SlideShare una empresa de Scribd logo
1 de 34
The State of Security in The Mobile Enterprise
Cesare Garlati
VP Consumerization & Mobile Security – Trend Micro
Co-Chair Mobile Group – Cloud Security Alliance


APPNATION – December, 2012
Cloud Security Alliance: Mobile Guidance V1

                                                            Security Guidance for
                                                     Critical Areas of Mobile Computing

                                                       Mobile Computing Definition
                                                       Threats to Mobile Computing
                                                       Maturity of the Mobile Landscape
                                                       BYOD Policies
                                                       Mobile Authentication
                                                       App Stores
                                                       Mobile Device Management


https://cloudsecurityalliance.org/research/mobile/
CSA Top Mobile Threats – Evil 8

1.   Data loss from lost, stolen or decommissioned devices.
2.   Information-stealing mobile malware.
3.   Data loss and data leakage through poorly written third-party apps.
4.   Vulnerabilities within devices, OS, design and third-party applications.
5.   Unsecured Wi-Fi, network access and rogue access points.
6.   Unsecured or rogue marketplaces.
7.   Insufficient management tools, capabilities and access to APIs.
8.   NFC and proximity-based hacking.
How Secure and Manageable?
                           Raimund Genes
                           Chief Technology Officer, Trend Micro
                           http://trendmicro.com/our-contributors/raimund-genes




                           Chris Silva
                           Industry Analyst, Altimeter Group
                           http://www.altimetergroup.com/about/team/chris-silva




                           Nigel Stanley
                           Practice Leader, Bloor Research
                           http://www.bloorresearch.com/about/people/nigel-stanley.html




                           Philippe Winthrop
                           Managing Director, Enterprise Mobility Foundation
                           http://www.enterprisemobilitymatters.com/about.html



http://trendmicro.com/cloud-content/us/pdfs/business/reports/rpt_enterprise_readiness_consumerization_mobile_platforms.pdf
Security and Management Criteria
Security and Management Criteria
Security and Management Criteria
Ratings By Category

                 Mobile
             Technology
                   Gap
Ratings By Mobile Platform


               Consumer
              Technology
                    Gap
Mobile vulnerabilities are real

      Android                                                          Apple iOS
            CVE-2012-3979 – log_print                                  CVE-2012-0643 – Malicious
       function, allowing remote                                     code allows remote attackers to
       attackers to execute arbitrary                                bypass sandbox restrictions and
       code via a crafted web page that                              execute arbitrary code.
       calls the JavaScript dump
       function.                                                          CVE-2012-0646 – Format
                                                                     string vulnerability in VPN allows
           CVE-2011-3874 – Stack-                                   remote attackers to execute
       based buffer overflow in libsysutils                          arbitrary code via a crafted racoon
       allows user-assisted remote                                   configuration file.
       attackers to execute arbitrary
       code via an application call.                                     CVE-2012-0642 – Integer
                                                                     underflow allows remote attackers
           CVE-2011-4276 – Bluetooth                                to execute arbitrary code via a
       service allows remote attackers                               crafted catalog file in an HFS disk
       within range to obtain contact data                           image.
       via an AT phonebook transfer.

Source: National Vulnerability Database via CVEDetails.com – as of October 4, 2012
No Platform is immune: Apple iOS Detail




Source: National Vulnerability Database via CVEDetails.com – as of October 4, 2012
Apple iOS Jailbreaking Trends




                            June 2007       July 2008    July 2009   June 2010    Oct 2011   Sept 2012
                             iPhone        iPhone 3G    iPhone 3GS    iPhone 4   iPhone 4S   iPhone 5




Source: Google Trends – as of October 4, 2012
Android is the most exploited




Source: Trend Labs, Trend Micro Inc. – as of Q2 2012
Malicious Apps on Legit Marketplace

  March 2011 – 58 malicious apps (approx
   250,000 victims)
  May 2011 – 24 malicious apps (up to
   120,000 victims)
  December 2011 – 27 malicious apps
   (approx 14,000 victims).
  February 2012 – 37 “Fan Apps” stealing
   handset information and aggressive
   advertising
  August 2012 – many, many more …
Android Versions Distribution


                                                         73%




                                                                     Fragmentation

                                                              Vulnerable Devices

Source: Google http://developer.android.com/resources/dashboard/platform-versions – as of August1, 2012
Mobility is not the problem
“Consumerization will be
the most significant trend
affecting IT during
the next 10 years”
Gartner




New technology emerges first in the consumer market and then
spreads into business organizations brought in by the employees

