... Mobile App Reputation Services THE RADICATI GROUP, INC.
|
|
|
- Willis Stevens
- 10 years ago
- Views:
Transcription
1 . The Radicati Group, Inc Embarcadero Road, Suite 206 Palo Alto, CA Phone Fax THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding the role of App Reputation Services in delivering Enterprise Grade Mobile Security A Whitepaper by The Radicati Group, Inc.
2 Table of Contents Introduction The Growth in Number of Mobile Apps Different Layers of Mobile Security Current Approaches for Dealing with App Security The Webroot App Reputation Service Conclusions and Recommendations...11 This whitepaper was sponsored by Copyright May 2013, The Radicati Group, Inc. 2
3 INTRODUCTION Smartphones and tablets continue to be heavily adopted by enterprises and consumers alike and have changed the way people live and work. While this leads to greater user freedom and empowerment, it also opens the way to more security vulnerabilities than ever before, as mobile devices are increasingly targeted by hackers and cybercriminals. Although security concerns exist at all levels of the mobile ecosystem including mobile device hardware, the operating system layer, and the mobile browser capabilities nowhere is the threat of malware and malicious activity more challenging than at the application level. The sheer number of available apps and their various sources presents an enormous threat vector for malware, particularly as users are not always aware of the threats those apps can pose. While some of the billions of apps available via mobile app stores have undergone approval testing, others are only minimally vetted before being accepted for store distribution. The Apple App Store boasts 775,000 apps as of January 2013, and Google Play had 900,000 apps online as of May Apple has become famous for its rigorous approval process, but Google has taken a more relaxed stance, allowing app developers greater freedom to upload to the Play store. Regardless of the amount of testing that an app vendor may impose, the sheer volume of these apps makes it impossible for users and organizations to be certain which apps are trustworthy. In addition, app behavior can range widely from mildly annoying pop-ups, to unwanted overuse of device communication capabilities, to outright downloading of malicious code. The only way to successfully address the onslaught of apps and the risks they can represent is to utilize a mobile app reputation service. Mobile app reputation services can provide intelligence and granular threat assessments on millions of apps and are an essential aspect of a complete security strategy for mobile app developers, Mobile Device Management (MDM) vendors, mobile app vendors, mobile carriers, and anyone who needs to deliver application security to their customers. This whitepaper discusses the need for mobile app reputation assessment, and presents the Webroot App Reputation Service and the unique threat protection capabilities it offers to ensure that mobile applications are safe and compliant. In addition, the Webroot App Reputation Service provides a wealth of general information about app characteristics which can be used to set policies on app delivery and behavior permissions. Copyright May 2013, The Radicati Group, Inc. 3
4 1.0 THE GROWTH IN NUMBER OF MOBILE APPS The number of apps available for mobile devices continues to climb sharply. In early 2013, Apple reported App Store additions at an approximate rate of 20,000 per month, and Android apps were appearing at a similar pace. The publication process for apps is relatively simple, increasing not only the number of apps, but the likelihood of risk associated with each one. As of mid-2013, there had been approximately 100 billion app downloads, as Google announced its 48 billionth app download and Apple announced its 50 billionth a day later. Based on these trends, we anticipate an additional 100 billion app downloads within the next year. 2.0 DIFFERENT LAYERS OF MOBILE SECURITY The drastic increase in the number of apps available is fueled in large part by the growing number of mobile devices in use. The Bring Your Own Device (BYOD) trend has become popular across all verticals. While many organizations felt uneasy, initially, about employees carrying corporate data on devices that could so easily be misplaced or stolen, BYOD is rapidly becoming the norm. As more and more mobile devices continue to access and carry sensitive work-related information, mobile security is more important than ever. Today, we can think of mobile security as three different layers: The device layer protects and enforces policies on the physical hardware of a mobile device. Most mobile devices today come with cameras, GPS, Bluetooth, and other sophisticated hardware that can be exploited by cybercriminals. Securing these devicelevel features lays the foundation for enforcing security on the operating system and application layers, which rely on device-level features for input. The operating system layer is the driving force of a mobile device, taking input from the user and providing feedback in return. This layer is fundamental to device security, as it enforces passcodes for device access, executes remote wipe features, and blocks access to device communication resources, such as GPS and Bluetooth connectivity. However, protection at this layer is unable to recognize unwanted or malicious behavior by individual apps. Copyright May 2013, The Radicati Group, Inc. 4
