Enterprise Apps: Bypassing the Gatekeeper
|
|
|
- Gloria Bridges
- 9 years ago
- Views:
Transcription
1 Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that allows verification of nearly all code executed on iphones and ipads. However, there are a number of architectural flaws in this ecosystem. This report covers one such flaw that exposes ios users in the enterprise to cyberattacks. The Check Point research team has successfully exploited a security flaw in Apple s ios 9 that allows cybercriminals to install malicious apps on enterprise employees iphones and ipads. The flaw hinges on cybercriminals staging a Man-in-the-Middle attack that hijacks communications between managed ios devices and Mobile Device Management (MDM) solutions. This exploit could give cybercriminals control of devices and the data that resides on them, potentially impacting millions of ios users worldwide whose devices are managed by an MDM. The research team s findings and a video demonstrating an attack were submitted to Apple s security team in October Apple responded in November 2015 that the behavior the team demonstrated was expected. 1
2 Developing Apps for ios A substantial part of the ios value proposition hinges on providing superior security and privacy for users and their sensitive data. Apple uses several distinct approaches to achieve this, including: Sandboxing: Each app is embedded within a sandbox that limits its privileges and capabilities to access or operate within protected parts of the OS. Permissions: Apps that require certain access to resources in order to function must request specific permissions from the user. Signed code: Unless a device is jailbroken, only signed code can run on a device. This is done to ensure all code running on a device has received final approval from Apple and is safe to use. ios apps are strictly controlled by Apple. As part of Apple s app strategy, a single App Store lets users download apps to devices. Developers must be registered in order to publish apps on the App Store. This enables Apple to control who s developing apps for its ecosystem, and to banish developers who fail to meet its standards. ios developers can t develop apps anonymously if they want their apps on the App Store. App Review Process Each time a developer publishes a new version of an app, it must undergo a rigorous security review. This review process may take several weeks and is conducted according to a basic set of rules outlined in the App Store Review Guidelines 1. These rules filter out apps that contain improper content, that are low quality, or that have a malicious intent. During the review, the app s content, functionality, behavior, APIs, and many other aspects are scrutinized to prevent malicious or dangerous apps from being published in the App 1 2
3 Store. Although this process is thorough, Apple s approval process can sometimes allow dangerous apps into the App Store 2. Apple Developer Enterprise Program Apple created the Apple Developer Enterprise program to offer businesses a way to develop and distribute apps for internal use. These apps can be distributed quickly and directly to devices, enabling enterprises to develop apps that meet their own business requirements without publishing them on the App Store. In this way, enterprise can avoid a lengthy review process and, more importantly, keep these apps out of the hands of nonemployees. In-house apps are not submitted to the App Store and are not reviewed, approved, or hosted by Apple. You can distribute in-house apps either by hosting your app on a simple internal web server or by using a third-party MDM or app management solution. - ios Deployment Overview for Enterprise What is a developer certificate? A certificate, signed by Apple, that developers can use for signing apps they create in XCode. Apps signed with this certificate can be installed on ios devices without having to be vetted through the traditional App Store process. This is done not only for testing purposes, but for enterprises who may want to develop apps themselves then distribute them to their employees without requiring that these employees install the app through the App Store
4 Enterprise App Capabilities Malicious enterprise apps can cause significant harm. Cyber criminals can use various methods to achieve malicious goals like: Abuse public APIs: Apple makes APIs available for developer use. During the review process, Apple makes sure that apps use APIs only for their expressed purpose. An enterprise app can abuse public APIs to gain extended capabilities, such as the VOIP API which can be abused in order to run an app in the background silently and constantly. Abuse private APIs: These APIs are internal Apple API. Apple forbids developers from using these in order to protect users sensitive data. However, since enterprise apps do not pass through Apple s review, developers can abuse them freely. Using these APIs, enterprise