Marble & MobileIron Mobile App Risk Mitigation

Similar documents
of firms with remote users say Web-borne attacks impacted company financials.

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Product Overview & Quick Start Guide

How To Protect Your Mobile Device From Attack

Streamline Mobile Telecom Management with DATALERT! And MobileIron

Comodo Mobile Device Manager Software Version 1.0

Securing Corporate on Personal Mobile Devices

The Cloud App Visibility Blindspot

isheriff CLOUD SECURITY

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

September 20, 2013 Senior IT Examiner Gene Lilienthal

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Concierge SIEM Reporting Overview

Internet threats: steps to security for your small business

Where every interaction matters.

Table of Contents. CallPro CRM CloudCall Plugin Overview 1 Company Overview 1 Product Overview 1 How to order CloudCall Click 2

Home Internet Filter User Guide

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Cyber Security Metrics Dashboards & Analytics

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Sophos Mobile Control SaaS startup guide. Product version: 6

Agenda , Palo Alto Networks. Confidential and Proprietary.

The Hillstone and Trend Micro Joint Solution

Managing Web Security in an Increasingly Challenging Threat Landscape

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Malware & Botnets. Botnets

Types of cyber-attacks. And how to prevent them

Countermeasures against Bots

10 Smart Ideas for. Keeping Data Safe. From Hackers

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security

COORDINATED THREAT CONTROL

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

Core MyHR: Flexible Benefits Employee s Userguide

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

MultiSite Manager. User Guide

Secure Your Mobile Workplace

Mobile Iron User Guide

Trust Digital Best Practices

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

AVeS Cloud Security powered by SYMANTEC TM

Risk and threats everywhere, all the time

The ForeScout Difference

10 Quick Tips to Mobile Security

User's Guide. Copyright 2014 Bitdefender

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

900 Walt Whitman Road, Suite 304 Melville, NY Office:

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

How To Protect Your Online Banking From Fraud

Cloud Services MDM. ios User Guide

Innovations in Network Security

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Bad Romance: Three Reasons Hackers <3 Your Web Apps & How to Break Them Up

Commissioned Study. SURVEY: Web Threats Expose Businesses to Data Loss

Five Trends to Track in E-Commerce Fraud

Assuring Application Security: Deploying Code that Keeps Data Safe

EBOX Digital Content Management System (CMS) User Guide For Site Owners & Administrators

Adobe Marketing Cloud Bloodhound for Mac 3.0

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Don t Fall Victim to Cybercrime:

Advanced Configuration Steps

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

CloudCall for Salesforce- QuickStart Guide. CloudCall for Salesforce. Quick Start Guide. ver 2.1 Nov 2013

State of App Security

Security Intelligence Services.

4 Steps to Effective Mobile Application Security

10 Things Every Web Application Firewall Should Provide Share this ebook

Protect Your Business and Customers from Online Fraud

GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

QUICK INSTALLATION GUIDE ACTIVATE

Symantec Cyber Security Services: DeepSight Intelligence

Product Overview & Quick Start Guide

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

ReadyNAS Remote. User Manual. June East Plumeria Drive San Jose, CA USA

Breaking the Cyber Attack Lifecycle

AVG Business SSO Partner Getting Started Guide

Configuration Information

Hands on, field experiences with BYOD. BYOD Seminar

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

How to Identify Phishing s

Security and Privacy

Product Overview & Quick Start Guide

Comodo Endpoint Security Manager SME Software Version 2.1

How To Use Secureanything On A Mac Or Ipad (For A Mac)

WildFire. Preparing for Modern Network Attacks

Total Enterprise Mobility

The Benefits of SSL Content Inspection ABSTRACT

Security A to Z the most important terms

Evaluation Guide. eprism Messaging Security Suite V8.200

Fighting Advanced Threats

Cloud Based Secure Web Gateway

AT&T Toggle. 4/23/2014 Page i

Transcription:

Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their own devices. Employees also regularly give apps sweeping permissions to download and use information stored on their device or accessed from the corporate network. Once uploaded to the app provider, the leaked information can no longer be controlled and may fall into the hands of hackers to help target other employees, like system admins or executives, and create personalized, highly effective spear phishing attacks. With 30 percent of Android apps capable of leaking users private data and exhibiting risky behaviors, all companies with mobile programs are vulnerable. While enterprises enjoy the improved business processes and productivity gains that mobile apps afford workers, managing app risk is key to securing corporate networks. MobileIron and Marble Security have partnered to provide a tightly integrated solution that allows enterprises to manage which mobile apps may be used on employee devices that access corporate systems. MobileIron provides IT administrators with a snapshot of apps installed on employees smartphones and tablets. Marble s App Risk Mitigation Software-as-a-Service (SaaS) detects apps with risky behaviors and enables policies to be created to remediate them. Marble continuously analyzes apps on managed devices and correlates external threat intelligence collected from dozens of external sources, providing up-to-the-minute visibility to the risk presented by apps. With this intelligence Marble applies a dynamic risk score for each app, enabling IT administrators to use MobileIron App Security and Access Control to create policies that restrict network access to devices, or remove apps, that exceed acceptable risk levels. About Marble Security Marble Security prevents mobile threats from compromising enterprise networks by layering mobile defense in depth. Marble s cloud service delivers app risk mitigation, secure messaging, and trusted networking to protect smartphones and tablet network communications. The Marble Mobile Risk Score (MMRS) is the world s most comprehensive mobile security scoring metric, uniquely factoring the risk of each user s behavior, individual apps, wireless and cellular networks, and devices. Marble s customers protect and secure more than 1 million individual users in the healthcare and financial services sectors. 1000 Hamlin Court Sunnyvale, CA 94089 Tel. +1.408.737.4300 Fax +1.408.737.4301 sales@marblesecurity.com 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com 1

