n","protected":false},"author":209,"featured_media":15869,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[14,415,251,1250],"class_list":{"0":"post-15007","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apple","10":"tag-byod","11":"tag-corporate-security","12":"tag-ios"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/new-features-in-ios-8-in-light-of-byod-and-corporate-security\/15007\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/new-features-in-ios-8-in-light-of-byod-and-corporate-security\/15007\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/new-features-in-ios-8-in-light-of-byod-and-corporate-security\/15007\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apple\/","name":"Apple"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15007"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15007\/revisions"}],"predecessor-version":[{"id":33327,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15007\/revisions\/33327"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15869"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}