IEEE CQR 2010 A Holistic Approach to Mobile Security

Size: px
Start display at page:

Download "IEEE CQR 2010 A Holistic Approach to Mobile Security"

Transcription

1 A Holistic Approach to Mobile Security Khoi Nguyen, Group Product Manager Mobile Security and Management Group Symantec Amber Kick-off Meeting

2 Introduction Khoi Nguyen, Group Product Manager, Mobile Security and Management Group, Symantec Develop and market mobile security and management solutions to enterprises, consumers, operators, and device manufacturers About Symantec Symantec is a global leader in providing security, storage and systems management solutions to help businesses and consumers secure and manage their information Symantec is the 4 th largest software company in the world $6+ Billion in Annual Revenue Symantec protects more endpoints in the world than anyone else 370 million computers and accounts worldwide Interop 2010

3 Agenda 1 Mobile Security Trends and Challenges 2 A Holistic Approach to Mobile Security

4 Smartphone Growth Devices IN USE WW (Smartphones = ½ Number of PCs) Devices In Use 3B 2B 1B 800M 600M 400M 200M 2.6B 217M 2.8B 893M 382M B 1B 574M 3.25B PCs In Use 10.7% Growth Cell Phones In Use 6.6% Growth Smartphones In Use 22.2% Growth ** Smartphones Out-shipped laptops in 2008 Source: Pryamid Research, Forester, Deutche Bank PC and Smartphone Shipments PC Forecast by IDC, June 2009 Smartphone Forecast by Gartner, Dec 2008

5 Compare and Contrast Dell Latitude CPi R-Series Released in MHz CPU 64 MB RAM 6.4 GB Hard Drive 10/100 Mbps Ethernet Windows 98 or NT 4.0 HTC Touch Pro 2 Released in MHz CPU 288 MB RAM 512 MB ROM + microsd* 3G and b\g WI-FI Windows Mobile 6.1 Pro *microsd 2.0 supports up to 32 GB cards 5

6 Mobile Security Risks on the Rise Mobile Internet Usage 50% of mobile users access the Internet from their mobile devices in leading mobile countries SMiShing Goes Mainstream 1 in 5 Mobile phone users have received a phishing message via SMS, or other messaging service. Smartphone SECURITY Only 23% of smartphone users enable security software. Mobile VIRUSES 600+ And counting. Number of known mobile viruses and Trojans as of Apr Sources: IDC PC Forecast, Jun. 2009; TrendMicro Smartphone Survey, May 2009; Northeastern University, Apr

7 Smartphones: Hackers Next Destination 1. Rogue Applications Legitimate, non-malicious apps that inadvertently misuse or abuse the network and/or device resources Open OSes and networks give rise to this risk Can cause network disruption and outages Can prevent the end user from using their device Examples Rogue IM App that caused local network disruption Apps that drain battery Unauthorized data or network access Even Legitimate Apps have Risks 3. Device Loss/Theft Phones are lost 15X more frequently than laptops Smart phones carry much of the same data as laptops ( , Contacts ) Phone theft is the #1 UK personal crime* Data is enterprise & personal Regulations regarding privacy and forcing disclosure of lost laptops apply to smart phones Put your protection where your data is 2. SMS/MMS Spam There has been a transition from annoying spam to threatening spam 1.1 billion SMS spam messages in the US in 2007 (up from 800 million in 2006) (Ferris Research) 18% of US mobile users have received SMS spam messages (Pew Research) Transition from Annoying Spam to Threatening Spam 4. Mobile Malware Snoopware/Mobile Spyware Device always with you, always a risk 70% use their phone as an alarm clock (ICM Research) Pranking4Profit Financial threats: Follows fame to fortune trends seen in PC market (source Symantec ISTR X) Mobiles are becoming digital wallets and identities Hacker Transition from Fame to Fortune * Source: ARC, Juniper Research

8 Potential for a Major Global Mobile Virus Outbreak? OS Security Greater Openness More Apps & Downloads More Valuable Data OS Fragmentation Centralized Signing Malware Drivers Malware Impediments 8

9 A Holistic Mobile Security Approach As in the PC-world, protection only the network or only the device is not sufficient A holistic approach is needed that protects the network, device, and cloud Smartphone On-Device Mobile Security & Management Cloud Application Scanning and Reputation Services Network Security for Carriers Network 9

10 Summary and Conclusions CHALLENGE/TREND KEY ISSUES POSSIBLE SOLUTION 1. Device Protection is Not Enough 2. Open Networks and OSes May Increase Risk 3. Security is a challenge but also a significant revenue opportunity for operators Mobile threats are evolving like PC threats Mobile malware is an emerging but growing threat Key Risks: Device theft & data breach Phishing/Financial Threats Examples: Open access networks, open source mobile operating systems Open standards foster innovation but create new risks for the network & the handset Business Needs: Security and compliancy (SOX, HIPPA), software & patch management, cost management, etc. Individual Needs: Data security, antiphishing, parental controls, content controls, remote wipe, data backup, etc. Protect the data and the device Holistic security solution that encompasses the Handset + Carrier Network + Cloud Operators can offer integrated Mobile Security + Management services