Más contenido relacionado Beyond BYOD: securing the data (not the device)1. Beyond BYOD: securing the
data (not the device)
This event will start at
11am CET,
March 19, 2013 thanks for your patience
Securing & Accelerating Your Applications 3/15/2013
3/19/2013 DenyAll &All © 2012 2013
Deny Promon © 1
1
2. Logistics
• You’re muted…
• … but please ask your
questions using the chat tool
• We’ll take a few minutes at the
end to answer them
Securing & Accelerating Your Applications 3/15/2013
3/19/2013 DenyAll &All © 2012 2013
Deny Promon © 2
2
3. Today's Presentors
Stéphane de Saint Albin Tom Lysemose
CMO CTO & founder
Securing & Accelerating Your Applications 3/15/2013
3/19/2013 DenyAll &All © 2012 2013
Deny Promon © 3
3
4. Todays’ Webinar
Bring Your Own Device?
The Risk.
Malware residing on personal devices taking
advantage of user rights to leak corporate data.
The Solution.
rWeb + Client Shield protect corporate data
accessed via browsers and mobile apps.
Securing & Accelerating Your Applications 3/15/2013
3/19/2013 DenyAll &All © 2012 2013
Deny Promon © 4
4
5. Content
1. Beyond BYOD: the issue with personal
devices
2. Man-In-The-Browser/Mobile attacks
3. Protecting corporate data on personal devices
– Browser-based apps (OWA)
– Mobile Apps
4. Q&A and conclusion
Securing & Accelerating Your Applications 3/15/2013
3/19/2013 DenyAll &All © 2012 2013
Deny Promon © 5
5
6. Beyond BYOD: the issue
with personal devices
Securing & Accelerating Your Applications 3/15/2013 3/15/2013 All © 2012 2013
3/19/2013 Deny
DenyAll & Promon © Deny All © 2012 6
6
7. Poll #1
Securing & Accelerating Your Applications 3/15/2013 3/15/2013 All © 2012 2013
3/19/2013 Deny
DenyAll & Promon © Deny All © 2012 7
7
8. BYOD related issues
• Security policy adjusted to allow personal
device connectivity
– Exceptions to wifi policy, for example
– Creates security ‘holes’ that can be exploited by hackers
• Users access both personal and corporate data
– User credentials and corporate data ‘stored’ on devices
– Cracked in minutes, cf. Symantec Experiment
• Personal devices are unmanaged by default
– No password, no security control
– No lock or remote deletion capability if lost/stolen
Securing & Accelerating Your Applications 3/15/2013
3/19/2013 DenyAll &All © 2012 2013
Deny Promon © 8
8
9. Beyond BYOD
• Endpoint security not efficient vs. modern threats
– Won’t prevent malware infection
– Millions of zombie devices in spite of anti-virus software
• MDM is no silver bullet
– Enforcing secure configuration policy is a good
but insufficient step
• Compromised devices can become attack vectors
– Modern malware now available on mobile platforms
Securing & Accelerating Your Applications 3/15/2013
3/19/2013 DenyAll &All © 2012 2013
Deny Promon © 9
9
10. Data security is the issue
• The problem with personal devices is not that they
– are used to play and work
– can be lost or stolen
– are usually unmanaged
– are not well protected against malware
– should be considered as unsafe
• The problem is that they access, use and store
sensitive data
– User credentials
– Corporate email
– Confidential information accessed via mobile apps
Securing & Accelerating Your Applications 3/15/2013
3/19/2013 DenyAll &All © 2012 2013
Deny Promon © 10
10
11. Man-in-the-Browser/Mobile
Attacks
Securing & Accelerating Your Applications 3/15/2013 3/15/2013 All © 2012 2013
3/19/2013 Deny
DenyAll & Promon © Deny All © 2012 11
11
12. To read full slides presentation & access to the
video recording on:
Beyond BYOD: securing the data
(not the device)
Please click on the link available in the
description below.
13. Thank you!
info@denyall.com
+33 1 46 20 96 00
Securing & Accelerating Your Applications 3/15/2013
3/19/2013 DenyAll &All © 2012 2013
Deny Promon © 13
13