SlideShare a Scribd company logo
1 of 24
Download to read offline
Mobile Security
David Mann – CIO & EVP
david.mann@atmecs.com
(714) 606-9356
May 6, 2014
© ATMECS
Agenda
• About ATMECS
• Why Mobile Security?
• Mobile Security Challenges
• Mobile Security Strategy
• Gartner’s Magic Quadrant
• References
Let's Partner
Let's Partner
ATMECS is a trusted technology partner providing real business solutions.
• Application Development
• Systems Integration
• Database Solutions
• Data Monetization
• Big Data
• Behavior Insight
• Predictive Analytic
• BI & Data Warehouse
• Data Security
• Quality Assurance
• QA Manual Testing
• QA Automation
• Service Oriented Architecture
• SOA Assessment
• SOA Implementation
• Expert Offshore Resources
• Maintenance and Support
What is ATMECS?
ATMECS VISION
Trusted Partnership
Let's Partner
ATMECS MISSION
To Improve Our Clients’ IT Projects Success
Let's Partner
Let's Partner
What’s in the name?
A – Aspire
T – Think
M – Manage
E – Engage
C – Create
S – Succeed
ATMECS – Passionate Minds
Let's Partner
PEOPLE
(Users, Employees,
Contractors, Customers,
Partners)
DEVICES
(Mobile Phones, IOTs,
Servers, Laptops, Tablets)
DATA
(Unstructured &
Structured)
Network is no longer point of
control. So security is no
more single point of control.
Why Mobile Security ?
Let's Partner
Mobile Usage Statistics
As per Google ThinkInsights, mobile search is of 48%.
As per Consumer Preference Q4 2013, 89% of time is spent on Mobile App
Let's Partner
Mobile
Threats
Loss / Stolen Devices Mobile Malware / Phishing
Too many
mobile
platforms
Traversing
insecure
networks
Overlap of
Personal and
Official Usage
Outside enterprise
network, mobile access of
Cloud based data storage
IoT devices with gateway
Any other
threats
Mobile Security Threats and Challenges
Mobile Threats
Let's Partner
Lost & Stolen Mobile Devices
• As per The Huffington Post,
• In San Francisco, record rose 23%
in 2013
• In New York, iPhones/iPads stolen
reported 8% increase in 2013
• In Washington D.C, 6% increase in
2013
• In Philadelphia, 6% increase from
2012, 44% increase from 2011
Let's Partner
0
5
10
15
20
25
San Francisco New York Washington D.C Philadelphia
Percentage Increase in Thefts - 2013
Mobile Security Strategy
Let's Partner
Mobile Security
StrategyMobile Device
Management
(MDM)
Mobile
Application
Management
(MAM)
Mobile Device
Security
Mobile Data
Protection
Mobile Virtual
Desktop
Infrastructure
Mobile App
Risk
Management
Always-On-
VPN
Trusted
Execution
Environment
Mobile Device Management
• MDM software secures, manages, controls
smartphones and tablets.
• MDM tools include the ability to enforce
policies, track inventory and perform real-
time monitoring and reporting.
• Keeping Track of Assets
• Corporate Owned
• BYOD (Bring Your Own Device)
• Onboarding Procedure, Training
• Ownership (who has them)
• Configuration (software & hardware)
Let's Partner
• Keeping Devices Safe
• Password Protection
• Numeric & Alphanumeric
• Biometric (face detection, voice, fingerprint)
• Virus & Malware
• Lost Devices – Remote Wipe, Remote Lock, Locators (ex:
Find My iPhone)
• Backup & Restore
Let's Partner
Mobile Device Security
Mobile Device Data Protection
• Decide what Corporate Data is allowed on the Device
• Email, File Sharing, App Data Access
• Protect the Data
• Secure Application Development Guidelines
• Encryption (data at rest, data in transition, data in use)
• Local Password Protection for Accessing the Data
• Minimal Data on User’s Device
• Wipe the Data when we lose physical control
Let's Partner
Mobile Virtual Desktop Interface
• Vendors have begun offering
VDI clients for mobile
platforms
• Remote Access, Organizations
at low risk
• Protect the Data
• Data access is on server, no
download to mobile
Let's Partner
Mobile App Risk Management
Let's Partner
• Enterprise can use private
clouds for their apps
• Instead of downloading app
from App Store, enterprise
apps can be available in
private clouds
• Protect as per Enterprise
Policy
• It ensures risk based policy
and apps downloaded from
private clouds are risk free
from malicious attacks
Always-On-VPN
Let's Partner
• It involves routing all data traffic to company/organization
• Use encrypted tunnel, traffic load on corporate usage
• Ensures organizations centrally implemented
countermeasures apply to mobile as well
Trusted Execution Environment
(TEE)
• GlobalPlatform is standardizing TEE technology
• It offers separate execution space alongside of OS
• It offers high level of security
• Protects Every Data
• Protects user input entered on screen through touch or
keyboard
• Protects data displayed on screen
• Protects sensitive data such as encryption keys, and PINs
Let's Partner
Magic Quadrant (Mobile Device
Management Software)
Let's Partner
Gartner’s Magic Quadrant (2012)
Top Five Vendors of 2012
1. MobileIron
2. AirWatch
3. Fiberlink
4. Zenprise
5. Good Technology
Gartner’s Magic Quadrant (2013)
Top Three Vendors of 2013
1. AirWatch
2. MobileIron
3. Citrix
Magic Quadrant (Mobile Data
Protection products)
Let's Partner
Gartner’s Magic Quadrant (2013)
Top Three Vendors of 2013
1. McAfee
2. Sophos
3. Check Point
ATMECS’ Experience
(Neoforma)
Let's Partner
Q & A
www.atmecs.com
References
• http://searchconsumerization.techtarget.com/feature/Mobile-device-
management-vs-mobile-application-management
• https://www.owasp.org/index.php/OWASP_Mobile_Security_Project
• http://appleinsider.com/articles/14/02/27/apple-touts-secure-design-of-ios-as-
google-chief-admits-android-is-best-target-for-malicious-hackers
• http://www.slideshare.net/jay123min/report-on-mobile-
security?qid=8b57be79-a610-4290-8a51-
a9f34e94c1d7&v=qf1&b=&from_search=5
• http://globalplatform.org/aboutus.asp
• http://www.slideshare.net/OracleMKTPR20/oracle-id-m-mobile-security-
overview
• http://blog.cygnet-infotech.com/2013/06/mobile-device-management-mdm-
essential.html
• https://codeproof.com/PressRelease/Mobile_Security_Infographics_2013
Let's Partner