IT and consumer electronics converge as individuals rely on the same
devices and applications for personal use and work-related activities

Overwhelmed by the wave of consumer technology flooding the
enterprise, IT managers lose control and struggle to enforce policies
ConsumerizationReport©


Source: Trend Micro Global Survey IT Managers, 500+ Employees, February 2012
"What mobile platforms are allowed by                "Rank security and manageability of
                     your BYOD policy?"                             each mobile operating system"

          BlackBerry              71%                          Apple iOS           20%
            Android               68%                         BlackBerry          19%
        Windows Ph              53%                             Android           18%
           Apple iOS          51%                           Windows Ph           14%
               Other      25%                                      Other         15%

                       BYOD Top 5 concerns                         "Has your company ever experienced
                                                                   a security breach as result of BYOD?"
              Security             64%
                                                                 Yes                               No
             Data Loss            59%
           Compliance           43%                                        47%              49%
              Personal…       41%
                Privacy       40%                                                  5%
                                                                Don't Know

                                                                               ConsumerizationReport©


Source: Trend Micro Global Survey IT Managers, 500+ Employees, February 2012
You are not ready for this


 • Consumer mobile
   technology is invading the
   enterprise and you won‟t
   be able to resist it
                                1   Embrace Consumerization


 • Consumer technology is
   not as secure as                 Understand the risk profile
   manageable as required by    2   of the various platforms
   the enterprise
                                    Deploy new security and
 • No platform is immune        3   management tools
   from attack, although some
   are safer than others
Thank You!
                   Cesare Garlati
             http://BringYourOwnIT.com
As VP of Mobile Security at Trend Micro, Cesare Garlati
                                    serves as the evangelist for the enterprise mobility
                                    product line. Cesare is responsible for raising awareness
                                    of Trend Micro‟s vision for security solutions in an
                                    increasingly consumerized IT world.


                                    Prior to Trend Micro, Mr. Garlati held director positions
                                    within leading mobility companies such as iPass, Smith
                                    Micro Software and WaveMarket – now LocationLabs.
                                    Prior to this, he was senior manager of product
                                    development at Oracle, where he led the development of
Cesare Garlati                      Oracle‟s first cloud application and many other modules
                                    of the Oracle E-Business Suite.
Cesare Garlati | Vice President
Consumerization & Mobile Security
                                    Cesare holds an MBA from U.C. Berkeley, a BS in
Blog: BringYourOwnIT.com            Computer Science and professional certifications from
linkedin/in/CesareGarlati           Microsoft, Cisco and Sun. Cesare is Chair of Trend Micro
twitter/CesareGarlati
Cesare_Garlati@trendmicro.com       Advisory Board for Consumerization and Mobile and Co-
                                    Chair of the CSA Mobile Working Group.
Skype: Cesare.Garlati
Mobile: +1 408.667.3320
                                    Blog: http://BringYourOwnIT.com
http://consumerization.com
http://consumerization.trendmicro.com
http://BringYourOwnIT.com
http://youtube.com/user/BringYourOwnIT
Installed Base % 4Q11                                Installed Base % 2015*
        60%

        50%

        40%

        30%

        20%

        10%

          0%
                                                                                                   X
                 Android   iOS   Win Ph   RIM   Symbian   Other    Android   iOS    Win Ph   RIM   Symbian   Other
                  38%      17%    3%      12%    26%       3%       52%      19%     21%     6%      0%       2%


                      59%                                                    92%
            Android and iOS will account for over 70% of smartphone sales
            by the end of 2012. Microsoft will rise to third place in the global
            OS rankings by 2013, ahead of Research In Motion.

                                                                                   ConsumerizationReport©


Source: Trend Micro internal analysis based on Gartner, Forrester and IDC market data – February, 28 2012
How To: Jailbreak iOS (5.1.1)


Download Links
Xxxx v2.0.4 MacOSX (10.5, 10.6, 10.7)
Xxxx v2.0.4 Windows (XP/Vista/Win7)
Xxxx v2.0.4 Linux (x86/x86_64)


How To Use Xxxxx 2.0:
1. Make a backup of your device in iTunes by right clicking on your device name under
   the „Devices‟ menu and click „Back Up‟.
2. Open Xxxxx and be sure you are still connected via USB cable to your computer.
3. Click „Jailbreak‟ and wait…. just be patient and do not disconnect your device.
4. Once jailbroken return to iTunes and restore your backup from earlier.


