SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
Samsung / Apperian
The critical question facing mobile businesses today

How do we protect corporate data on hundreds and thousands of
mobile devices – especially if we don’t own them?


                            •     Companies deploying apps
                                  with sensitive and proprietary
                                  corporate data

                            •     > 50% of the US workforce
                                  owns their own smartphone

                            •     61% of global enterprises
                                  support use of personal
                                  devices



                                                       Data source: Gartner;
                                                       Forrester
Securing apps and data – not just the device

    MAM and some MDM solutions offer a variety of basic app
    management capabilities, including:

•     Delete remotely
•     Device wipe and/or lock
•     Malware inspection


    But real app security requires
    a more focused effort …




                                     … encrypting and protecting data at the
                                     app level, not the device or OS
Mobile app security: key comparisons
    Technology         Description                                Considerations


✓App Policies     Security policies wrapped
                                          •
                  or injected into compiled
                                          •
                                               No development or source code access required
                                               Fine-grained policies down to individual apps & users
                             app          •    Maintains native user experience




✗ Machines
Virtual
                  Installation of secondary
                  OS on device – apps run
                        within this VM
                                          •
                                          •
                                          •
                                               Performance and battery hog
                                               Separates data – doesn’t secure it
                                               Separates & divides the native user experience




✗   Sandboxes /
     Containers
                                          •
                  Multiple apps run within a
                                          •
                  single, secured container
                                          •
                                               Cannot enforce policies on individual apps & users
                                               Separates & divides the native user experience
                                               Multiple apps within a “Super App”



                Use API's to add security
                                       •       Requires integration at the time of app development
✗
Integrated SDKs into app at development
                          time
                                       •
                                       •
                                               Updating security policies requires development
                                               Does not support pre-existing or developed apps
Apperian app policies … powered by Mocana

(a)         App-Level Data Encryption
(b)         App-Level VPN
(c)         App-Level Passcode
(d)         App-Level Copy/Paste Protection


          wrapped around individual mobile apps
•      Uses FIPS 140-2 certified encryption and Suite
       B algorithms
•      Enables:
o          Separation of enterprise & personal data
o          “Bring Your Own Device” to work
o          Protection of enterprise data
o          Native user experience
Apperian app policies – a deeper look
                     Security and
                    Usage Policies                    Capability




•      Accomplished through a fully-automated technique called “App Wrapping”

•      Supports managed & unmanaged devices:

o           Internal employee facing apps
o           Customer/Partner Apps (B2C, B2B)
Let’s see how this all actually works…




                    DEMO

Más contenido relacionado

Destacado

Новое прочтение Достоевского
Новое прочтение ДостоевскогоНовое прочтение Достоевского
Новое прочтение ДостоевскогоДмитрий Аксёнов
 
Open Product Data presentation at OGDC
Open Product Data presentation at OGDCOpen Product Data presentation at OGDC
Open Product Data presentation at OGDCOpen Product Data
 
14. Общая экономика 2017: Превращение товарного капитала в товарно-торговый к...
14. Общая экономика 2017: Превращение товарного капитала в товарно-торговый к...14. Общая экономика 2017: Превращение товарного капитала в товарно-торговый к...
14. Общая экономика 2017: Превращение товарного капитала в товарно-торговый к...Moscow State University
 
1 7.6 1-rewrite for port. marshmallow
1 7.6 1-rewrite for port. marshmallow1 7.6 1-rewrite for port. marshmallow
1 7.6 1-rewrite for port. marshmallowpbwhite
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in RetailApperian
 
2 класс. lesson 18. ты любишь клоунов
2 класс. lesson 18. ты любишь клоунов2 класс. lesson 18. ты любишь клоунов
2 класс. lesson 18. ты любишь клоуновshpinat
 
Monolithic domes
Monolithic domesMonolithic domes
Monolithic domesRahul Bajaj
 
Bem Viver, Boa Mesa - Nº 2, de 1953
Bem Viver, Boa Mesa - Nº 2, de 1953Bem Viver, Boa Mesa - Nº 2, de 1953
Bem Viver, Boa Mesa - Nº 2, de 1953José Ferreira
 
Cтратегии развития городов в постиндустриальной экономике
Cтратегии развития городов в постиндустриальной экономикеCтратегии развития городов в постиндустриальной экономике
Cтратегии развития городов в постиндустриальной экономикеMikhail Starov
 
2 класс. lesson 30. рождественский подарок
2 класс. lesson 30. рождественский подарок2 класс. lesson 30. рождественский подарок
2 класс. lesson 30. рождественский подарокshpinat
 

Destacado (15)

Новое прочтение Достоевского
Новое прочтение ДостоевскогоНовое прочтение Достоевского
Новое прочтение Достоевского
 
Open Product Data presentation at OGDC
Open Product Data presentation at OGDCOpen Product Data presentation at OGDC
Open Product Data presentation at OGDC
 
14. Общая экономика 2017: Превращение товарного капитала в товарно-торговый к...
14. Общая экономика 2017: Превращение товарного капитала в товарно-торговый к...14. Общая экономика 2017: Превращение товарного капитала в товарно-торговый к...
14. Общая экономика 2017: Превращение товарного капитала в товарно-торговый к...
 
