SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
Mobile Security: New Challenges;
         Practical Solutions

Alex Wolfe, Editor-in-Chief, InformationWeek.com
              awolfe@techweb.com
Smartphone Security
• Is the smartphone the new laptop?




  Nokia C6                  Guess Who?
• When it comes to deploying enterprise apps
  on smartphones, security is the elephant in
  the room.
One Size Fits All?
• “[Companies] go crazy putting security on
  their laptops, and then they have a BlackBerry
  where they'll ratchet up the security. But then
  they'll come over to the iPhone, and they'll
  break all the rules.“
Coming: Locked-down devices?
• Enterprise customers don't want all the
  applications the carriers are putting on the
  smartphone. They want a plain-vanilla device,
  with specific settings and apps, which can
  sustain a hard reset. This enables you to bring
  a mission-critical app back up easily if there's
  a lockup or failure in the field.
Panelists
• Jay Barbour, Security Advisor, BlackBerry
  Security Group, Research In Motion
• Khoi Nguyen, Group Product Manager, Mobile
  Security and Management Group, Symantec
  Corporation
• Ryan Naraine, Senior Security Evangelist,
  Kasperksy Lab
• David Perry, Global Director of Education,
  Trend Micro, Inc.

Más contenido relacionado

La actualidad más candente

Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsNowSecure
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowNowSecure
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013Mike Brannon
 
How to adapt to the IOT
How to adapt to the IOTHow to adapt to the IOT
How to adapt to the IOTCaston Thomas
 
How to adapt to the IoT
How to adapt to the IoTHow to adapt to the IoT
How to adapt to the IoTCaston Thomas
 
Learning from an Enterprise Videoconferencing Rollout
Learning from an Enterprise Videoconferencing RolloutLearning from an Enterprise Videoconferencing Rollout
Learning from an Enterprise Videoconferencing RolloutRaj Sambwani
 
iOS-based Employee Safety Tracking and Security App
iOS-based Employee Safety Tracking and Security AppiOS-based Employee Safety Tracking and Security App
iOS-based Employee Safety Tracking and Security AppJai Mehta
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key FindingsSymantec
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security NCC Group
 
CompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA
 
Apperian Corp Overview Aug_2013
Apperian Corp Overview Aug_2013Apperian Corp Overview Aug_2013
Apperian Corp Overview Aug_2013Chuck Goldman
 
MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3Carlos Villafane
 

La actualidad más candente (20)

Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to Know
 
Secure mobile content SharePoint Best Practices Conference 2013
Secure mobile content   SharePoint Best Practices Conference 2013Secure mobile content   SharePoint Best Practices Conference 2013
Secure mobile content SharePoint Best Practices Conference 2013
 
Tablet Security
Tablet SecurityTablet Security
Tablet Security
 
How to adapt to the IOT
How to adapt to the IOTHow to adapt to the IOT
How to adapt to the IOT
 
How to adapt to the IoT
How to adapt to the IoTHow to adapt to the IoT
How to adapt to the IoT
 
Learning from an Enterprise Videoconferencing Rollout
Learning from an Enterprise Videoconferencing RolloutLearning from an Enterprise Videoconferencing Rollout
Learning from an Enterprise Videoconferencing Rollout
 
Tablet Security
Tablet SecurityTablet Security
Tablet Security
 
iOS-based Employee Safety Tracking and Security App
iOS-based Employee Safety Tracking and Security AppiOS-based Employee Safety Tracking and Security App
iOS-based Employee Safety Tracking and Security App
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security
 
CompTIA Trends in Mobility
CompTIA Trends in MobilityCompTIA Trends in Mobility
CompTIA Trends in Mobility
 
Apperian Corp Overview Aug_2013
Apperian Corp Overview Aug_2013Apperian Corp Overview Aug_2013
Apperian Corp Overview Aug_2013
 
MobileSecurityInfographic_v3
MobileSecurityInfographic_v3MobileSecurityInfographic_v3
MobileSecurityInfographic_v3
 