Table of Contents Contents Technology Alliance & MobileIron Integration Overview... 3 MobileIron and Marble Security Application Analysis... 4 Logging into the Marble Security Platform... 4 Logging into the MobileIron instance within Marble... 4 Application Analysis Results and Reports... 6 Sorting and Filtering... 6 Viewing Users/Devices... 6 Viewing Scan Results... 7... 8 Remediation Options within Marble Security... 8 2

Introduction MobileIron and Marble Security have partnered to provide a tightly integrated solution that allows enterprises to manage which mobile apps may be used on employee devices that access corporate systems. With 30 percent of Android apps capable of leaking users private data, all companies with mobile programs are vulnerable. Mobile apps present a significant risk to enterprise security at each stage of the cyber kill chain, from port scanning and compromising networks to exporting sensitive data. Cybercriminals either hack apps to insert malicious code, or exploit behaviors of legitimate apps to access devices, data, usernames, passwords, location, and online accounts of users and companies. With Marble, IT administrators restrict network access from mobile devices running risky apps, providing a high level of control for BYOD devices without disrupting user experience. Only Marble combines comprehensive, correlated risk intelligence across multiple data sources with an adaptive engine to assess dynamic app risks and automates remediation. Marble Labs, the research and response team of analysts at Marble, has analyzed 1.2 million Android and ios apps, testing for more than 500 dangerous behaviors, as well as malware, spyware and apps that take users to phishing sites or communicate with botnet command and control servers. New or unknown apps found on users devices are put to the front of the analysis queue, and typically analyzed within minutes. Today s overworked system administrators don t have time to establish hundreds of app risk attributes or make granular decisions about each of them. Marble s approach automates the analysis of each app against a comprehensive set of dangerous behaviors and provides the composite Marble Mobile Risk Score (MMRS) for each device. The MMRS is a comprehensive mobility security metric, uniquely factoring the risk of each user s behavior, individual apps, wireless and cellular networks, and devices. Administrators easily tune risk tolerance for their business, and set policies to automatically remediate threats, allowing the enterprise to trust users, devices, networks, and apps, even in a BYOD environment. Technology Alliance & MobileIron Integration Overview The global cybercrime infrastructure that fueled electronic crime, espionage, malware, DDoS and fraud on the PC during the last decade is now focused on attacking mobile users. These highly organized criminal organizations target corporate mobile users as the weakest link for compromising enterprise networks, where they can steal funds, proprietary data, and private employee information used for advanced persistent threats (APTs). Technically sophisticated, tenacious and well funded, these criminals frequently change tactics, attacking mobile users at all levels. Corporate IT is ill equipped to secure countless networks, millions of mobile apps, hundreds of devices and scores of mobile operating system versions, each of which serves as a specific attack point exploited by cybercriminals. Marble s integration with MobileIron offers a mobile threat mitigation solution that delivers deep protection to enterprise mobile users devices, providing layered security for corporate networks. Marble s adaptive engine analyzes and correlates thousands of risk factors in real time to calculate a composite Marble Mobile Risk Score. 3