5 The app layer is where security must address loss of data. Applications can store sensitive data that users need to access on a daily basis. In order to ensure the integrity of the data contained within apps, organizations use additional forms of authentication, e.g., encryption, VPN tunneling, etc. Furthermore, certain apps cannot be trusted, such as games or rogue mobile banking apps, and must be blacklisted based on their impact to user productivity, data exploitation, and other malicious or undesirable activity. Table 1 summarizes some of the security threats that may be found at each layer. Layer Device Operating System Applications Mobile Security Threats Threat Examples WiFi connecting to a rogue network; compromised Bluetooth connection; unauthorized camera usage; etc. Devices without a passcode; flaw or exploit in any native; required application (e.g. phone or Web browsing app); etc. Data is left unencrypted when sending over a network; device user is not authenticated when opening an app; etc. Table 1: Common Security Threats at Each Layer of a Mobile Device 3.0 CURRENT APPROACHES FOR DEALING WITH APP SECURITY The security elements for the device and operating system layers have remained manageable for MDM vendors. The apps, however, are difficult to manage, since they can be updated on a daily basis. This makes ensuring security at the application layer a very difficult proposition. Today, app security is normally addressed with some of the following techniques: Mobile device management is seen as the base level of security that utilizes device and operating system controls to keep devices secure. While this type of security can keep a device as a whole secure, the features available for applying granular protection to individual apps are very limited. Copyright May 2013, The Radicati Group, Inc. 5
6 App whitelisting/blacklisting addresses the security of applications on a mobile device. Administrators decide which apps to block or allow in a binary fashion. While this approach can address the problem of app security, the success of this approach is directly proportional to the number of man-hours an administrator spends examining and categorizing apps. With the rising volume of apps available, it is impossible for static whitelist/blacklists to remain current. In addition, methods of this type generate false positives all too easily. Containerization also addresses application security, but is a time-consuming process that should be reserved for custom-built apps or apps that contain extremely sensitive data. Although it is not necessary to containerize apps that are relatively harmless, these apps must be addressed with some type of security feature. Containerizing every app would be too labor intensive. Table 2 summarizes these approaches to mobile device protection and some of the limitations they present with regard to app security. Approach Mobile Device Management App Whitelisting / Blacklisting Containerization Protecting Mobile Devices Limitations Focused mainly on device-level controls and not at app-borne threats. Binary approach that is too labor-intensive for the millions of apps available. Can easily generate false positives. Only necessary for enterprise apps, not wellsuited for personal or "mass-market" apps. Malicious apps can still infect the device layer even if they are containerized. Table 2: Protecting Mobile Devices In the current mobile landscape, there are simply too many apps to handle with containerization or whitelisting/blacklisting. Furthermore, a whitelisted app can easily turn malicious with an update. While it is certainly true that some apps, such as enterprise-specific apps, must be containerized or treated with special care, the majority of apps should be secured through an automated process that offers granularity about an app s behavior. Copyright May 2013, The Radicati Group, Inc. 6
7 App reputation services use a large number of inputs to automatically evaluate mobile apps, including malware signatures, URLs, and much more. Using this broad range of inputs, an app reputation service can go beyond binary ranking systems. In addition, with the large amount of inputs used, an app reputation system can generate reputation scores that result in few, if any, false positives. 4.0 THE WEBROOT APP REPUTATION SERVICE While the protection of corporate-sanctioned apps is achieved via intricate, personalized methods such as containerization and app wrapping, protection from the millions of non-corporatesanctioned apps is too restrictive when addressed solely with whitelists/blacklists. On the other hand, this protection cannot be left entirely unregulated. Many times, mobile device users trust apps with their information simply because they are downloaded from Google Play or the Apple App Store. IT administrators need the flexibility to set controls on mobile applications based on variable criteria. To address this issue, the Webroot App Reputation Service gauges the risk factor of an app using a massive threat intelligence database, giving partners and customers the ability to manage the delivery of mobile applications that are safe and compliant. The service functions as follows: Collection the App Reputation Service collects millions of applications from app markets, third-party sites, app sharing services, strategic partners, and Webroot SecureAnywhere Business Mobile Protection users. Analysis after the applications are fed into the App Reputation analytics engine, an automated, multi-stage analysis process collates detailed data on each application. Classification and Scoring each app is categorized and assigned a score based on algorithms using detailed analysis data. This approach allows for granular detail on what the app actually does once installed, enabling Webroot to better determine if an app is trustworthy, neutral, malicious, or suspicious. Classification criteria extend beyond simply recognizing whether an app contains some form of malware designed to exploit the device or its operating system. Attributes such as unnecessary ads, overly chatty popups, dubious privacy policies and access requests, and many other forms of invasive or unwanted behaviors are analyzed. Copyright May 2013, The Radicati Group, Inc. 7