Destacado

20100602百人支持廢死新聞稿
20100602百人支持廢死新聞稿20100602百人支持廢死新聞稿
20100602百人支持廢死新聞稿PNNPTS
 
2012 Mercedes-Benz C-Class For Sale QC | Mercedes-Benz Dealer Montreal
2012 Mercedes-Benz C-Class For Sale QC | Mercedes-Benz Dealer Montreal2012 Mercedes-Benz C-Class For Sale QC | Mercedes-Benz Dealer Montreal
2012 Mercedes-Benz C-Class For Sale QC | Mercedes-Benz Dealer MontrealSilver Star Montreal
 
Application acceleration from the data storage perspective
Application acceleration from the data storage perspectiveApplication acceleration from the data storage perspective
Application acceleration from the data storage perspectiveInterop
 
Bridging the c suite gap
Bridging the c suite gapBridging the c suite gap
Bridging the c suite gapInterop
 
Primero corporate presentation european gold forum 2011
Primero corporate presentation european gold forum 2011Primero corporate presentation european gold forum 2011
Primero corporate presentation european gold forum 2011Primero Mining Corp.
 
Backing up your virtual environment best practices
Backing up your virtual environment   best practicesBacking up your virtual environment   best practices
Backing up your virtual environment best practicesInterop
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloudInterop
 
Deep dive network requirementsfor enterprise video conferencing
Deep dive   network requirementsfor enterprise video conferencingDeep dive   network requirementsfor enterprise video conferencing
Deep dive network requirementsfor enterprise video conferencingInterop
 
Planning and implementing windows 7
Planning and implementing windows 7Planning and implementing windows 7
Planning and implementing windows 7Interop
 
Next gen lan infrastructure
Next gen lan infrastructureNext gen lan infrastructure
Next gen lan infrastructureInterop
 
Deep dive why networking must fundamentally change
Deep dive why networking must fundamentally changeDeep dive why networking must fundamentally change
Deep dive why networking must fundamentally changeInterop
 
Portable clouds navigating cloud standards
Portable clouds navigating cloud standardsPortable clouds navigating cloud standards
Portable clouds navigating cloud standardsInterop
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
Cutting costs with pc power management approaches, pitfalls and best practices
Cutting costs with pc power management approaches, pitfalls and best practicesCutting costs with pc power management approaches, pitfalls and best practices
Cutting costs with pc power management approaches, pitfalls and best practicesInterop
 
Preparing for the cloud
Preparing for the cloudPreparing for the cloud
Preparing for the cloudInterop
 
Malice through the looking glass
Malice through the looking glassMalice through the looking glass
Malice through the looking glassInterop
 
Desktop virtualization primer one size does not fit all
Desktop virtualization primer   one size does not fit allDesktop virtualization primer   one size does not fit all
Desktop virtualization primer one size does not fit allInterop
 
What virtualization means to the branch office
What virtualization means to the branch officeWhat virtualization means to the branch office
What virtualization means to the branch officeInterop
 

Destacado (20)

Iasl2009 Conference -Italia
Iasl2009 Conference -ItaliaIasl2009 Conference -Italia
Iasl2009 Conference -Italia
 
20100602百人支持廢死新聞稿
20100602百人支持廢死新聞稿20100602百人支持廢死新聞稿
20100602百人支持廢死新聞稿
 
Ndnewsletter1
Ndnewsletter1Ndnewsletter1
Ndnewsletter1
 
2012 Mercedes-Benz C-Class For Sale QC | Mercedes-Benz Dealer Montreal
2012 Mercedes-Benz C-Class For Sale QC | Mercedes-Benz Dealer Montreal2012 Mercedes-Benz C-Class For Sale QC | Mercedes-Benz Dealer Montreal
2012 Mercedes-Benz C-Class For Sale QC | Mercedes-Benz Dealer Montreal
 
Application acceleration from the data storage perspective
Application acceleration from the data storage perspectiveApplication acceleration from the data storage perspective
Application acceleration from the data storage perspective
 
Bridging the c suite gap
Bridging the c suite gapBridging the c suite gap
Bridging the c suite gap
 
Primero corporate presentation european gold forum 2011
Primero corporate presentation european gold forum 2011Primero corporate presentation european gold forum 2011
Primero corporate presentation european gold forum 2011
 
Backing up your virtual environment best practices
Backing up your virtual environment   best practicesBacking up your virtual environment   best practices
Backing up your virtual environment best practices
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloud
 
