For Enterprise. Attacking BYOD Enterprise Mobile Security Solutions. Vincent Tan Senior Security Consultant
|
|
|
- Nathaniel Waters
- 9 years ago
- Views:
Transcription
1 For Enterprise Attacking BYOD Enterprise Mobile Security Solutions Vincent Tan Senior Security Consultant
2 whoami Sunny Singapore Senior Security Vantage Point Security 4+ years hacking stuff professionally, specializing in mobile & exotic stuff 1
3 Agenda 1. ios Applications in General 2. What is BYOD? Why BYOD? Who uses BYOD? 3. Security Features of BYOD Solutions 4. Good Technology 5. ios Jailbreaks / Attack Vectors 6. Story of Alice & Bob Local & Network Attacks against Good EMS 2
4 ios Applications > 1.4m Applications 1 in ios App Store ~10% in Business Category 35% of Enterprises have an Enterprise App Store 2 Simple vs Complex Functionality Mobile application capabilities have not caught up with device capabilities Maybe 10% of apps have advanced functionality MDM, Soft Tokens, Payment Applications, HomeKit
5 BYOD BYOD? What and Why? 4
6 BYOD 5
7 BYOD BYOD? What and Why? BYOD Adoption 74% using or adopting BYOD Governments Enterprise Mobile Security MAM (Mobile Application Management) MIM (Mobile Information Management) MDM (Mobile Device Management) 6
8 prevent employees from opening files in unsecured apps, backing up business data to personal cloud-based services, or copying and pasting business... Protection Claims Detect OS tampering and other policy violations remotely lock or wipe the device. Protect mobile apps and servers from being hacked 7
9 Enterprise Mobile Security Features Jailbreak Device PIN JB Detection Application VPN Password App Wipe / Lock Encryption 8
10 Good Technology Acquired by Blackberry in Nov 2015 Top 5 EMS Solution Providers 9
11
12 Good Technology Acquired by Blackberry in Nov 2015 Top 5 EMS Solution Providers GFE received CC EAL4+ in 2013 and GD solution in 2016 GD platform used as a foundation to the GCS to replace GFE GD platform allows developers to create and distribute apps that integrates with the GD services framework 11
13 GFE GFE vs GCS GCS Good Work MDM File Share Local File Storage Only Good Share Access enterprise file share Instant Messaging Good Connect Intranet Access Good Access Cloud Deployment Integrated MAM Common Platform 12
14 ios Jailbreaks ios Versions b 10b Jail Broken? evasi0n7 Pangu Pangu8 TaiG TaiG Pangu9 Not Public Not Public Non-Jailbroken Devices? Resign via developer certificate But apps will need to be reactivated 13
15 What about root? You ve got to be root?! Check out Stefan Esser s talk on ios 678 Security - A Study In Fail Physical Access DROPOUTJEEP (think NSA, GCHQ) Lost Devices / Stolen Devices Remote Attacks Jailbreakme.com v1 / 2 / 3 State sponsored / Corporate Espionage
16 Attack Vector Not normal pen testing Not just setting proxy and using Burp I m not attacking the application Changing the environment in which the application runs. Not new. API Hooking and DLL Injections on Windows. LD_PRELOAD on Linux. I m just doing it on ios. 15
17 Swizzler How do I change the Environment? Built an App More precisely a Dynamic Library (aka tweak) DYLD_INSERT_LIBRARIES=Swizzler Loads itself before an application starts Control all functionalities of an application 16
18 ios Security Architecture Swizzler Substrate 17
19 Swizzler 18
20 Swizzler 19
21 Swizzler 20
22 Swizzler 21
23 What else can you control? 22
24 Jailbreak Jailbreak Detection App Device PIN Password App DLP
25
26
27 Local Attacks 26
28 Jailbreak Device PIN JB Detection Jailbreak Detection Password App Wipe / Lock Encryption 27
29
30 Jailbreak Device PIN JB Detection Password App Wipe / Lock Encryption Device PIN Jailbreak Jailbreak Detection Password Encryption App Wipe / Lock 29
31 Blacklist of Files FILE *file = fopen("/applications/cydia.app", "r"); if (file) { fclose(file); return JAILBROKEN; } file = fopen("/usr/bin/ssh", "r"); if (file) { fclose(file); return JAILBROKEN; } FILE *replaced_fopen (const char *filename, const char *mode) { if (blockpath(filename)) { errno = ENOENT; return NULL; } } bool blockpath(const char *fpath) { NSArray *denypatterns = [[NSArray @"/var/tmp/cydia.log", } 30
32 Prohibited Functions int pid = fork(); if(pid>=0) { return JAILBROKEN; } pid_t replaced_fork(void){ if (disablejbdectection()) { return -1; } pid_t ret = orig_fork(); return ret; } 31
33 if ([[UIApplication sharedapplication] canopenurl:[nsurl { return JAILBROKEN; } NSURL openurl + (id)urlwithstring:(nsstring *)URLString{ NSRange range = [URLString rangeofstring:@"cydia options:nsregularexpressionsearch NSCaseInsensitiveSearch]; if (range.location!= NSNotFound) { return nil; } } return %orig; 32
34 Jailbreak Detection Jailbreak Detection Methods Blacklist of files Directories Symbolic Links Prohibited Commands File System URL Handles Kernel Parameters 33
35 GT::GeneralUtilityClass::constructStringList ( GT::GeneralUtilityClass::tamper_detection_method_t, std::vector<std::string, std::allocator<std::string> > ) Jailbreak / Policy Implementation 34
36 Jailbreak / Policy Implementation GD::GDSecureStorage::handleWrongPwd GD::GDSecureStorage::wipeDevice GD::PolicyProcessor::processLockAction GD::GDLibStartupLayer::checkPartialCompliance GD::PolicyComplianceChecker::checkComplianceUnlocked GD::PolicyComplianceChecker::checkComplianceLocked 35