8 Partner API the Classification and Scoring results allow Webroot partners to analyze apps and app data via a web service API. Feedback Loop information collected by Webroot partners is then gathered and looped back into the App Reputation analytics engine. Using the data and analysis results provided by the Webroot App Reputation Service, MDM vendors, mobile carriers, app developers and application marketplaces can develop solutions that incorporate app reputation to ensure their customers are protected from malicious or unwanted mobile apps. To determine the score for each app, the Webroot App Reputation Service uses security information from the Webroot Intelligence Network (WIN), which collects billions of pieces of information from multiple sources, including data from customers, test laboratories, and intelligence shared between security vendors. Using WIN, the Webroot App Reputation Service is differentiated by its ability to leverage automated machine learning to collect, analyze, and classify millions of mobile applications. The service also uses proprietary heuristics that scan apps to perform behavioral assessment. Figure 1 shows how the Webroot App Reputation Service arrives at a trust level for an app and its ability to deliver this data to its partners. Copyright May 2013, The Radicati Group, Inc. 8
9 Direct downloads from app stores Collection File sharing among other security vendors Data from millions of Webroot SecureAnywhere users Metadata about each app, such as app user ratings Feedback Loop Analysis Package inspection of APK, IPA, etc. Runtime analysis to examine behavior Disassembly for source code inspection AI analysis with proprietary heuristics, SVM, and more MD5 hash inspection for malware Metadata inspection, such as developer or popularity Classification & Scoring Partner API Initialized with a clean score of 100 Once analyzed, scored based on riskiness Ranked from Trustworthy to Malicious Available via a RESTful Web service API Apps can be looked up via package name or MD5 App permission requests, runtime captures, source code files, and more can be accessed via the Partner API Figure 1: Webroot App Reputation Service Process Webroot has streamlined the process so that concise app reputation classification and other useful app data is transparent to administrators. Using a RESTful web service API, Webroot allows MDM and other applications that manage mobile app usage policies to view the information collected. Applications can be checked by several lookup mechanisms, including package name and MD5 hash. Ranging from Malicious to Trustworthy, this simple banding classification system provides an easy-to-implement solution for Webroot partners. The API is designed to be flexible, so developers can set permissions based on numerous data points, not just banding classification, to determine application policy compliance. Data elements exposed through the API include: Application reputation Blacklist Whitelist Basic file and package information Digital certificate information Manifest data Permission requests Requested phone features Copyright May 2013, The Radicati Group, Inc. 9
10 Runtime captures Source code files Top number of malicious applications Most recent files added Google Play information Market prevalence information Earlier this year, 2.62 million Android apps and 670,000 ios apps were analyzed using Webroot s app reputation ratings. The results of this analysis are shown in Figure 2 below. Android Application Behavior ios Application Behavior Unwanted 7% Trustworthy 18% Benign 41% Suspicious 0.002% Moderate 3% Trustworthy 7% ios Ranking 0% Suspicious 19% Moderate 5% Malicious 10% Benign 90% Figure 2: App Reputation Rankings, 2013 This snapshot of the rankings taken from the Webroot App Reputation Service is quite alarming; more than 4 out of 10 Android apps contain some form of malware, dubious permissions, or other cause for suspicion. ios apps were shown to be less dangerous on the whole, due to Apple s strict app vetting process, but even these apps can have unwanted characteristics. The Webroot App Reputation Service lets administrators restrict apps based on reputation score, but it also allows for individual app permissions. For example, an organization may choose to allow most apps ranked as Moderate, but exclude Moderate apps that require access to a contacts list or exhibit other undesirable behaviors. With this level of granularity, the Webroot App Reputation Service is capable of creating a mobile security policy that is tailored to the needs of each individual organization. Copyright May 2013, The Radicati Group, Inc. 10
11 5.0 CONCLUSIONS AND RECOMMENDATIONS With the onslaught of app-borne cybercrime, app reputation services are the only way to effectively protect mobile devices. Mobile device security solutions are necessary at the device, operating system, and application layers, but these approaches need to be augmented with a powerful app reputation service that can effectively combat the growing threat of mobile malware. When selecting a mobile app reputation service provider, it is important to weigh the vendor s overall expertise in the security field as well as their understanding of the specific challenges posed by the mobile world. In particular, it is essential to select a mobile app reputation service that: a. Is constantly kept up-to-date using a comprehensive intelligence network. b. Is simple to work with and integrate. c. Provides deep granularity of information and the flexibility to address it. d. Is easily adapted to meet different security policy needs. e. Exposes a wealth of information to set policies and analyze trends. The Webroot App Reputation Service provides MDM vendors, mobile app developers, mobile carriers, and application distributers the ability to deliver and manage mobile applications safely and securely. Backed by the Webroot Intelligence Network, the Webroot App Reputation Service meets all the key characteristics described above and harnesses data from millions of sources, making it one of the most powerful application reputation services on the market. As the number of mobile applications available increases exponentially, Webroot offers assurance that partners and customers are protected from mobile threats. Copyright May 2013, The Radicati Group, Inc. 11
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
Webroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers
Webroot Security Intelligence for Mobile Suite Cloud-based security solutions for mobile management providers TABLE OF CONTENTS INTRODUCTION 3 WEBROOT INTELLIGENCE NETWORK 4 MOBILE SECURITY INTELLIGENCE
Security challenges for internet technologies on mobile devices
Security challenges for internet technologies on mobile devices - Geir Olsen [[email protected]], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [[email protected]],
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security A World of Constant Threat We live in a world on constant threat. Every hour of every day in every country around the globe hackers
How To Protect Your Mobile Device From Attack
Manage and Secure the Mobile Data, Not Just the Device Stijn Paumen VP Business Development, Wandera The Great Platform Shift 60,000,000 iphone BlackBerry 50,000,000 40,000,000 30,000,000 20,000,000 10,000,000
Webroot Security Intelligence. The World s Most Powerful Real-Time Network Security Services
Webroot Security Intelligence The World s Most Powerful Real-Time Network Security Services Table of Contents The World s Most Powerful Real-Time Network Security Services Table of Contents 2 Introduction
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo
Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)
perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise
BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
MAM - Mobile Application Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security
4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
How we keep harmful apps out of Google Play and keep your Android device safe
How we keep harmful apps out of Google Play and keep your Android device safe February 2016 Bad apps create bad experiences, so we work hard to keep them off your device and out of Google Play. In 2015,
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users
Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users Table of Contents How TrustDefender Mobile Works 4 Unique Capabilities and Technologies 5 Host Application Integrity
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:
Administrator's Guide
Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Five Best Practices for Secure Enterprise Content Mobility
A N A C C E L L I O N W H I T E P A P E R Five Best Practices for Secure Enterprise Content Mobility Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com
Zscaler Cloud Web Gateway Test
Zscaler Cloud Web Gateway Test A test commissioned by Zscaler, Inc. and performed by AV-TEST GmbH. Date of the report: April15 th, 2016 Executive Summary In March 2016, AV-TEST performed a review of the
CHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
How To Protect Your Data From Being Hacked On Security Cloud
F-SECURE SECURITY CLOUD Purpose, function and benefits October 2015 CONTENTS F-Secure Security Cloud in brief 2 Security Cloud benefits 3 How does Security Cloud work? 4 Security Cloud metrics 4 Security
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
Mobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
Security and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, [email protected]
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
Samsung SDS. Enterprise Mobility Management
Samsung SDS Enterprise Mobility Samsung SDS Enterprise Mobility Faster and Safer Samsung SDS Enterprise Mobility provides stronger security for enterprise mobility without Compromising usability of mobile
Security and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
IT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
Total Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski [email protected] www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
Android for Work powered by SOTI
Android for Work powered by SOTI Work The Way You Live Secure Enterprise Mobility Management Android for Work powered by SOTI transforms workplace mobility with enhanced security, consistent management
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
Symantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
BYOD in the Enterprise
BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security [email protected] October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
TrustDefender Mobile Technical Brief
TrustDefender Mobile Technical Brief Fraud Protection for Native Mobile Applications TrustDefender Mobile from ThreatMetrix is a lightweight SDK library for Google Android and Apple ios mobile devices.
Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Mobile Security & BYOD Policy
Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
MDM and beyond: Rethinking mobile security in a BYOD world
MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices
Protecting Android Mobile Devices from Known Threats
Protecting Android Mobile Devices from Known Threats Android OS A Popular Target for Hacks White Paper Zero Trust Mobile Security An Introduction to the BETTER Mobile Security Platform BETTER at work.
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
Choosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer
Advanced Online Threat Protection: Defending Your Online Banking Customers Against Modern Malware and Fraud Andrew Bagnato Senior Systems Engineer Agenda Modern malware a targets Account credentials Financial
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
PULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
TALLAN INC. MDM STRATEGY GUIDE 4/10/2014 WE BUILD SOFTWARE THAT HELPS OUR CLIENTS GROW DOCUMENT CREATED BY: Matt Kruczek Mobile Practice Lead
TALLAN INC. MDM STRATEGY GUIDE 4/10/2014 DOCUMENT CREATED BY: Matt Kruczek Mobile Practice Lead Brian Sampson Mobile Practice Lead Adam Worobec Senior Director WE BUILD SOFTWARE THAT HELPS OUR CLIENTS
Securing mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks
Smartphones and tablets are invading the workplace along with the security risks they bring with them. Every day these devices go unchecked by standard vulnerability management processes, even as malware