Deep dive network requirementsfor enterprise video conferencing
Deep dive   network requirementsfor enterprise video conferencingDeep dive   network requirementsfor enterprise video conferencing
Deep dive network requirementsfor enterprise video conferencing
 
Planning and implementing windows 7
Planning and implementing windows 7Planning and implementing windows 7
Planning and implementing windows 7
 
Next gen lan infrastructure
Next gen lan infrastructureNext gen lan infrastructure
Next gen lan infrastructure
 
Deep dive why networking must fundamentally change
Deep dive why networking must fundamentally changeDeep dive why networking must fundamentally change
Deep dive why networking must fundamentally change
 
Portable clouds navigating cloud standards
Portable clouds navigating cloud standardsPortable clouds navigating cloud standards
Portable clouds navigating cloud standards
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Cutting costs with pc power management approaches, pitfalls and best practices
Cutting costs with pc power management approaches, pitfalls and best practicesCutting costs with pc power management approaches, pitfalls and best practices
Cutting costs with pc power management approaches, pitfalls and best practices
 
Preparing for the cloud
Preparing for the cloudPreparing for the cloud
Preparing for the cloud
 
Malice through the looking glass
Malice through the looking glassMalice through the looking glass
Malice through the looking glass
 
Desktop virtualization primer one size does not fit all
Desktop virtualization primer   one size does not fit allDesktop virtualization primer   one size does not fit all
Desktop virtualization primer one size does not fit all
 
What virtualization means to the branch office
What virtualization means to the branch officeWhat virtualization means to the branch office
What virtualization means to the branch office
 

Similar a Mobile security new challenges practical solutions

Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAvinash Birnale
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Securitytbeckwith
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom BainEC-Council
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020tmbainjr131
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0wendyking63
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Javier Gonzalez
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldCodiax
 
Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Wireless_Analytics
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution BriefJuniper Networks
 
Case Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicCase Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicIBM Security
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresSBWebinars
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 
Instituting_Wi-Fi_Policies
Instituting_Wi-Fi_PoliciesInstituting_Wi-Fi_Policies
Instituting_Wi-Fi_PoliciesWill Kelly
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security AssuranceRafal Los
 

Similar a Mobile security new challenges practical solutions (20)

Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
 
Ascure session
Ascure sessionAscure session
Ascure session
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected WorldJakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
Jakub Bartoszek (Samsung Electronics) - Hardware Security in Connected World
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution Brief
 
Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012
 
Case Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicCase Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographic
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
 
Instituting_Wi-Fi_Policies
Instituting_Wi-Fi_PoliciesInstituting_Wi-Fi_Policies
Instituting_Wi-Fi_Policies
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security Assurance
 

Más de Interop

Planning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wirelessPlanning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wirelessInterop
 
Overview and current topics in solid state storage
Overview and current topics in solid state storageOverview and current topics in solid state storage
Overview and current topics in solid state storageInterop
 
Outsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problemOutsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problemInterop
 
New approaches to vulnerability management
New approaches to vulnerability managementNew approaches to vulnerability management
New approaches to vulnerability managementInterop
 
Mst cloud interoperability process
Mst cloud interoperability processMst cloud interoperability process
Mst cloud interoperability processInterop
 
Mobile computing threats
Mobile computing threatsMobile computing threats
Mobile computing threatsInterop
 
Mobile application development strategies
Mobile application development strategiesMobile application development strategies
Mobile application development strategiesInterop
 
Managing your virtual environment
Managing your virtual environmentManaging your virtual environment
Managing your virtual environmentInterop
 
Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center networkInterop
 
Extending the lifecycle of your storage area network
Extending the lifecycle of your storage area networkExtending the lifecycle of your storage area network
Extending the lifecycle of your storage area networkInterop
 
Desktop virtualization best practices
Desktop virtualization best practicesDesktop virtualization best practices
Desktop virtualization best practicesInterop
 
Deep dive storage networking the path to performance
Deep dive storage networking the path to performanceDeep dive storage networking the path to performance
Deep dive storage networking the path to performanceInterop
 