apps can access installed apps and sensitive information Apple tries to protect. Exploit: Enterprise apps can exploit the ios by jailbreaking it. In this scenario, apps can do virtually anything their creator wants, like controlling both the device and the user s information. There is very little that limits enterprise app developers from using these methods in a malicious way. The second line of defense is the ios user s trust. A user must explicitly approve an enterprise app for it to be installed. This is supposedly an effective way to prevent malicious enterprise apps from being installed. However, most users will still go through the extra steps to install an app, as can be seen from our field research, allowing enterprise apps to be installed regardless of their origin. Although developers of enterprise apps must sign an agreement not to abuse APIs or exploit the operating system, user trust alone cannot be considered a valid form of protection. 4
5 From Theory to Practice: Enterprise App Abuse Enterprise app certificates are abused on a regular basis. Third-party app stores like vshare, 25PP, Kuaiyong, 7659 and others abuse certificates as a distribution method. These third-party app stores register as an enterprise with Apple to enter the program and obtain an enterprise certificate. They use the certificate to install apps on their customers devices, claiming they are staff members. Unfortunately, many examples of malicious abuse of enterprise apps can be found: 5
6 Test case: Hacking Team One example of an attack that abused enterprise developer certificates is the case of the Hacking Team s ios malware, which in 2015 targeted ios versions and earlier. The malware leveraged a vulnerability dubbed Masque Attack, which allows enterprise apps to replace existing apps on a device, including system apps. The newly-installed app keeps the original app s directory and can steal any local cache that existed. In order to create an app with a matching bundle identifier, an attacker must use an enterprise certificate, as bundle id verification is done when submitting an app to the App Store. Hacking Team used this attack method and abused an enterprise certificate they owned. Using this certificate, they created a malicious app disguised as the Newsstand app which was native to ios until ios 9. The malware accessed the user s location, photos and address book and sent their data to a server. In addition, the malware installs a keyboard which records all keystrokes and sends them to the server. The only reason Hacking Team could have leveraged the Masque Attack is because they used an enterprise certificate to bypass the App Store bundle identifier check. Case Study: Fortune 100 Company Check Point researchers studied the use of enterprise apps in a Fortune 100 company, analyzing approximately 5,000 devices. The results were intriguing: 318 unique enterprise apps were installed 116 unique enterprise certificates were used Of the 116 unique enterprise certificates, only 11 belonged to whitelisted developers with positive reputations and a record of having previously developed apps. Most of the certificates belonged to developers with little or no information about their reputation. 6
7 More than 70 percent of the enterprise apps originated in China and other Asian countries. Because the App Store in China is not as widely adopted as in other parts of the world, developers distribute apps to other app marketplaces. 7
8 A Hard Problem to Solve Following the attacks on the timeline above, Apple understood the problem with enterprise apps. Enterprise apps cannot be eliminated since many organizations are already heavily invested in this this solution. However, Apple did take certain steps to mitigate the threat. In response to what amounted to a significant vulnerability to their ecosystem, Apple introduced a new security measure for enterprise apps that will increase the complexity of executing enterprise apps. When the enterprise app is initially downloaded, the user must go through a maze of settings screens in order to verify the app s developer. Only after this verification process may the app be executed. This process differs from previous versions of ios, in which the user was merely shown a message the first time they opened an app that stated it was from an unknown developer. Apple did leave a loophole, however. Enterprises use apps in myriad ways, and many users can t handle the new workflow of actively trusting apps. So ios natively trusts any app installed by a Mobile Device Management (MDM) solution, which is exclusively used by businesses. In fact, an app installed by an MDM, will not show any indication of its origin. Mobile Device Management (MDM) MDM solutions are used often by enterprises to support BYOD (Bring Your Own Device) programs, in which the business allows personal devices to be used to access and other corporate services. MDM is a central management tool that enables enterprises to manage policies on the devices used by their employees. Actions they can take include deploying security policies, remote wiping lost or stolen devices, installing applications and more. However, MDMs can be exposed to Man-in-the-Middle (MiTM) attacks which can be used to install enterprise apps. Combine this with Apple s policy of giving apps installed via MDM a free pass and you get a dangerous combination." 8