1 7.6 1-rewrite for port. marshmallow
1 7.6 1-rewrite for port. marshmallow1 7.6 1-rewrite for port. marshmallow
1 7.6 1-rewrite for port. marshmallow
 
"Going Mobile - Not the 'WHO', the How"
"Going Mobile - Not the 'WHO', the How""Going Mobile - Not the 'WHO', the How"
"Going Mobile - Not the 'WHO', the How"
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in Retail
 
2 класс. lesson 18. ты любишь клоунов
2 класс. lesson 18. ты любишь клоунов2 класс. lesson 18. ты любишь клоунов
2 класс. lesson 18. ты любишь клоунов
 
The ant story
The ant story The ant story
The ant story
 
Monolithic domes
Monolithic domesMonolithic domes
Monolithic domes
 
Tdam 031011w
Tdam 031011wTdam 031011w
Tdam 031011w
 
Bem Viver, Boa Mesa - Nº 2, de 1953
Bem Viver, Boa Mesa - Nº 2, de 1953Bem Viver, Boa Mesa - Nº 2, de 1953
Bem Viver, Boa Mesa - Nº 2, de 1953
 
Earth studios presentation (noida)
Earth studios presentation (noida)Earth studios presentation (noida)
Earth studios presentation (noida)
 
Cтратегии развития городов в постиндустриальной экономике
Cтратегии развития городов в постиндустриальной экономикеCтратегии развития городов в постиндустриальной экономике
Cтратегии развития городов в постиндустриальной экономике
 
2 класс. lesson 30. рождественский подарок
2 класс. lesson 30. рождественский подарок2 класс. lesson 30. рождественский подарок
2 класс. lesson 30. рождественский подарок
 
Eca
EcaEca
Eca
 

Más de Apperian

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian WebinarApperian
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilityApperian
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiApperian
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with MocanaApperian
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityApperian
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityApperian
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldApperian
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19Apperian
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21Apperian
 
Applification of Business
Applification of BusinessApplification of Business
Applification of BusinessApperian
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Apperian
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE Apperian
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApperian
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now. Apperian
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDMApperian
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesApperian
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them OutApperian
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseApperian
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsApperian
 

Más de Apperian (20)

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian Webinar
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of Mobility
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roi
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great Opportunity
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM World
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21
 
Applification of Business
Applification of BusinessApplification of Business
Applification of Business
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile Devices
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native Apps
 

Do You Know If Your Android Devices Are SAFE?

  • 2. The critical question facing mobile businesses today How do we protect corporate data on hundreds and thousands of mobile devices – especially if we don’t own them? • Companies deploying apps with sensitive and proprietary corporate data • > 50% of the US workforce owns their own smartphone • 61% of global enterprises support use of personal devices Data source: Gartner; Forrester
  • 3. Securing apps and data – not just the device MAM and some MDM solutions offer a variety of basic app management capabilities, including: • Delete remotely • Device wipe and/or lock • Malware inspection But real app security requires a more focused effort … … encrypting and protecting data at the app level, not the device or OS
  • 4. Mobile app security: key comparisons Technology Description Considerations ✓App Policies Security policies wrapped • or injected into compiled • No development or source code access required Fine-grained policies down to individual apps & users app • Maintains native user experience ✗ Machines Virtual Installation of secondary OS on device – apps run within this VM • • • Performance and battery hog Separates data – doesn’t secure it Separates & divides the native user experience ✗ Sandboxes / Containers • Multiple apps run within a • single, secured container • Cannot enforce policies on individual apps & users Separates & divides the native user experience Multiple apps within a “Super App” Use API's to add security • Requires integration at the time of app development ✗ Integrated SDKs into app at development time • • Updating security policies requires development Does not support pre-existing or developed apps
  • 5. Apperian app policies … powered by Mocana (a) App-Level Data Encryption (b) App-Level VPN (c) App-Level Passcode (d) App-Level Copy/Paste Protection wrapped around individual mobile apps • Uses FIPS 140-2 certified encryption and Suite B algorithms • Enables: o Separation of enterprise & personal data o “Bring Your Own Device” to work o Protection of enterprise data o Native user experience
  • 6. Apperian app policies – a deeper look Security and Usage Policies Capability • Accomplished through a fully-automated technique called “App Wrapping” • Supports managed & unmanaged devices: o Internal employee facing apps o Customer/Partner Apps (B2C, B2B)
  • 7. Let’s see how this all actually works… DEMO