Mobile App Security and Malware in Mobile Platform

Similar documents
Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

Securing Today s Mobile Workforce

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Free antivirus software download

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

IT & DATA SECURITY BREACH PREVENTION

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

IC B01: Internet Security Threat Report: How to Stay Protected

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

The Quick-Start Guide to Print Security. How to maximize your print environment and minimize security threats

Stopping the Threat at the Door

Changing face of endpoint security

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Mobile Devices prioritize User Experience

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

MOBILE THREAT LANDSCAPE. February 2018

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Say Goodbye to Enterprise IT: Welcome to the Mobile First World. Sean Ginevan, Senior Director, Strategy Infosecurity Europe

June 2 nd, 2016 Security Awareness

Copyright 2011 Trend Micro Inc.

Mobile Security using IBM Endpoint Manager Mobile Device Management

february 2013 part 1 of 3

CIS 5373 Systems Security

XenApp, XenDesktop and XenMobile Integration

10 Quick Tips to Mobile Security

Symantec Endpoint Protection Family Feature Comparison

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

As Enterprise Mobility Usage Escalates, So Does Security Risk

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

Why ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection

Employee Security Awareness Training

ENTERPRISE MOBILITY TRENDS

Protecting Your Devices. Dr. Leon D. Chapman

Secure & Unified Identity

BlackBerry UEM + Samsung Knox

BYOD. Transformation. Joe Leonard Director, Secure Networks. April 3, 2013

Cyber Security Update Recent Events in the Wild and How Can We Prepare?

mhealth SECURITY: STATS AND SOLUTIONS

RHM Presentation. Maas 360 Mobile device management

EM L01 Introduction to Mobile

UNLOCKED DOORS RESEARCH SHOWS PRINTERS ARE BEING LEFT VULNERABLE TO CYBER ATTACKS

Mobile Device Management: A Real Need for the Mobile World

Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director

Kaspersky Small Office Security 5. Product presentation

Enterprise Security Solutions by Quick Heal. Seqrite.

Comodo One Home Edition - FAQ

ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO

Mobility, Security Concerns, and Avoidance

Make security part of your client systems refresh

WHITEPAPER. How to secure your Post-perimeter world

How to Secure Your Cloud with...a Cloud?

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

2013 InterWorks, Page 1

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

Prevent and Detect Malware with Symantec Advanced Threat Protection: Network

Securing the SMB Cloud Generation

Weak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Balancing BYOD and Security. A Guide for Secure Mobility in Today s Digital Era

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

Course Outline (version 2)

The State of the Trust Gap in 2015

What is a mobile protection product?

Kaspersky Security for Small and Medium Business

Lookout's cybersecurity predictions

Comodo Device Manager Software Version 4.0

IBM Endpoint Manager. Francesco Censi WW ATG IEM consultant. Optimizing the World s Infrastructure Moscow, Oct 24 th, 2012

Automated Threat Management - in Real Time. Vectra Networks

Comodo IT and Security Manager Software Version 5.4

PROTECTION SERVICE FOR BUSINESS. Datasheet

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

for businesses with more than 25 seats

Securing Digital Transformation

Bring your own device: a major security concern

In(sta)Security: Managing the BYOD Risk. Davi Ottenheimer flyingpenguin

Enterprise Security Solutions by Quick Heal. Seqrite.

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

nuwire Quick Start Guide

Quick Heal Mobile Device Management. Available on

Modern attacks and malware

Cyber Essentials Questionnaire Guidance

Enterprise Ready. Sean Yarger. Sr. Manager, Mobility and Identity. Making Android Enterprise Ready 1

Head-to-head: Which will win for your business?

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

NetDefend Firewall UTM Services

Cyber security tips and self-assessment for business

How NOT To Get Hacked

Secure Access for Microsoft Office 365 & SaaS Applications

CYBER ATTACKS DON T DISCRIMINATE. Michael Purcell, Systems Engineer Manager

A Guide to Closing All Potential VDI Security Gaps

Citrix XenMobile and Windows 10

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

PrintMe Mobile 3.0 User s Guide

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Transcription:

Mobile App Security and Malware in Mobile Platform Siupan Chan Sales Engineering Manager, Greater China 23 September, 2016

The Mobile Security Epidemic 2

A Radical Shift is Occurring When will your organization cease to provide personal devices? 6% 38% 45% All BYOD Mixed 40% No BYOD * 15% 2013 2016 2020 *Source: Bring Your Own Device: The Facts and the Future, 2013 n=2053 CIOs, worldwide

Trends Security or data breaches involving mobile devices are on the rise More people use mobile devices for work than their companies think 2x Data breaches involving smartphones or tablets more than doubled in 2015 (1) 2/3 of employees say they use their personal smartphones for work; their companies think only 25% do (2) 15 % 66% of large organizations have had a security or data breach involving smartphones or tablets in 2015 (1) Work use reported by employees Work use reported by IT in companies 26% 40% 17% 54% 17% Smartphones Tablets Laptops 1) HM Gov t, Information Security Breaches Survey 2015 2) Ovum, Employee Mobility Survey 2014 4

Productivity/Management vs Security Provide services while balancing both Secure the data Protect the customers Protect the users Protect the business Just let me do my job No training required Ease of use Access data on demand

The Android Security Challenge According to Sophos Labs, During the years 2010-2014, we have collected 1.1 million unique samples of malware For 2014, we've identified about 500,000 new unique pieces of malware And another 500,000 unique PUAs From Sept 2013 Sept 2014, there was an 1800% increase in malware

Android Malware Growth

Phishing via SMS

Your location has been shared 5398 times

Apple and Google in mobile malware slip-up

Anatomy of a security hole - Android Master Key

Anatomy of a security hole - Android Master Key

Quadrooter the biggest bugs ever found

Apple ios zero-day attack seen in the wild 1. WebKit bug: visiting a maliciously crafted website may lead to arbitrary code execution. 2. Kernel bug: an application may be able to disclose kernel memory. 3. Kernel bug: an application may be able to execute arbitrary code with kernel privileges.

FBI cracks *that* iphone

FBI or no FBI how you can crack an iphone for less than $100

Mobile Management

Mobility Management Tomorrow Smartphones/Tablets COBO, COPE, BYOD BUSINESS DATA Unified Endpoints Windows, Mac, ios, Android Wearables Smartwatches, WYOD, activity trackers IoT Connected homes, cars, gadgets, pets 19

Why Is Managing Mobile Devices Important? Enabling use of mobile devices lets users be productive but comes at a price: Users want to access everything, from anywhere, all the time Users find a way to access business resources on unsecured devices Not managing mobile devices means flying blind, with zero visibility Manage your mobile devices with Sophos Mobile Control and limit the risks 20

Containers Separate Business and Personal Data BUSINESS PERSONAL 21

Container Apps 22

Mobile Security

Mobile Security for Android Award-winning mobile AV and Malware protection Web Filtering Spam Protection Additional security tools and advisors o Privacy Advisor o Authenticator o Secure QR Code Scanner Centrally Managed 24

Mobile Security for ios AV on ios is inefficient Vulnerabilities are best fought by staying up-to-date Mobile Security for ios version 1.0: o OS Version Advisor o Secure QR Code Scanner o Authenticator Not managed 25

Mobile Security Challenges Management Security 26

Mobile Security Challenges An unsecured device means unsecured data You can insure your devices but what is your data worth? EMM helps enforce controls such as password, lock, etc. If you re not sure, you re not secure Protect Android devices with anti-malware protection Users can remove protection, so needs to be enforced Malicious websites can also target mobile users Apply web protection to keep web threats at bay