Xxxxx 2.0 supports the following devices on 5.1.1:
iPad 1, iPad 2, iPad 3 (iPad2,4 is now supported as of Xxxxx 2.0.4)
iPhone 3GS, iPhone 4, iPhone 4S
iPod touch 3rd generation, iPod touch 4th generation
Taller screens like Cydia too. :)

                           @saurik – Jay Freeman
                           Cydia: 1.5M Apps per day
                           5% to 10% of Apple iOS devices
                           $8M rev 2011 (to developers)
Apple iOS Jailbreaking Trends – U.S.




                             June 2007      July 2008    July 2009   June 2010    Oct 2011   Sept 2012
                              iPhone       iPhone 3G    iPhone 3GS    iPhone 4   iPhone 4S   iPhone 5




Source: Google Trends – as of October 4, 2012
Malicious Apps on Legit Marketplace
Android Commercial Spy Apps
3D Porsche Sports Car HD Live Wallpapers
VScan:AndroidOS_ADWLeadbolt.HRY
FBI Warns of Mobile Malware Risks




Source: Federal Bureau Of Investigation – New E-Scams & Warnings – 10/12/2012

Más contenido relacionado

La actualidad más candente

BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applicationsGTestClub
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareNeil Costigan
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityAndris Soroka
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltdNehul Gupta
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
 
Make Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMichael Davis
 

La actualidad más candente (20)

BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshare
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
Make Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile Security
 

Destacado

Updating Security Operations For The Cloud
Updating Security Operations For The CloudUpdating Security Operations For The Cloud
Updating Security Operations For The CloudMark Nunnikhoven
 
Disseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksDisseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksEswar Publications
 
ICAM - Demo Architecture review
ICAM - Demo Architecture reviewICAM - Demo Architecture review
ICAM - Demo Architecture reviewRamesh Nagappan
 
Mechanized Proofs for a Recursive Authentication Protocol
Mechanized Proofs for a Recursive Authentication ProtocolMechanized Proofs for a Recursive Authentication Protocol
Mechanized Proofs for a Recursive Authentication ProtocolLawrence Paulson
 
Design thinking class thadeu rodrigues
Design thinking  class   thadeu rodriguesDesign thinking  class   thadeu rodrigues
Design thinking class thadeu rodriguesThadeu Rodrigues
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low CostDonald Malloy
 
Authentication Systems in Internet of Things
Authentication Systems in Internet of ThingsAuthentication Systems in Internet of Things
Authentication Systems in Internet of ThingsEswar Publications
 
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud ComputingEnergy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud ComputingEswar Publications
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasTripwire
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
Securing the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterSecuring the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterBrian Gleeson
 
2FA, WTF? - Phil Nash - Codemotion Amsterdam 2016
2FA, WTF? -  Phil Nash - Codemotion Amsterdam 20162FA, WTF? -  Phil Nash - Codemotion Amsterdam 2016
2FA, WTF? - Phil Nash - Codemotion Amsterdam 2016Codemotion
 
Prior Authorization for Dermatology Practices (Sun Knowledge)
Prior Authorization for Dermatology Practices (Sun Knowledge)Prior Authorization for Dermatology Practices (Sun Knowledge)
Prior Authorization for Dermatology Practices (Sun Knowledge)Saikat Mukherjee
 
Instant Single Sign-On and Two-Factor Authentication
Instant Single Sign-On and Two-Factor AuthenticationInstant Single Sign-On and Two-Factor Authentication
Instant Single Sign-On and Two-Factor AuthenticationMaarten Ectors
 
Mobile Two Factor Authentication
Mobile Two Factor AuthenticationMobile Two Factor Authentication
Mobile Two Factor AuthenticationCarter Rabasa
 
Authentication protocols based on zero knowledge proof (Part 2 - Brief talk)
Authentication protocols based on zero knowledge proof (Part 2 - Brief talk)Authentication protocols based on zero knowledge proof (Part 2 - Brief talk)
Authentication protocols based on zero knowledge proof (Part 2 - Brief talk)Israel Buitron
 
Updating Security Operations for the Cloud
Updating Security Operations for the CloudUpdating Security Operations for the Cloud
Updating Security Operations for the CloudAmazon Web Services
 

Destacado (18)

Updating Security Operations For The Cloud
Updating Security Operations For The CloudUpdating Security Operations For The Cloud
Updating Security Operations For The Cloud
 
Disseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksDisseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular Networks
 
ICAM - Demo Architecture review
ICAM - Demo Architecture reviewICAM - Demo Architecture review
ICAM - Demo Architecture review
 