37 Jailbreak Device PIN JB Detection Password App Wipe / Lock Encryption Password Bruteforce 36
38
39 Jailbreak Device PIN JB Detection Password App Wipe / Lock Encryption Device PIN Jailbreak Jailbreak Detection Password Encryption App Wipe / Lock 38
40 Jailbreak Device PIN JB Detection Disable App Lock & Password App Wipe / Lock Encryption Device Wipe 39
41
42 Jailbreak Device PIN JB Detection Password App Wipe / Lock Encryption Device PIN Jailbreak Jailbreak Detection Password Encryption App Wipe / Lock 41
43 Jailbreak Device PIN JB Detection ization Password App Wipe / Lock Encryption 42
44
45 Jailbreak Device PIN JB Detection Password App Wipe / Lock Encryption Device PIN Jailbreak Jailbreak Detection Password Encryption App Wipe / Lock 44
46
47 Network Attacks 46
48 Jailbreak Device PIN JB Detection Application VPN Password App Wipe / Lock Encryption 47
49 Application VPN 48
50 GD Network 49
51 GD Network Communications Two methods of communication with the enterprise application server, 1. GDHttpRequest 2. Native URL Loading (NSURL, NSMutableURL, etc.) 50
52 51
53 Part of the GD SDK #import <GDNETiOS.h> Easy to enable proxy GDHttpRequest [GDHttpRequest enablehttpproxy:ip withport:port]; [GDHttpRequest disablepeerverification]; 52
54 Native URL Loading Enabled via GDURLLoadingSystem Class [GDURLLoadingSystem enablesecurecommunication] Enabled by default Proxying traffic is harder Doesn t obey ios network proxy settings Swizzle [NSURLConnection initwithrequest] 53
55 Hooking the Network SSL over TCP HTTP(S) Traffic 54
56 Does everything suck? Local device access is important, but remote attacks possible. Be careful of USB chargers. BadUSB. Intranet == Internet Additional security checks on apps 55
57 Take Aways! Think outside the box to break the box! BYOD Policy helps to a certain extent, but such attacks will always be possible. Do not blindly trust what the vendors sell you. 56
58 Thank You! 57
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Good for Enterprise Good Dynamics
Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Weak Spots in Enterprise Mobility Management Dennis Schröder
Weak Spots in Enterprise Mobility Management Dennis Schröder Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dennis Schröder, M. Sc. IT Security Business Security & Privacy Product Manager
MDM, COPE, BYOD, MAM, MIM, PIM???
MDM, COPE, BYOD, MAM, MIM, PIM??? Peter Teufl [email protected] Overview Deployment scenarios Managed COPE BYOD Consumer Platform security lication security Best Practice Managed Managed Handing
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Enterprise Mobility Management
Enterprise Mobility Management Security Without Compromising User Experience SESSION ID: SPO2-R03 Brian Robison Principal Technology Evangelist, XenMobile Citrix Systems, Inc. Providing the freedom to
How To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
How To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
ANY TIME ANY PLACE ANY WHERE. JOEL SWEENEY and SHAUN BENNETTS XPERTEX
ANY TIME ANY PLACE ANY WHERE JOEL SWEENEY and SHAUN BENNETTS XPERTEX ABOUT XPERTEX Joel Sweeney Director and Co Owner Shaun Bennetts Managed Services Director Based in Hertfordshire; Opening a new office
Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
ios Testing Tools David Lindner Director of Mobile and IoT Security
ios Testing Tools David Lindner Director of Mobile and IoT Security Who is this guy? David Lindner @golfhackerdave [email protected] 15+ years consulting experience I hack and golf, sometimes at
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Mobile Application Security Testing ASSESSMENT & CODE REVIEW
Mobile Application Security Testing ASSESSMENT & CODE REVIEW Sept. 31 st 2014 Presenters ITAC 2014 Bishop Fox Francis Brown Partner Joe DeMesy Security Associate 2 Introductions FRANCIS BROWN Hi, I m Fran
BYOD Guidance: Good Technology
GOV.UK Guidance BYOD Guidance: Good Technology Published 16 March 2015 Contents 1. About this guidance 2. Summary of key risks 3. Architectural components 4. Technical assessment 5. Other considerations
Healthcare Buyers Guide: Mobile Device Management
Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security March 14, 2013 About: Daniel Security researcher for almost a decade
The Security of MDM systems. Hack In Paris 2013 Sebastien Andrivet
The Security of MDM systems Hack In Paris 2013 Sebastien Andrivet Who am I? Sebastien Andrivet Switzerland (Geneva) Specialized in security Mobiles (ios, Android) Forensic Developer C++, x86 and ARM (Cyberfeminist
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
Total Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski [email protected] www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Technical Whitepaper. Secure Docs
Technical Whitepaper Secure Docs Contents Introduction 3 Overview 4 Technical Details 4 Conclusion 7 Good Technology 866-7-BE-GOOD www.good.com Secure Docs Technical Whitepaper 2 Introduction As of Q1
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)
perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise
VMware Horizon Workspace Security Features WHITE PAPER
VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon
Mobile Device Management Solution Hexnode MDM
Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode
Mobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT
CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT GETTING CONTROL OF MOBILITY IN THE MARKET In a 2011 IDC study, IT decision-makers report that, on average, 34 percent of their employees access business
EndUser Protection. Peter Skondro. Sophos
EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application
RFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
Secure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems
Enterprise Mobility Suite Overview Joe Kuster Catapult Systems 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
MOBILE SECURITY. As seen by FortConsult. Lars Syberg Head of Security Services
MOBILE SECURITY As seen by FortConsult Lars Syberg Head of Security Services FortConsult A/S Tranevej 16, 2400 Copenhagen, Denmark + 45 70207527 www.fortconsult.net About FortConsult Founded in 2002,
Enterprise Mobility Management for Financial Sector
Enterprise Mobility Management for Financial Sector Conferința Ziarul Financiar: Scurgeri de informații, furt de date confidențiale, hackeri. Pot fi o realitate? Principalele riscuri de securitate și strategii
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system
MobileIron Hendrik Van De Velde Exclusive Mobile Eco-system Agenda MobileIron Company and Vision Mobile First and Mobile IT The MobileIron Solution Mobile Device Management Mobile Application Management
How To Secure Your Mobile Device
BREAKING THE MOBILE MOLD Mark Vondemkamp VP Security Product Management Bring-Your-Own-Device Using personal devices for business Why implement BYOD? Increase employee satisfaction, productivity Reduce
IT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are
BYOD in the Enterprise
BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security [email protected] October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515
Introduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
How To Protect Your Mobile Device From Attack
Manage and Secure the Mobile Data, Not Just the Device Stijn Paumen VP Business Development, Wandera The Great Platform Shift 60,000,000 iphone BlackBerry 50,000,000 40,000,000 30,000,000 20,000,000 10,000,000
Integrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
Cortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Mobile Access Software Blade
Mobile Access Software Blade Dimension Data BYOD event Jeroen De Corel SE BeLux 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd.
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
BYOD AND NEXT- GENERATION MOBILE SECURITY
BYOD AND NEXT- GENERATION MOBILE SECURITY Joseph Gan V-Key Inc Session ID: MBS-W02 Session Classification: General Interest Next-Generation Computing Mobile enterprise apps Mobile payments Mobile authentication
Mobile Security Solution BYOD
Mobile Security Solution BYOD 1 Blending boundaries between devices, apps and users Personal Mobile Devices Unknown Mobile Apps Corporate data on public cloud apps Zscaler Secure Cloud Gateway Business
AGENDA. Background. The Attack Surface. Case Studies. Binary Protections. Bypasses. Conclusions
MOBILE APPLICATIONS AGENDA Background The Attack Surface Case Studies Binary Protections Bypasses Conclusions BACKGROUND Mobile apps for everything == lots of interesting data Banking financial Social
[BRING YOUR OWN DEVICE POLICY]
2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2
Mobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
Smart Devices @ Givaudan. From BYOD experience to new mobile opportunities
Smart Devices @ Givaudan From BYOD experience to new mobile opportunities 2 Givaudan What s going on? Consumerization of IT Personal device proliferation Personal cloud services proliferation Millenials
Microsoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, [email protected] IT-Concern John Marcum Enterprise Client Management Architect / [email protected]
MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology
MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s
Pentesting iphone & ipad Apps Hack In Paris 2011 June 17
Pentesting iphone & ipad Apps Hack In Paris 2011 June 17 Who are we? Flora Bottaccio Security Analyst at ADVTOOLS Sebastien Andrivet Director, co-founder of ADVTOOLS ADVTOOLS Swiss company founded in 2002
Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight
Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight Karthik Ramgopal/Paras Segal [email protected] [email protected] www.maas360.com Why Mobile Applications are a Must? Rising
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
Tom Schauer TrustCC [email protected] 253.468.9750 - cell
Tom Schauer TrustCC [email protected] 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
GETS AIRWATCH MDM HANDBOOK
GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS
IT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device
Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee
Getting Started with the iscan Online Data Breach Risk Intelligence Platform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing
Mobile App Management:
Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management
Key Requirements of Enterprise Mobility Management Solutions
Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Guidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