Deep dive 4 reasons why networking must change
Deep dive 4 reasons why networking must changeDeep dive 4 reasons why networking must change
Deep dive 4 reasons why networking must changeInterop
 
Deduplication and single instance storage
Deduplication and single instance storageDeduplication and single instance storage
Deduplication and single instance storageInterop
 
Creating effective security controls
Creating effective security controlsCreating effective security controls
Creating effective security controlsInterop
 
Cloud tco numbers and lessons
Cloud tco   numbers and lessonsCloud tco   numbers and lessons
Cloud tco numbers and lessonsInterop
 
Choosing a video conferencing
Choosing a video conferencingChoosing a video conferencing
Choosing a video conferencingInterop
 
Bridging the wired wireless
Bridging the wired wirelessBridging the wired wireless
Bridging the wired wirelessInterop
 

Más de Interop (18)

Planning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wirelessPlanning for (and deploying!) 4 g wireless
Planning for (and deploying!) 4 g wireless
 
Overview and current topics in solid state storage
Overview and current topics in solid state storageOverview and current topics in solid state storage
Overview and current topics in solid state storage
 
Outsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problemOutsourcing it security yes, it’s still your problem
Outsourcing it security yes, it’s still your problem
 
New approaches to vulnerability management
New approaches to vulnerability managementNew approaches to vulnerability management
New approaches to vulnerability management
 
Mst cloud interoperability process
Mst cloud interoperability processMst cloud interoperability process
Mst cloud interoperability process
 
Mobile computing threats
Mobile computing threatsMobile computing threats
Mobile computing threats
 
Mobile application development strategies
Mobile application development strategiesMobile application development strategies
Mobile application development strategies
 
Managing your virtual environment
Managing your virtual environmentManaging your virtual environment
Managing your virtual environment
 
Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center network
 
Extending the lifecycle of your storage area network
Extending the lifecycle of your storage area networkExtending the lifecycle of your storage area network
Extending the lifecycle of your storage area network
 
Desktop virtualization best practices
Desktop virtualization best practicesDesktop virtualization best practices
Desktop virtualization best practices
 
Deep dive storage networking the path to performance
Deep dive storage networking the path to performanceDeep dive storage networking the path to performance
Deep dive storage networking the path to performance
 
Deep dive 4 reasons why networking must change
Deep dive 4 reasons why networking must changeDeep dive 4 reasons why networking must change
Deep dive 4 reasons why networking must change
 
Deduplication and single instance storage
Deduplication and single instance storageDeduplication and single instance storage
Deduplication and single instance storage
 
Creating effective security controls
Creating effective security controlsCreating effective security controls
Creating effective security controls
 
Cloud tco numbers and lessons
Cloud tco   numbers and lessonsCloud tco   numbers and lessons
Cloud tco numbers and lessons
 
Choosing a video conferencing
Choosing a video conferencingChoosing a video conferencing
Choosing a video conferencing
 
Bridging the wired wireless
Bridging the wired wirelessBridging the wired wireless
Bridging the wired wireless
 

Último

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Último (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Mobile security new challenges practical solutions

  • 1. Mobile Security: New Challenges; Practical Solutions Alex Wolfe, Editor-in-Chief, InformationWeek.com awolfe@techweb.com
  • 2. Smartphone Security • Is the smartphone the new laptop? Nokia C6 Guess Who?
  • 3. • When it comes to deploying enterprise apps on smartphones, security is the elephant in the room.
  • 4.
  • 5. One Size Fits All? • “[Companies] go crazy putting security on their laptops, and then they have a BlackBerry where they'll ratchet up the security. But then they'll come over to the iPhone, and they'll break all the rules.“
  • 6. Coming: Locked-down devices? • Enterprise customers don't want all the applications the carriers are putting on the smartphone. They want a plain-vanilla device, with specific settings and apps, which can sustain a hard reset. This enables you to bring a mission-critical app back up easily if there's a lockup or failure in the field.
  • 7. Panelists • Jay Barbour, Security Advisor, BlackBerry Security Group, Research In Motion • Khoi Nguyen, Group Product Manager, Mobile Security and Management Group, Symantec Corporation • Ryan Naraine, Senior Security Evangelist, Kasperksy Lab • David Perry, Global Director of Education, Trend Micro, Inc.