Mechanized Proofs for a Recursive Authentication Protocol
Mechanized Proofs for a Recursive Authentication ProtocolMechanized Proofs for a Recursive Authentication Protocol
Mechanized Proofs for a Recursive Authentication Protocol
 
Design thinking class thadeu rodrigues
Design thinking  class   thadeu rodriguesDesign thinking  class   thadeu rodrigues
Design thinking class thadeu rodrigues
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low Cost
 
Authentication Systems in Internet of Things
Authentication Systems in Internet of ThingsAuthentication Systems in Internet of Things
Authentication Systems in Internet of Things
 
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud ComputingEnergy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Securing the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterSecuring the Enterprise Mobile Perimeter
Securing the Enterprise Mobile Perimeter
 
2FA, WTF? - Phil Nash - Codemotion Amsterdam 2016
2FA, WTF? -  Phil Nash - Codemotion Amsterdam 20162FA, WTF? -  Phil Nash - Codemotion Amsterdam 2016
2FA, WTF? - Phil Nash - Codemotion Amsterdam 2016
 
Prior Authorization for Dermatology Practices (Sun Knowledge)
Prior Authorization for Dermatology Practices (Sun Knowledge)Prior Authorization for Dermatology Practices (Sun Knowledge)
Prior Authorization for Dermatology Practices (Sun Knowledge)
 
Instant Single Sign-On and Two-Factor Authentication
Instant Single Sign-On and Two-Factor AuthenticationInstant Single Sign-On and Two-Factor Authentication
Instant Single Sign-On and Two-Factor Authentication
 
Mobile Two Factor Authentication
Mobile Two Factor AuthenticationMobile Two Factor Authentication
Mobile Two Factor Authentication
 
Authentication protocols based on zero knowledge proof (Part 2 - Brief talk)
Authentication protocols based on zero knowledge proof (Part 2 - Brief talk)Authentication protocols based on zero knowledge proof (Part 2 - Brief talk)
Authentication protocols based on zero knowledge proof (Part 2 - Brief talk)
 
Updating Security Operations for the Cloud
Updating Security Operations for the CloudUpdating Security Operations for the Cloud
Updating Security Operations for the Cloud
 

Similar a APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)AP DealFlow
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Malware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewMalware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewAntiy Labs
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile DeviceTyler Shields
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareIRJET Journal
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Javier Gonzalez
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMISierraware
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Andris Soroka
 

Similar a APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati (20)

Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Malware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewMalware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial View
 
Defending Behind the Mobile Device
Defending Behind the Mobile DeviceDefending Behind the Mobile Device
Defending Behind the Mobile Device
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Android security
Android securityAndroid security
Android security
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 

Más de Masha Geller

Walgreens radium one bootcamp slides
Walgreens radium one bootcamp slidesWalgreens radium one bootcamp slides
Walgreens radium one bootcamp slidesMasha Geller
 
The art of app discovery
The art of app discoveryThe art of app discovery
The art of app discoveryMasha Geller
 
Simon khalaf flurry state of appnation slides
Simon khalaf flurry state of appnation slidesSimon khalaf flurry state of appnation slides
Simon khalaf flurry state of appnation slidesMasha Geller
 
Ott and mobile apps
Ott and mobile appsOtt and mobile apps
Ott and mobile appsMasha Geller
 
Nielsen's maximizing digital roi bootcamp presentation
Nielsen's maximizing digital roi bootcamp presentationNielsen's maximizing digital roi bootcamp presentation
Nielsen's maximizing digital roi bootcamp presentationMasha Geller
 
How brick and mortar can leverage the mobile future
How brick and mortar can leverage the mobile futureHow brick and mortar can leverage the mobile future
How brick and mortar can leverage the mobile futureMasha Geller
 
Flurry simon khalaf_presentation_appnation2013ny
Flurry simon khalaf_presentation_appnation2013nyFlurry simon khalaf_presentation_appnation2013ny
Flurry simon khalaf_presentation_appnation2013nyMasha Geller
 
A look at the super connected consumer
A look at the super connected consumerA look at the super connected consumer
A look at the super connected consumerMasha Geller
 
The arf path to purchase - appnation
The arf   path to purchase - appnationThe arf   path to purchase - appnation
The arf path to purchase - appnationMasha Geller
 
Appnation Cross Platform Summit NYC 2013 Sponsorship Guide
Appnation Cross Platform Summit NYC 2013 Sponsorship GuideAppnation Cross Platform Summit NYC 2013 Sponsorship Guide
Appnation Cross Platform Summit NYC 2013 Sponsorship GuideMasha Geller
 
