Protecting Corporate Data from Mobile Threats. And the emerging role for microsd-based security Art Swift CEO, CUPP Computing



Similar documents
INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015

Endpoint protection for physical and virtual desktops

How To Protect Your Mobile Device From Attack

Endpoint protection for physical and virtual desktops

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Exactly the Same, but Different

A Guide to MAM and Planning for BYOD Security in the Enterprise

Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices

Sophistication of attacks will keep improving, especially APT and zero-day exploits

BYOD and Your Business

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

Embracing BYOD. Without Compromising Security or Compliance. Sheldon Hebert SVP Enterprise Accounts, Fixmo.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

10 Quick Tips to Mobile Security

Internet threats: steps to security for your small business

Secure Your Mobile Workplace

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

The ForeScout Difference

Protecting Your Organisation from Targeted Cyber Intrusion

BYOD in the Enterprise

Conducting a Risk Assessment for Mobile Devices

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Detecting Cyber Attacks in a Mobile and BYOD Organization

Tuesday, June 5, 12. Mobile Device Usage

Codeproof Mobile Security & SaaS MDM Platform

The Cloud App Visibility Blindspot

Guideline on Safe BYOD Management

Why Encryption is Essential to the Safety of Your Business

Stephen Coty Director, Threat Research

Data Center security trends

Securing OS Legacy Systems Alexander Rau

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Protect Your Mobile World

Feature List for Kaspersky Security for Mobile

Best Practices in Mobile Device Management (MDM) Assoc. Prof. Dr. Thanachart Numnonda Executive Director IMC Institute

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Fundamentals of Secure Collaboration in the Mobile Workforce. Sinisha Patkovic

ForeScout MDM Enterprise

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Mobile Madness or BYOD Security?

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Mobile Device Management:

Enterprise Cybersecurity: Building an Effective Defense

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Does your Citrix or Terminal Server environment have an Achilles heel?

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

3 Steps to Implementing an Effective BYOD Mobile Security Strategy

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

IT Resource Management vs. User Empowerment

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

IEEE CQR 2010 A Holistic Approach to Mobile Security

CHECK POINT 3 STEPS TO IMPLEMENTING AN EFFECTIVE BYOD MOBILE SECURITY STRATEGY

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce

End-user Security Analytics Strengthens Protection with ArcSight

Practical Attacks against MDM Solutions (and What Can You Do About It)

Enterprise Computing Solutions

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

4 Steps to Effective Mobile Application Security

Assessing BYOD with the Smarthpone Pentest Framework. Georgia Weidman

Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats. Windows XP Support Has Ended Why It Concerns You

Mobile First Government

Enterprise Desktop Management Security Strategy. Liz Cummings. July 16, Enterprise Desktop Management Security Strategy 1

My CEO wants an ipad now what? Mobile Security for the Enterprise

Mobile Security: Are You at Risk (Yet)?

Three Best Practices to Help Enterprises Overcome BYOD Challenges

Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold

Hands on, field experiences with BYOD. BYOD Seminar

Tutorial on Smartphone Security

Securing your Mobile Environment. Mark Villinski Kaspersky Lab Jeremy Clough Gorham Savings Bank

Host/Platform Security. Module 11

The Challenges of Implementing a Bring Your Own Device Policy

Three Best Practices to Help Enterprises Overcome BYOD Challenges

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Spikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015

Data Protection Act Bring your own device (BYOD)

SkySecure System Overview

IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 MIKE.ZUSMAN@CARVESYSTEMS.COM

Information Security and Risk Management

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Mitigating Bring Your Own Device (BYOD) Risk for Organisations

Kaspersky Security for Mobile

Three Best Practices to Help Government Agencies Overcome BYOD Challenges

White Paper. Data Security. The Top Threat Facing Enterprises Today

Kaspersky Security 10 for Mobile Implementation Guide

Simple security is better security Or: How complexity became the biggest security threat

Mobile Device Management

Network Security Platform 7.5

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Better protection for customers, and recurring revenue for you!

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

September 20, 2013 Senior IT Examiner Gene Lilienthal

Where every interaction matters.

