How To Protect Your Mobile Device From Attack



Similar documents
Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

Securing Office 365 with MobileIron

DUBEX CUSTOMER MEETING

KNOVATION SOLUTIONS OUR SOLUTIONS

Total Enterprise Mobility

Codeproof Mobile Security & SaaS MDM Platform

Mobile First Government

Secure Your Mobile Workplace

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

BYPASSING THE ios GATEKEEPER

Feature List for Kaspersky Security for Mobile

Enterprise Apps: Bypassing the Gatekeeper

How To Secure Your Mobile Device

Marble & MobileIron Mobile App Risk Mitigation

Ben Hall Technical Pre-Sales Manager

The ForeScout Difference

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

10 best practice suggestions for common smartphone threats

Mobile Security and Management Opportunities for Telcos and Service Providers

AirWatch Solution Overview

Assuring Application Security: Deploying Code that Keeps Data Safe

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Mobile Security: Threats and Countermeasures

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

ForeScout MDM Enterprise

MAM - Mobile Application Management

Good for Enterprise Good Dynamics

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Google Identity Services for work

MobileIron Product Packaging

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Workday Mobile Security FAQ

Mobile Security Solution BYOD

IBM United States Software Announcement , dated February 3, 2015

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Mobile Device Management Version 8. Last updated:

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

MobileIron Product Packaging

Copyright 2013, 3CX Ltd.

Securing Corporate on Personal Mobile Devices

BYOD Guidance: BlackBerry Secure Work Space

How to Successfully Roll Out an Android BYOD Program

Enterprise Mobility as a Service

BlackBerry 10.3 Work and Personal Corporate

Mobile Data Loss. Threats & Countermeasures. Michael T.Raggo, CISSP, NSA-IAM, ACE, CSI.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

MTP. MTP AirWatch Integration Guide. Release 1.0

Zscaler Internet Security Frequently Asked Questions

Kaspersky Lab Mobile Device Management Deployment Guide

Mobile Application Security

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

Advanced Configuration Steps

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Mobile Device Management:

Systems Manager Cloud-Based Enterprise Mobility Management

CHOOSING AN MDM PLATFORM

What We Do: Simplify Enterprise Mobility

End User Devices Security Guidance: Apple ios 8

Do you want to mobilize your entire work process efficiently? Do you want to protect your most valuable asset data?

SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Secure, Centralized, Simple

Dell World Software User Forum 2013

Compliance in 5 Steps

Protecting Corporate Data from Mobile Threats. And the emerging role for microsd-based security Art Swift CEO, CUPP Computing

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Microsoft Enterprise Mobility Suite

Chris Boykin VP of Professional Services

Protecting Android Mobile Devices from Known Threats

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Comprehensive real-time protection against Advanced Threats and data theft

Choosing an MDM Platform

IT Resource Management & Mobile Data Protection vs. User Empowerment

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

MobileIron Cloud Pricing Packaging

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner IAIK

Mobile App Containers: Product Or Feature?

Ensuring the security of your mobile business intelligence

The Incident Response Playbook for Android and ios

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Kaspersky Security for Mobile

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

Security and Compliance challenges in Mobile environment

Endpoint protection for physical and virtual desktops

Transcription:

Manage and Secure the Mobile Data, Not Just the Device Stijn Paumen VP Business Development, Wandera

The Great Platform Shift 60,000,000 iphone BlackBerry 50,000,000 40,000,000 30,000,000 20,000,000 10,000,000 0 2007 2007 2008 2008 2009 2009 2010 2010 2011 2011 2012 2012 2013 2013

Learnings From 2014 Mobility Deployments 2008-2013 2014+ Mobile Security External threats, data loss Mobile Data Optimization Data costs, analytics Mobile Cloud Identity Mgmt SSO, DLP for cloud apps Secure workspace & apps MAM MMS TEM, Governance, Support Device controls, content MDM EMM Basic building block 1st Generation Next Generation

Mobile Data Gateway: Unique Architecture App configures profile to route app & browser web traffic to the Cloud Gateway True Mobile First platform: cloud-based proxy Gateway in the path of the data Powerful, real-time mobile data analytics across browser & all apps, corp + cloud Configurable compression, intelligent data policy capabilities Advanced threat detection, data correlation Transparent, easy to deploy, no change to user. OTT

Risk Level Addressing Mobility Challenges Mobile Threats Rising Costs Lack of Insight Malicious & Insecure Apps, Phishing, Jailbreaks, Profiles, Exploits $$ 133% growth 6x ios spike $45Bn roaming 32% mobile share of Internet usage but a black box Secure Secure the device from external threats, protect data Extend Reduce data costs by 60% through compression and policy, avoid bill shock View Understand user behavior, enhance productivity, itemize costs bill-split

View: Powerful Analytics SSO via Anatole portal. Powerful drill-down analytics in to data costs and app productivity

Extend: Real-time Data Savings Compression Proprietary algorithms optimize content for mobile Configurable, adaptive compression for video, images & text Policy 50% of data potentially blockable when roaming High-bandwidth, personal or inappropriate: app downloads, YouTube, Instagram, pornography Domestic compliance Capping Real-time alerts & blocks Sophisticated whitelist of critical resources (e.g. email) Up to 30% Savings Combined up to 60% Savings

Mobile Threat Landscape Malware Vulnerabilities Jailbreaks Malicious Profiles OS Vulnerabilities Insecure Apps Browser Leaks Elevated privileges bypass OS protection Malicious configurations lead to full device access, all content sent to rogue destination Exploits of OS vulnerabilities have greater impact as OS update window is longer Unencrypted sensitive content sent in the clear - Apple does not verify app security Leaks of user login details unencrypted over web protocol Phishing Network Exploits User Activity Smartphone users 3x more likely to get phished small screen real estate and easier social engineering Man-in-the-middle attacks can intercept data and monitor device Frequent access of new URLs and Wifi hotspots increases risk of compromise. Infrequent updates of OS versions Higher Severity, Lower Volume Lower Severity, Higher Volume

Wandera Secure: Multi-Level Security 1. SmartWire detects insecure app exposing user credentials in the clear over unprotected network 2. HeartBeat identifies all current active users of insecure app 3. Wandera EMM Connect scans app and device inventory to identify all users of insecure app Traffic analysis & scanning - User & browser behavior - App attributes Dynamic device monitoring including app and network activity Consumes MobileIron API for inventory updates and push remediation policies Machine learning algorithms Third party resources Data set correlation 4. Admin alerted to company risk exposure. Remediation such as Detect and block Malware and Risks & Leaks quarantine via EMM Connect or real-time block via SmartWire.

Manage and Secure All Mobile Data, Not Just the Device EMM Enterprise Mobility Management Basic building block of enterprise mobility. Provides device-level management and security for corporate data at rest Mobile Device Management (MDM) Inventory / Asset Information Password enforcement & remote wipe Device configurations (E.g. email, VPN, etc) Mobile Application Management (MAM) Secure workspace (PIM) and secure corp. apps Deploy and configure mobile apps MDG Mobile Data Gateway Manages data usage and protects against external threats. Security for all data in transit across apps and browser Mobile Data Optimization (MDO) Cloud-based compression Granular policy controls Analytics across all browser and apps including cloud apps (noncorp) which is 80% of the traffic Mobile Security Identify and remediate persistent threats such as leaky apps Block malware, phishing attacks and other network threats Wandera is a complementary solution to EMM without feature overlap. MDG integrates seamlessly with the key EMM products. 83% of Wandera s customers have an EMM in place

Questions