APPNATION IV Keynote Roundtable - Re-Inventing IT - Meet the Upstarts
APPNATION IV Keynote Roundtable - Re-Inventing IT - Meet the UpstartsAPPNATION IV Keynote Roundtable - Re-Inventing IT - Meet the Upstarts
APPNATION IV Keynote Roundtable - Re-Inventing IT - Meet the UpstartsMasha Geller
 
APPNATION IV - Jefferies Presentation
APPNATION IV - Jefferies PresentationAPPNATION IV - Jefferies Presentation
APPNATION IV - Jefferies PresentationMasha Geller
 
APPNATION IV - Amazon Keynote Presentaiton
APPNATION IV - Amazon Keynote PresentaitonAPPNATION IV - Amazon Keynote Presentaiton
APPNATION IV - Amazon Keynote PresentaitonMasha Geller
 
APPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen KeynoteAPPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen KeynoteMasha Geller
 
APPNATION IV - Lifestree Media - Mitchell Weisman - 10 Good Minutes
APPNATION IV - Lifestree Media - Mitchell Weisman - 10 Good MinutesAPPNATION IV - Lifestree Media - Mitchell Weisman - 10 Good Minutes
APPNATION IV - Lifestree Media - Mitchell Weisman - 10 Good MinutesMasha Geller
 
APPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew KeynoteAPPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew KeynoteMasha Geller
 
APPNATION IV - Google Analytics Presentation - Adam Singer
APPNATION IV - Google Analytics Presentation - Adam SingerAPPNATION IV - Google Analytics Presentation - Adam Singer
APPNATION IV - Google Analytics Presentation - Adam SingerMasha Geller
 
APPNATION IV - Flurry - The State of the App Economy
APPNATION IV - Flurry - The State of the App EconomyAPPNATION IV - Flurry - The State of the App Economy
APPNATION IV - Flurry - The State of the App EconomyMasha Geller
 
APPNATION IV - 10 Good Minutes with Citibank
APPNATION IV - 10 Good Minutes with CitibankAPPNATION IV - 10 Good Minutes with Citibank
APPNATION IV - 10 Good Minutes with CitibankMasha Geller
 

Más de Masha Geller (20)

Walgreens radium one bootcamp slides
Walgreens radium one bootcamp slidesWalgreens radium one bootcamp slides
Walgreens radium one bootcamp slides
 
The art of app discovery
The art of app discoveryThe art of app discovery
The art of app discovery
 
Simon khalaf flurry state of appnation slides
Simon khalaf flurry state of appnation slidesSimon khalaf flurry state of appnation slides
Simon khalaf flurry state of appnation slides
 
Pinsight media+
Pinsight media+Pinsight media+
Pinsight media+
 
Ott and mobile apps
Ott and mobile appsOtt and mobile apps
Ott and mobile apps
 
Nielsen's maximizing digital roi bootcamp presentation
Nielsen's maximizing digital roi bootcamp presentationNielsen's maximizing digital roi bootcamp presentation
Nielsen's maximizing digital roi bootcamp presentation
 
How brick and mortar can leverage the mobile future
How brick and mortar can leverage the mobile futureHow brick and mortar can leverage the mobile future
How brick and mortar can leverage the mobile future
 
Flurry simon khalaf_presentation_appnation2013ny
Flurry simon khalaf_presentation_appnation2013nyFlurry simon khalaf_presentation_appnation2013ny
Flurry simon khalaf_presentation_appnation2013ny
 
A look at the super connected consumer
A look at the super connected consumerA look at the super connected consumer
A look at the super connected consumer
 
The arf path to purchase - appnation
The arf   path to purchase - appnationThe arf   path to purchase - appnation
The arf path to purchase - appnation
 
Appnation Cross Platform Summit NYC 2013 Sponsorship Guide
Appnation Cross Platform Summit NYC 2013 Sponsorship GuideAppnation Cross Platform Summit NYC 2013 Sponsorship Guide
Appnation Cross Platform Summit NYC 2013 Sponsorship Guide
 
APPNATION IV Keynote Roundtable - Re-Inventing IT - Meet the Upstarts
APPNATION IV Keynote Roundtable - Re-Inventing IT - Meet the UpstartsAPPNATION IV Keynote Roundtable - Re-Inventing IT - Meet the Upstarts
APPNATION IV Keynote Roundtable - Re-Inventing IT - Meet the Upstarts
 
