Mobile Security. Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.



Similar documents
Security Intelligence

Addressing Security for Hybrid Cloud

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

The Current State of Cyber Security

IBM QRadar Security Intelligence April 2013

and Security in the Era of Cloud

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Application Security from IBM Karl Snider, Market Segment Manager March 2012

Managing and Securing the Mobile Device Invasion IBM Corporation

IBM Security Intelligence Strategy

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

The webinar will begin shortly

Under the Hood of the IBM Threat Protection System

Data Security: Fight Insider Threats & Protect Your Sensitive Data

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

BigData Analytics per la sicurezza delle Infrastrutture Critiche

Protecting against cyber threats and security breaches

Security for a Smarter Planet IBM Corporation All Rights Reserved.

BYOD Guidance: BlackBerry Secure Work Space

Society Protection Best Practices from Industry

Kaspersky Security for Mobile

IBM United States Software Announcement , dated February 3, 2015

Introduction to PCI DSS

Security strategies to stay off the Børsen front page

IBM Security Systems Support

Securing the mobile enterprise with IBM Security solutions

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager.

IBM X-Force 2012 Cyber Security Threat Landscape

Securing the Cloud: Making Cloud an Opportunity to Enhance Security

IBM X-Force 2012 Cyber Security Threat Landscape

How to Choose the Right Security Information and Event Management (SIEM) Solution

Introducing IBM s Advanced Threat Protection Platform

Cyber security - the business critical issues facing organisations

IBM Endpoint Manager for Mobile Devices

Web application security: automated scanning versus manual penetration testing.

Improve your mobile application security with IBM Worklight

IBM Security X-Force Threat Intelligence

Symantec Mobile Management Suite

Reducing the cost and complexity of endpoint management

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Safeguarding the cloud with IBM Dynamic Cloud Security

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Strengthen security with intelligent identity and access management

Securing mobile devices in the business environment

Embracing BYOD. Without Compromising Security or Compliance. Sheldon Hebert SVP Enterprise Accounts, Fixmo.

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

IBM Security Intrusion Prevention Solutions

Securing Corporate on Personal Mobile Devices

Let s talk about assets in QRadar

BYOD: End-to-End Security

Protecting Android Mobile Devices from Known Threats

Securing OS Legacy Systems Alexander Rau

IBM Advanced Threat Protection Solution

Three significant risks of FTP use and how to overcome them

Total Enterprise Mobility

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

Risk and threats everywhere, all the time

SECURING TODAY S MOBILE WORKFORCE

Securing Mobile Apps in a BYOD World

10 best practice suggestions for common smartphone threats

Practical Attacks against MDM Solutions (and What Can You Do About It)

Rational Asset Manager 7.2 Editions and Licensing

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Simplify security management in the cloud

Information Security and Practice in Finance Industry. Xingxiong Zhu

10 Quick Tips to Mobile Security

Good for Enterprise Good Dynamics

IBM Security QRadar Risk Manager

Trust Digital Best Practices

IBM Security re-defines enterprise endpoint protection against advanced malware

Data Management Policies. Sage ERP Online

Beyond passwords: Protect the mobile enterprise with smarter security solutions

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

IBM Security QRadar Risk Manager

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

IBM MobileFirst Protect: Secure & Manage your mobile enterprise

Spikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

IBM MobileFirst Build a mobile enterprise agenda

Best Practices for a BYOD World

MOBILE SECURITY: DON T FENCE ME IN

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Mobile App Management:

IBM Security Privileged Identity Manager helps prevent insider threats

Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Securing Mobile App Data - Comparing Containers and App Wrappers

IBM Innovate AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance

Four keys to effectively monitor and control secure file transfer

Agenda. John Veldhuis, Sophos The playing field Threats Mobile Device Management. Pagina 2

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Selecting the right cybercrime-prevention solution

Security Best Practices for Mobile Devices

Enterprise Mobile Threat Report

Transcription:

Mobile Security Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015 12015 IBM Corporation

Where I Started: Blackberry Migration BYOD Bring Your Own Device (BYOD) became popular and grew over the past few years. Businesses were expected to adapt to the growing demands of the user. Network Access Internal Resources Corporate Mobile Applications Email, Contacts, Calendars Migration from BlackBerry to ios & Android 2

BYOD Pain Points Infrastructure expenses for supporting multiple, mobile operating system platforms and devices. Increased risk how do you maintain device compliance without impacting usability? Security User needs impact data loss prevention policy Security Monitoring apps for malicious code 3 Luther Knight - @lutherldn

I Spy A Naughty Application IBM & Ponemon Institute ran a large scale study, unveiling an alarming state of mobile insecurity for consumer and business facing applications 40% their large companies are doing a bad job or nothing at all to protect consumer applications, including Pharma and Finance 50% 33% of these companies setting zero budget for mobile security and therefore they re only testing half the apps they build of these companies don t test their apps at all 4

Risky Apps 100 % 53 % of the Top 100 Paid apps have hacked variants in the wild Top applications have been cracked & offered on 3 rd party App Stores Offered for free but often injected with malware or malicious code Android users particularly at risk 5

The way to your data, is through your heart Sharing personal information Access privileges Photos Location Data Contacts Calendar Camera/Microphone 26 of the top 41 dating apps on Google Play had high security vulnerabilities Poorly coded credit card info vulnerable Phishing Attacks 60% of Popular Dating Apps Vulnerable to Hackers 6

What does IBM do? What we use and offer to mitigate mobile risk @lutherldn 7

IBM MobileFirst 8 Luther Knight - @lutherldn

IBM Mobile First Protect Secure Mobile Containers Secure Content Collaboration Seamless Enterprise Access Comprehensive Mobile Management One Platform for All Your Mobile Assets 9

A complete Mobile Management platform 10

Integration 11

What does Mobile First Protect do? (we re not reading your text messages or looking at your selfies!) @lutherldn 12

Powering Productivity Mail Content File Sharing Editing Intranet Wrapping data loss prevention rules around sensitive information Maintaining device compliance Malware Protection 13 Luther Knight - @lutherldn

Mobile Device IBM Security Mobile Threat Protection - SDK integrated Prevent deployment of containers into Jailbroken or Rooted device Restrict content sharing between enterprise apps on malwareinfected devices Trusteer security researching DarkNet for new exploits, OTA logic updates 1. Integrate Libraries within app code 2. Code the ability to collect data 3. Analyze risk Data MobileFirst Protect 4. Send Data to Server 5. Enforce Policy Trusteer Mobile SDK Jailbroken /Rooted Jailbreak Hiders Persistent Device ID Malware Infection Geo-location Unpatched OS Unsecure Wi-Fi Suspicious Apps 14

How it Works Define compliance rules Trusteer Logic always current Relays OOC event, determines action IBM Mobile First Protect Console Policy Definitions Risk Policy Mgmt. & Control Policy Enforcement Device Risk Data Inbound OTA Updates 15

European Security European datacenters Ireland & Germany Adheres to EU security standards, ISO-27001 certified and SOC-2 compliant. Information is transmitted over SSL3.0/TLS1.0 with certificated from DigiCert Data within the European data centers does not get replicated back to USA. Data is 256bit AES encrypted in motion and at rest (on device). On-Premise available 16

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. www.ibm.com/security 17 Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.