For MobileIron users, Marble Security provides two integrations: Basic No Marble client loaded on end-user mobile devices With MobileIron credentials, Marble extracts the mobile App information from MobileIron s servers and performs the app analysis Results are provided in reports formatted by the admin Advanced Marble s client is loaded onto mobile devices; either via MobileIron s MAM, or downloaded from public App stores Admin can now unlock Marble s VPN, DNS service, Marble Messenger, and secure browser MobileIron and Marble Security App Risk Mitigation Marble Security takes advantage of MobileIron s ability to request and receive device and application details from its users. By integrating with Marble Security, MobileIron becomes a real-time app risk mitigation tool. Stops mobile apps from compromising enterprise networks Assures the integrity of mobile devices by analyzing every app for risky behaviors Applies access policies to groups, departments, and locations based on app risk Key Benefits Protects enterprise networks, corporate data and employee privacy from risky mobile app behaviors, providing multiple, automatic remediation options for dangerous apps Fuses layers of advanced app analysis with external threat intelligence feeds to determine risk levels Allows companies to safely roll out BYOD programs to employees with ios and Android devices The administrator can configure the Marble Security admin portal to automatically analyze and remediate certain risky behaviors from their users apps. In addition for those admins interested in additional enterprise grade security features, Marble also offers an optional client (available on Android and ios) that provides: Secure Messaging Secure Browser Secure, private VPN Logging into the Marble Security Platform System administrators easily set-up the MobileIron and Marble integration by logging into Marble s admin console, where they can access and sign into their organization s MobileIron instance. Administrators see a complete list of ios and Android apps installed on users devices and a risk score for each device. Based on this score, admins can set policies that restrict network access from mobile devices running risky apps, providing a high level of control for BYOD devices without disrupting user experience. To configure the Marble Security Portal: Set your web browser to the Marble Security Portal https://my.marblesecurity.com Use your Marble credentials to login. Logging into the MobileIron instance within Marble Once inside of the Marble Security Platform, navigate to the Integrations tabs if no client is being used, then all other options should be greyed out. 4

The first time you login, click on the blue Actions button, and choose configure to enter your MobileIron credentials and to start the application analysis process. A pop-up box will come up here you can enter your login information. It is very important to enter your MobileIron credentials and the URL provided to you by MobileIron. Once you have entered your credentials, click save, and the pop-up box will close. You can then click on the MobileIron hyperlink and it will take you to the results of the application analysis. Please note that once you have entered your MobileIron credentials, it is not necessary to enter them again, unless they have changed. If you need to change your login information, just click on the blue Actions button and select Update 5

Application Analysis Results and Reports Once you have completed the login process, the application analysis process will start. Marble will send a request back to MobileIron to send over a complete list of applications and other device information. These details will be used to populate the Application List tab (shown below). Most of the applications will already reside within Marble s servers, and will be shown quite rapidly. For those that may not be in the Marble system, Marble will download and analyze them, providing results in as little as 30 minutes, or take up to several hours. Sorting and Filtering It is possible to sort all of the columns in the results tab. Just click on the column you want to sort on and then click on the blue arrow to sort. Click again and the sort will reverse. To filter results, enter text into the Search box on the right side of the screen, above the action column and the system will automatically start to filter and only show those results that meet this filtering criteria. For example, if you entered in An into the search box, you would see all Android apps (designated in the first column) and then any app name with An in it, for example Angry Birds. Once you have the filtered results, you can still sort the columns to give you exactly the information you need in exactly the right order you need it in. Viewing Users/Devices The default view is to sort on the application name. In this view, there is a column called Devices. To see all of the users with that particular application, just click on the number in the Device column and another line will appear below to show you all of the users with that particular application. For example, you can see the user of the app Street View in the red box below. 6

Viewing Scan Results Obtaining the results of application analysis is critical. This gives the admin the exact risk attributes that are associated with a particular application. Application results are presented as one of 6 categories unique to the Marble solution: Privacy Data Leakage Account takeover Device takeover Malware Risky Behavior By clicking on the scan results hyper link, the window will accordion and you will see results displayed below. 7

Remediation Options within Marble Security In order to complete the circle of application risk management, the Marble solution also allows an admin to create customized remediation options. By tying the risk score to one or more remediation tasks, it takes a potentially complicated task, simplifies and automates it. Remediation works by assigning a risk score to each event (application, device info, etc) and then cross referencing it to the remediation table below. Scores range between 0 and 10, with 0 the lowest risk (safest) and 10 being the most risky. An admin can choose one, some, all or none of the choices below. Please note that choosing Wipe and Retire carry larger risk, and once they are executed, cannot be undone. To set one of the remediation options, simply check one of the boxes and either drag the slider to the right, or enter a number between zero and 10. Then you are done, Marble will then execute the remediation option for each user based on your selection. 8

Troubleshooting There are several possible issues a user may have. Some of the most common include the following: Login Failure to Marble Security Login Failure with Mobile Iron Credentials No Results after entering Mobile Iron Credentials Greyed items/not being able to get to other sections Reference Visit the Marble Security page on MobileIron s partner portal for information on MobileIron configurations. Contact Information Marble offers IT administrators several ways to receive support if problems or questions arise: Customer support portal Customers may access Marble s Customer Support Portal to track their support requests and search our Knowledge Base for answers. User Guides Use indexed and searchable documents to find the answers you need by downloading the Marble Access Quick Start Guide, the complete Marble Access Guide, or the Marble Control Guide. Email Technical support engineers are available to respond to email support requests Monday through Friday, from 6 a.m. until 5 p.m. Pacific Time. Email support@marblesecurity.com. 9

Phone Customers may speak directly to a technical support engineer Monday through Friday, from 6 a.m until 5 p.m. Pacific Time. Call Marble s technical support staff toll free from the United States at 855.737.4378, or directly dial 1.408.737.4406. 10