9 Bypassing the Gatekeeper MDM-distributed apps can be abused by using the following process: Installing an ios configuration profile: A native way to distribute a set of configuration settings such as networking, security settings, root CAs and more. An attacker can craft a configuration profile which will install a root CA and route traffic through a VPN or a proxy to a malicious server and initiate a MiTM attack. This configuration could be deployed through a phishing attack easily. Setting up a remote enterprise app server which serves the malicious app. Using a MiTM attack, an attacker can wait for a command sent by the MDM server. Once intercepted, the attacker can replace the command with an app install request. The ios device will fetch and install the malicious enterprise app. The malicious enterprise app can now execute without explicit user trust. The user will not be able to distinguish between legitimate enterprise, App Store apps, or a bogus app installed by an attacker. Conclusion 1. Apple s ios ecosystem allows unverified code to be introduced to the ios ecosystem through enterprise apps. 2. Non-jailbroken devices are exposed to attacks by a malicious actor using bogus enterprise apps. 3. Enterprises cannot trust the end user judgment in BYOD environments as Apple suggests since they will remain exposed, as we have demonstrated. 4. The additional security mechanisms that Apple has added to the enterprise apps execution may not be enough to mitigate the issue. 5. Enterprises should have a clear way to view and assess the enterprise Apps in their organizations Check Point Software Technologies, Ltd. All rights reserved. Apple and App Store are registered trademarks of Apple, Inc. 9
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
ENTERPRISE APPS: BYPASSING THE IOS GATEKEEPER. Ohad Bobrov Avi Bashan
ENTERPRISE APPS: BYPASSING THE IOS GATEKEEPER Ohad Bobrov Avi Bashan AGENDA ios Ecosystem overview Enterprise Apps in the ios Ecosystem Bypassing the Gatekeeper Conclusions Q&A 2 ABOUT US OHAD BOBROV Over
Protecting Android Mobile Devices from Known Threats
Protecting Android Mobile Devices from Known Threats Android OS A Popular Target for Hacks White Paper Zero Trust Mobile Security An Introduction to the BETTER Mobile Security Platform BETTER at work.
How To Protect Your Mobile Device From Attack
Manage and Secure the Mobile Data, Not Just the Device Stijn Paumen VP Business Development, Wandera The Great Platform Shift 60,000,000 iphone BlackBerry 50,000,000 40,000,000 30,000,000 20,000,000 10,000,000
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Enterprise Mobile Threat Report
Enterprise Mobile Threat Report The State of ios and Android Security Threats to Enterprise Mobility I. Introduction This report examines enterprise security threats for ios and Android. While Android
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Enterprise Mobile Security. Managing App Sideloading Threats on ios
Enterprise Mobile Security Managing App Sideloading Threats on ios I. Introduction II. The Path to App Sideloading Through rigorous app review Apple has lowered the risk of downloading malware from its
{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
Mobile Device Management:
Mobile Device Management: A Risk Discussion for IT Decision Makers Mobile Device Management (MDM) software provides IT organizations with security-relevant capabilities that support the integration of
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Security Best Practices for Mobile Devices
Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices
End User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
Mobile Security: Threats and Countermeasures
Mobile Security: Threats and Countermeasures Introduction Mobile devices are rapidly becoming the primary end-user computing platform in enterprises. The intuitive user-experience, robust computing capabilities,
Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security
4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices
The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices Essay Authors Ted Shorter, CTO, Certified Security Solutions, Inc. Wayne Harris, PKI Practice Lead, Certified Security
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst
ESG Lab Spotlight Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst Abstract: This ESG Lab Spotlight provides a high level look at the Acronis Access
Software that provides secure access to technology, everywhere.