How Speech Recognition will Disrupt Enterprise BYOD Plans. Presented at Mobile Voice Conference 2014

Norton Mobile Privacy Notice

EndUser Protection. Peter Skondro. Sophos

Transcription:

Protecting Corporate Data from Mobile Threats And the emerging role for microsd-based security Art Swift CEO, CUPP Computing 1

Information security is broken $77B WORLDWIDE SPENDING ON INFORMATION SECURITY IN 2015 $400M FINANCIAL LOSS FROM 700 MILLION COMPROMISED RECORDS 99.9 % VULNERABILITIES EXPLOITED MORE THAN A YEAR AFTER CVE WAS PUBLISHED 70-90 % OF MALWARE SAMPLES ARE UNIQUE TO AN ORGANIZATION 23 % OF RECIPIENTS OPEN PHISHING MESSAGES AND 11% CLICK ON ATTACHMENTS 95 % OF INCIDENTS INVOLVE CREDENTIALS STOLEN FROM DEVICES Average financial losses due to security incidents, 2013-2014 Sources: Gartner Research, Verizon 2015 Data Breach Report, PWC The Global State of Information Security Survey 2015, Trend Micro website. Slide courtesy of the Prpl Foundation. 2

And the data breach pandemic continues Source: Gartner Research, Verizon 2015 Data Breach Report, PWC The Global State of Information Security Survey 2015, Trend Micro Website. Graphic courtesy of InformationisBeautiful.net Website 3

Mobile attack vectors threaten corporate data Cloud Storage App Store Website Malicious Payload Malware Exploit! Unsecured Public Wi-Fi Stingray cell tower masquerade SMS/MMS SMS/MMS USB Enterprise Network Corp Data Corp Wi-Fi Workstations Mobile security threats Unpatched OS and apps Malware on appstores Malicious payloads / attachments Drive by attacks (browser) Unsecured public Wi-Fi Rogue cell tower (stingray) Jailbreaking / rooting Auto-download of malicious MMS Source: Gartner Research, Verizon 2015 Data Breach Report, PWC The Global State of Information Security Survey 2015, Trend Micro 4 website

Corporations are demanding solutions In a recent international survey of IT decision makers* 93 % Believe mitigating targeted attacks is a high, urgent or critical priority 91 % See preventing data breach by mobile as high, urgent or critical And microsd-based security appliances can address this need, particularly for Android smartphones and tablets 90 % Rate regulatory compliance as high, urgent or critical issue 74 % Demand stronger hardware based security! * Source: Decisive Analytics LLC, Multinational Security Decision Makers Study 2015 Commissioned by CUPP Computing 5

CUPP creates a hardened shell around the device Cloud Storage App Store Website Malicious Payload Malware Exploit Unsecured Public Wi-Fi Stingray cell tower masquerade SMS/MMS SMS/MMS USB Enterprise Network Corp Data Corp Wi-Fi Workstations How the security engine works Intercepts all network traffic Scans each packet for exploits Scans each payload for malware Filters unwanted apps / appstores Blocks low-reputation websites Blocks access to known CCS Alerts admin of intrusion attempts Source: Gartner Research, Verizon 2015 Data Breach Report, PWC The Global State of Information Security Survey 2015, Trend Micro website 6

CUPP vs. security software approach Self-contained hw subsystem Completely isolated from host OS CPU optimized for security tasks Hardened open source kernel Onboard low-power crypto engine Optimized high-speed SD bus Built-in IPS/IDS (firewall + snort) Encrypted memory up to 32GB Immune from mobile OS exploits Immune from mobile apps attacks Immune from rooting / jailbreaking Portable across user s devices Unique patented chip design MPU Atmel uprocessor ATSAMA5D36A die - 4.6 x 4.1 mm LPDDR2 512MB RAM Micron U80M die - 8.5 x 9.5 mm NAND Flash Micron L83A Die x2 9.1 x 8 mm (stack) NAND Flash driver Hyperstone S8 Die - 1.8 x 3.8 mm Lattice FPGA LCMX02-4000 ZE Die 3.8 x 3.7 mm Total of 40 R L C 7

MicroSD-based security market forces Demand Side Data breach is a pandemic Strong demand for solutions Tough regulatory environment Increased BYOD usage Consumerization of IT Widespread Android deployment Increased use of Android tablets Moore s law Supply Side High performance CPUs Memory die size shrinks Low power FPGA Advances in packaging Security paradigm advancements MDM, MAM commoditization Funding availability for Hardware 8

Key take-away messages Take-aways Traditional IT security is broken Data breach pandemic continues CSO s are demanding HW solutions MicroSD form factor can help CUPP has built the world s first microsd-based security appliance! 9

art@cuppcomputing.com www.cuppcomputing.com 10