Aptica Software & Mobile Security



Similar documents
Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

DOBUS And SBL Cloud Services Brochure

Accelerate Patching Progress in the Enterprise. Wolfgang Kandek CTO Qualys, Inc.

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

If you can't beat them - secure them

Guideline on Safe BYOD Management

Small businesses: What you need to know about cyber security

How To Get A Cloud Service For A Small Business

Websense Web Security Solutions

Accelerate Patching. the Enterprise. Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate

October Application Control: The PowerBroker for Windows Difference

Global Mobility Testing. white papers

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Persistence Mechanisms as Indicators of Compromise

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security

November 4, Underwritten by:

Simplifying the Challenges of Mobile Device Security

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Everything You Need To Know About Cloud Computing

Readiness Assessments: Vital to Secure Mobility

Rx for mthreats in Today s Healthcare Institutions. Daniel W. Berger, President and CEO, Redspin, Inc. P: E: dberger@redspin.

Securing Data across the Dynamic Enterprise

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

GOING BEYOND BLOCKING AN ATTACK

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Modular Network Security. Tyler Carter, McAfee Network Security

Article. One for All Apps in HTML5

Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA

Think STRENGTH. Think Chubb. Cyber Insurance. Andrew Taylor. Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber

Detecting Cyber Attacks in a Mobile and BYOD Organization

The Challenge of Securing and Managing Data While Meeting Compliance

McAfee Security Architectures for the Public Sector

ANDROID APP INSTALLATION AND SCANNING Lecture 11a

External Supplier Control Requirements

Application Security 101. A primer on Application Security best practices

The Education Fellowship Finance Centralisation IT Security Strategy

MOBILE MALWARE REPORT

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Cisco Advanced Malware Protection for Endpoints

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

Top 10 Features: Clearswift SECURE Gateway

Survey: Small Business Security

SYMANTEC CYBERV ASSESSMENT SERVICE OVER THE HORIZON VISIBILITY INTO YOUR CYBER RESILIENCE MORE FOCUS, LESS RISK.

IBM Security X-Force Threat Intelligence

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security

ControlFabric Interop Demo Guide

Information Security in Business: Issues and Solutions

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Zak Khan Director, Advanced Cyber Defence

Create Extraordinary Online Consumer Experiences. Your Journey Begins with Nominum

Your complete guide to Cloud Computing

Mitigating and managing cyber risk: ten issues to consider

Are all of your employees applying all security updates to all of their devices?

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Cyber Essentials Scheme

SPEAR PHISHING AN ENTRY POINT FOR APTS

ForeScout CounterACT. Continuous Monitoring and Mitigation

Cloud Services Prevent Zero-day and Targeted Attacks Tom De Belie Security Engineer. [Restricted] ONLY for designated groups and individuals

Next Gen Firewall and UTM Buyers Guide

IBM Security re-defines enterprise endpoint protection against advanced malware

+ MOBILE APPLICATION SOME OF OUR MOBILE + APPLICATION TESTING CLIENTS

Under control 2015 Hot topics for IT internal audit in financial services. An Internal Audit viewpoint

Top 10 Reasons Enterprises are Moving Security to the Cloud

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

Anti-exploit tools: The next wave of enterprise security

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

The Impact of Cybercrime on Business

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

How To Create An Insight Analysis For Cyber Security

IBM Endpoint Manager Product Introduction and Overview

Managing Web Security in an Increasingly Challenging Threat Landscape

The Cloud App Visibility Blindspot

G DATA Mobile Malware Report

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Advanced Endpoint Protection Overview

ISO27032 Guidelines for Cyber Security

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

10 Smart Ideas for. Keeping Data Safe. From Hackers

Guide Antivirus. You wouldn t leave the door to your premises open at night. So why risk doing the same with your network?

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Cenzic Product Guide. Cloud, Mobile and Web Application Security

Assuring Application Security: Deploying Code that Keeps Data Safe

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Data Centre. Business Intelligence. Enterprise Computing Solutions United Kingdom. Security Solutions. arrow.com

Elevation of Mobile Security Risks in the Enterprise Threat Landscape

Transcription:

Aptica Software & Mobile Security Cyber Security Showcase, UKTI & Cyber Security KTN Event Brussels, 29 th February 2012 Andrew Brown Managing Director Aptica Limited

About Aptica Founded in June 2010 by Andrew & Pamela Brown Reason:For any computer security vulnerability to be exploited, software must execute Based at Bletchley Park, with 5 full-time employees Foci: Mobile Device Security Software Certification Information Assurance Secure Software Development

About Aptica Customers: Partners:

Aptica Technology Services Secure Software Development Analysis, design, implementation and testing to ensure: Code quality, security, usability, maintainability, traceability Main focus is mobile applications and field work solutions Assurance & Certification Verification of author claims; ISO-27034/27051; ISO-9241 Independent, product/vendor-agnostic approach Security Technology Incubation Foreground IP development and technology transition Unique position leads to >30% cost savings across projects

Example Customer Requirements Mobile applications security Remote working solutions with geo-location features Digital media, brand and IP protection Cloud computing security solutions; data protection Trusted and trustworthy computing solutions Secure programming principles and practice Network and end-point protection software Due diligence assessments of new technologies

Secure Software Development Bridging the gap between early-stage technology and early adopters. Security built-in from inception: Application & code base security enhancement Maturity enhancement and development User profiling and GUI development System interface & integration development Capability demonstrations Process and technical support Future development recommendations

AppSure Formal launch at InfoSecurity Europe 2012 London; 24 th April A next-generation anti-virus technology for mobile phones and tablet PCs; protects against rogue apps Targets mobile application downloads, and ensures they execute in a trustworthy manner Applications: Securing third-party mobile applications for end-users Enterprise mobile device security solutions Toolkits for application developers and mobile vendors Promoting and distributing mobile apps based on security

Mobile Apps Security Arena >800m smartphones and tablet PCs worldwide AppSure targets 665m devices (October 2011) 85% year on year growth predicted for smartphones IBM predict 1 trillion mobile devices globally by 2015 Incomplete protection coverage currently offered: Mobile malware grew by 1400% in 2011 Average user has 35-49 apps on their mobile device Centralised stores of critical information developing Anti-virus solutions are not effective in mobile context Render software unusable; high vendor overheads; obfuscation now widely used easy to bypass

Technical Overview AppSure identifies malicious events within software and separates these from legitimate functions Over time, insecure mobile applications are automatically re-engineered into secure ones Novelties: Prevents and remediates harmful behaviours in real-time Neutralises malware, reducing recovery time and cost Context-aware: more precise than existing tools Applications can be used for their primary purpose Enterprise control of device software footprint

www.aptica.co.uk

www.aptica.co.uk

www.aptica.co.uk

End-User Benefits Mobile application security can be guaranteed Applications are usable for their main purpose User confidence increases through use of AppSure AppSure can build libraries of secure applications Organisations have full control over third-party software and employees devices AppSure helps to mitigate the mobile relationship between the organisation and the employee AppSure offers vendors additional revenue streams

Summary Attacks on mobile devices are quite clearly increasing Many users trust their devices with their most valuable information Most have little or no protection against malicious or defective application software Requirement -comprehensive defence mechanisms in place prior to an attack, not afterwards Aptica s products and services can provide this

Our Team

Thank you for listening Aptica Limited Science and Innovation Centre Bletchley Park Milton Keynes MK3 6EB United Kingdom Tel: +44 (0)8456 805 135 E-mail: info@aptica.co.uk Web: www.aptica.co.uk