APPNATION IV - Jefferies Presentation
APPNATION IV - Jefferies PresentationAPPNATION IV - Jefferies Presentation
APPNATION IV - Jefferies Presentation
 
APPNATION IV - Amazon Keynote Presentaiton
APPNATION IV - Amazon Keynote PresentaitonAPPNATION IV - Amazon Keynote Presentaiton
APPNATION IV - Amazon Keynote Presentaiton
 
APPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen KeynoteAPPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen Keynote
 
APPNATION IV - Lifestree Media - Mitchell Weisman - 10 Good Minutes
APPNATION IV - Lifestree Media - Mitchell Weisman - 10 Good MinutesAPPNATION IV - Lifestree Media - Mitchell Weisman - 10 Good Minutes
APPNATION IV - Lifestree Media - Mitchell Weisman - 10 Good Minutes
 
APPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew KeynoteAPPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew Keynote
 
APPNATION IV - Google Analytics Presentation - Adam Singer
APPNATION IV - Google Analytics Presentation - Adam SingerAPPNATION IV - Google Analytics Presentation - Adam Singer
APPNATION IV - Google Analytics Presentation - Adam Singer
 
APPNATION IV - Flurry - The State of the App Economy
APPNATION IV - Flurry - The State of the App EconomyAPPNATION IV - Flurry - The State of the App Economy
APPNATION IV - Flurry - The State of the App Economy
 
APPNATION IV - 10 Good Minutes with Citibank
APPNATION IV - 10 Good Minutes with CitibankAPPNATION IV - 10 Good Minutes with Citibank
APPNATION IV - 10 Good Minutes with Citibank
 

APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

  • 1. The State of Security in The Mobile Enterprise Cesare Garlati VP Consumerization & Mobile Security – Trend Micro Co-Chair Mobile Group – Cloud Security Alliance APPNATION – December, 2012
  • 2. Cloud Security Alliance: Mobile Guidance V1 Security Guidance for Critical Areas of Mobile Computing  Mobile Computing Definition  Threats to Mobile Computing  Maturity of the Mobile Landscape  BYOD Policies  Mobile Authentication  App Stores  Mobile Device Management https://cloudsecurityalliance.org/research/mobile/
  • 3. CSA Top Mobile Threats – Evil 8 1. Data loss from lost, stolen or decommissioned devices. 2. Information-stealing mobile malware. 3. Data loss and data leakage through poorly written third-party apps. 4. Vulnerabilities within devices, OS, design and third-party applications. 5. Unsecured Wi-Fi, network access and rogue access points. 6. Unsecured or rogue marketplaces. 7. Insufficient management tools, capabilities and access to APIs. 8. NFC and proximity-based hacking.
  • 4. How Secure and Manageable? Raimund Genes Chief Technology Officer, Trend Micro http://trendmicro.com/our-contributors/raimund-genes Chris Silva Industry Analyst, Altimeter Group http://www.altimetergroup.com/about/team/chris-silva Nigel Stanley Practice Leader, Bloor Research http://www.bloorresearch.com/about/people/nigel-stanley.html Philippe Winthrop Managing Director, Enterprise Mobility Foundation http://www.enterprisemobilitymatters.com/about.html http://trendmicro.com/cloud-content/us/pdfs/business/reports/rpt_enterprise_readiness_consumerization_mobile_platforms.pdf
  • 8. Ratings By Category Mobile Technology Gap
  • 9. Ratings By Mobile Platform Consumer Technology Gap
  • 10. Mobile vulnerabilities are real Android Apple iOS  CVE-2012-3979 – log_print  CVE-2012-0643 – Malicious function, allowing remote code allows remote attackers to attackers to execute arbitrary bypass sandbox restrictions and code via a crafted web page that execute arbitrary code. calls the JavaScript dump function.  CVE-2012-0646 – Format string vulnerability in VPN allows  CVE-2011-3874 – Stack- remote attackers to execute based buffer overflow in libsysutils arbitrary code via a crafted racoon allows user-assisted remote configuration file. attackers to execute arbitrary code via an application call.  CVE-2012-0642 – Integer underflow allows remote attackers  CVE-2011-4276 – Bluetooth to execute arbitrary code via a service allows remote attackers crafted catalog file in an HFS disk within range to obtain contact data image. via an AT phonebook transfer. Source: National Vulnerability Database via CVEDetails.com – as of October 4, 2012
  • 11. No Platform is immune: Apple iOS Detail Source: National Vulnerability Database via CVEDetails.com – as of October 4, 2012
  • 12. Apple iOS Jailbreaking Trends June 2007 July 2008 July 2009 June 2010 Oct 2011 Sept 2012 iPhone iPhone 3G iPhone 3GS iPhone 4 iPhone 4S iPhone 5 Source: Google Trends – as of October 4, 2012
  • 13. Android is the most exploited Source: Trend Labs, Trend Micro Inc. – as of Q2 2012
  • 14. Malicious Apps on Legit Marketplace  March 2011 – 58 malicious apps (approx 250,000 victims)  May 2011 – 24 malicious apps (up to 120,000 victims)  December 2011 – 27 malicious apps (approx 14,000 victims).  February 2012 – 37 “Fan Apps” stealing handset information and aggressive advertising  August 2012 – many, many more …
  • 15. Android Versions Distribution 73% Fragmentation Vulnerable Devices Source: Google http://developer.android.com/resources/dashboard/platform-versions – as of August1, 2012
  • 16. Mobility is not the problem “Consumerization will be the most significant trend affecting IT during the next 10 years” Gartner New technology emerges first in the consumer market and then spreads into business organizations brought in by the employees IT and consumer electronics converge as individuals rely on the same devices and applications for personal use and work-related activities Overwhelmed by the wave of consumer technology flooding the enterprise, IT managers lose control and struggle to enforce policies
  • 17. ConsumerizationReport© Source: Trend Micro Global Survey IT Managers, 500+ Employees, February 2012
  • 18. "What mobile platforms are allowed by "Rank security and manageability of your BYOD policy?" each mobile operating system" BlackBerry 71% Apple iOS 20% Android 68% BlackBerry 19% Windows Ph 53% Android 18% Apple iOS 51% Windows Ph 14% Other 25% Other 15% BYOD Top 5 concerns "Has your company ever experienced a security breach as result of BYOD?" Security 64% Yes No Data Loss 59% Compliance 43% 47% 49% Personal… 41% Privacy 40% 5% Don't Know ConsumerizationReport© Source: Trend Micro Global Survey IT Managers, 500+ Employees, February 2012
  • 19. You are not ready for this • Consumer mobile technology is invading the enterprise and you won‟t be able to resist it 1 Embrace Consumerization • Consumer technology is not as secure as Understand the risk profile manageable as required by 2 of the various platforms the enterprise Deploy new security and • No platform is immune 3 management tools from attack, although some are safer than others
  • 20. Thank You! Cesare Garlati http://BringYourOwnIT.com
  • 21. As VP of Mobile Security at Trend Micro, Cesare Garlati serves as the evangelist for the enterprise mobility product line. Cesare is responsible for raising awareness of Trend Micro‟s vision for security solutions in an increasingly consumerized IT world. Prior to Trend Micro, Mr. Garlati held director positions within leading mobility companies such as iPass, Smith Micro Software and WaveMarket – now LocationLabs. Prior to this, he was senior manager of product development at Oracle, where he led the development of Cesare Garlati Oracle‟s first cloud application and many other modules of the Oracle E-Business Suite. Cesare Garlati | Vice President Consumerization & Mobile Security Cesare holds an MBA from U.C. Berkeley, a BS in Blog: BringYourOwnIT.com Computer Science and professional certifications from linkedin/in/CesareGarlati Microsoft, Cisco and Sun. Cesare is Chair of Trend Micro twitter/CesareGarlati Cesare_Garlati@trendmicro.com Advisory Board for Consumerization and Mobile and Co- Chair of the CSA Mobile Working Group. Skype: Cesare.Garlati Mobile: +1 408.667.3320 Blog: http://BringYourOwnIT.com
  • 26. Installed Base % 4Q11 Installed Base % 2015* 60% 50% 40% 30% 20% 10% 0% X Android iOS Win Ph RIM Symbian Other Android iOS Win Ph RIM Symbian Other 38% 17% 3% 12% 26% 3% 52% 19% 21% 6% 0% 2% 59% 92% Android and iOS will account for over 70% of smartphone sales by the end of 2012. Microsoft will rise to third place in the global OS rankings by 2013, ahead of Research In Motion. ConsumerizationReport© Source: Trend Micro internal analysis based on Gartner, Forrester and IDC market data – February, 28 2012
  • 27. How To: Jailbreak iOS (5.1.1) Download Links Xxxx v2.0.4 MacOSX (10.5, 10.6, 10.7) Xxxx v2.0.4 Windows (XP/Vista/Win7) Xxxx v2.0.4 Linux (x86/x86_64) How To Use Xxxxx 2.0: 1. Make a backup of your device in iTunes by right clicking on your device name under the „Devices‟ menu and click „Back Up‟. 2. Open Xxxxx and be sure you are still connected via USB cable to your computer. 3. Click „Jailbreak‟ and wait…. just be patient and do not disconnect your device. 4. Once jailbroken return to iTunes and restore your backup from earlier. Xxxxx 2.0 supports the following devices on 5.1.1: iPad 1, iPad 2, iPad 3 (iPad2,4 is now supported as of Xxxxx 2.0.4) iPhone 3GS, iPhone 4, iPhone 4S iPod touch 3rd generation, iPod touch 4th generation
  • 28. Taller screens like Cydia too. :)  @saurik – Jay Freeman  Cydia: 1.5M Apps per day  5% to 10% of Apple iOS devices  $8M rev 2011 (to developers)
  • 29. Apple iOS Jailbreaking Trends – U.S. June 2007 July 2008 July 2009 June 2010 Oct 2011 Sept 2012 iPhone iPhone 3G iPhone 3GS iPhone 4 iPhone 4S iPhone 5 Source: Google Trends – as of October 4, 2012
  • 30. Malicious Apps on Legit Marketplace
  • 32. 3D Porsche Sports Car HD Live Wallpapers
  • 34. FBI Warns of Mobile Malware Risks Source: Federal Bureau Of Investigation – New E-Scams & Warnings – 10/12/2012