Software that provides secure access to technology, everywhere. Joseph Patrick Schorr @JoeSchorr October, 2015 2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Agenda What are we dealing with? How
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Five Tips to Reduce Risk From Modern Web Threats
Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert
Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA
Emerging Network Security Threats and what they mean for internal auditors December 11, 2013 John Gagne, CISSP, CISA 0 Objectives Emerging Risks Distributed Denial of Service (DDoS) Attacks Social Engineering
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Threat Model for Mobile Applications Security & Privacy www.datatheorem.com
Overview Mobile applications (and the devices they run on) are powerful, as they can play music, check email, read documents, purchase products, get directions, play games, watch movies, scan barcodes,
The Oracle Mobile Security Suite: Secure Adoption of BYOD
An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
BYOD in the Enterprise
BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security [email protected] October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
BUILDING SECURITY IN. Analyzing Mobile Single Sign-On Implementations
BUILDING SECURITY IN Analyzing Mobile Single Sign-On Implementations Analyzing Mobile Single Sign-On Implementations 1 Introduction Single sign-on, (SSO) is a common requirement for business-to-employee
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program
Mobile Application Security Helping Organizations Develop a Secure and Effective Mobile Application Security Program by James Fox [email protected] Shahzad Zafar [email protected] Mobile applications
Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices
Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
IBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
DUBEX CUSTOMER MEETING
DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1 AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2 WEBPULSE 3 GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Sophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
ios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
Why should I care about PDF application security?
Why should I care about PDF application security? What you need to know to minimize your risk Table of contents 1: Program crashes present an opportunity for attack 2: Look for software that fully uses
The Incident Response Playbook for Android and ios
SESSION ID: AIR-W03R The Incident Response Playbook for Android and ios Andrew Hoog CEO and Co-founder NowSecure @ahoog42 @NowSecureMobile Andrew Hoog Author of three books Incident Response for Android
Improve your mobile application security with IBM Worklight
Improve your mobile application security with IBM Worklight Contents 1 Introduction 2 IBM Worklight overview 4 Enabling mobile security with IBM Worklight 6 Integrating IBM Worklight with enterprise security
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
Addressing NIST and DOD Requirements for Mobile Device Management
Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
Mobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
Using the Apple Configurator and MaaS3360
Using the Apple Configurator and MaaS3360 Overview Apple Configurator Utility (ACU) is a free Apple tool that enables a Mac to configure up to 30 ios devices simultaneously via a USB. There are two modes
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security March 14, 2013 About: Daniel Security researcher for almost a decade
Android v ios Mobile Operating Systems
v ios Mobile Operating Systems is an open source operating system widely used on smartphones and tablets. has been available under a free and open source software license from October 21, 2008 and until
Total Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski [email protected] www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
V ISA SECURITY ALERT 13 November 2015
V ISA SECURITY ALERT 13 November 2015 U P DATE - CYBERCRIMINALS TARGE TING POINT OF SALE INTEGRATORS Distribution: Value-Added POS Resellers, Merchant Service Providers, Point of Sale Providers, Acquirers,
Guidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
CERTIFIGATE. Front Door Access to Pwning hundreds of Millions of Androids. Avi Bashan. Ohad Bobrov
CERTIFIGATE Front Door Access to Pwning hundreds of Millions of Androids Avi Bashan Ohad Bobrov 1 AG EN DA Mobile Threats and Research Motivation Mobile Remote Support Tool Overview Pwning Mobile Remote
Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing
Kaspersky Fraud Prevention platform: a comprehensive solution for secure Today s bank customers can perform most of their financial operations online. According to a global survey of Internet users conducted
Samsung SDS. Enterprise Mobility Management
Samsung SDS Enterprise Mobility Samsung SDS Enterprise Mobility Faster and Safer Samsung SDS Enterprise Mobility provides stronger security for enterprise mobility without Compromising usability of mobile
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
curbi for Schools Technical Overview October 2014
curbi for Schools Technical Overview October 2014 Background Overview School Requirements curbi Standard Mode curbi School Mode curbi4schools ipad app Device Enrolment Process Features Alerts Costs Parent
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
Deploying iphone and ipad Apple Configurator
Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions
Defense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
Security for Mac Computers in the Enterprise
Security for Mac Computers in the Enterprise October, 2012 Mountain Lion 10.8 Contents Introduction 3 Service and App Protection 4 Gatekeeper 4 Digital Signatures and Developer IDs 4 App Sandboxing 5 Mandatory