Notas del editor

  1. THE STATE OF SECURITY IN THE MOBILE ENTERPRISE (Presented By The Cloud Security Alliance)Join APPNATION and The Cloud Security Alliance for a two-part session on the state of security in the mobile enterprise.  To kick things off, Cesare Garlati, VP, Mobile Security at Trend Micro, will present an unfiltered look at the state of security as the enterprise mobility revolution pushes forward at a blistering pace.  Cesare will showcase, in real-time, security flaws that all business-line and I.T. managers should know about and discuss other emerging issues that are coming to the fore as the pace of mobile innovation and connectivity in a BYOD world.  Cesare’s presentation will be followed by an executive-level roundtable led by Cloud Security Alliance Executive Director, Jim Reavis, and comprised of leading enterprise security experts to discuss the remedies for short-term security gaps and flaws and explore what longer-term security issues remain on the horizon as the Consumerization and BYOD uber-trends continue to accelerate across the enterprise.PART I: YOU ARE NOT READY FOR THIS!CESARE GARLATI, VP, MOBILE SECURITY, TREND MICROPART II: LEADING MOBILE SECURTY EXECUTIVES WEIGH INSESSION LEADER: JIM REAVIS, EXECUTIVE DIRECTOR, CLOUD SECURITY ALLIANCECESARE GARLATI, VP, MOBILE SECURITY, TREND MICRODORON ROTMAN, MANAGING DIRECTOR & NATIONAL PRIVACY SECURITY LEADER, KPMGBRIAN REED, CHIEF MARKETING AND PRODUCT OFFICER, BOXTONEDENNIS DEVLIN, ASSISTANT VICE PRESIDENT, INFORMATION SECURITY &  COMPLIANCE SERVICES, GEORGE WASHINGTON UNIVERSITY
  2. High level overview of the top mobile threats findings – basic discussions around these…not spending too much time.
  3. As Vice President of Mobile Security at Trend Micro, Cesare Garlati serves as the evangelist for the enterprise mobility product line. Cesare is responsible for raising awareness of Trend Micro’s vision for security solutions in an increasingly consumerized IT world, as well as ensuring that customer insights are incorporated into Trend solutions. Prior to Trend Micro, Mr. Garlati held director positions within leading mobility companies such as iPass, Smith Micro and WaveMarket. Prior to this, he was senior manager of product development at Oracle, where he led the development of Oracle’s first cloud application and many other modules of the Oracle E-Business Suite. Cesare has been frequently quoted in the press, including such media outlets as The Economist, Financial Times, The Register, The Guardian, Le Figaro, El Pais, Il Sole 24 Ore, ZD Net, SC Magazine, Computing and CBS News. An accomplished public speaker, Cesare also has delivered presentations and highlighted speeches at many events, including the Mobile World Congress, Gartner Security Summits, IDC CIO Forums, CTIA Applications and the RSA Conference. Cesare holds a Berkeley MBA, a BS in Computer Science and numerous professional certifications from Microsoft, Cisco and Sun. Cesare is the chair of the Consumerization Advisory Board at Trend Micro and co-chair of the CSA Mobile Working Group - Cloud Security Alliance.