More Related Content

What's hot

The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT StaffBVU
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Citrix
 
Bt idc event cloud adoption in ireland
Bt  idc event cloud adoption in irelandBt  idc event cloud adoption in ireland
Bt idc event cloud adoption in irelandFiona Sexton
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
The ROI of Collaboration featuring research from Forrester
The ROI of Collaboration featuring research from ForresterThe ROI of Collaboration featuring research from Forrester
The ROI of Collaboration featuring research from Forrestertibbr
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013 Troy C. Fulton
 
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]Citrix
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Citrix
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
The ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social NetworkingThe ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social Networkingtibbr
 
MT99Dell OCIO: How we're integrating IT for the largest merger in tech history
MT99Dell OCIO:  How we're integrating IT for the largest merger in tech historyMT99Dell OCIO:  How we're integrating IT for the largest merger in tech history
MT99Dell OCIO: How we're integrating IT for the largest merger in tech historyDell EMC World
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array NetworksIntellicomp GmbH
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 

What's hot (20)

The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT Staff
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 
Bt idc event cloud adoption in ireland
Bt  idc event cloud adoption in irelandBt  idc event cloud adoption in ireland
Bt idc event cloud adoption in ireland
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
The ROI of Collaboration featuring research from Forrester
The ROI of Collaboration featuring research from ForresterThe ROI of Collaboration featuring research from Forrester
The ROI of Collaboration featuring research from Forrester
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
The ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social NetworkingThe ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social Networking
 
MT99Dell OCIO: How we're integrating IT for the largest merger in tech history
MT99Dell OCIO:  How we're integrating IT for the largest merger in tech historyMT99Dell OCIO:  How we're integrating IT for the largest merger in tech history
MT99Dell OCIO: How we're integrating IT for the largest merger in tech history
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Byod
ByodByod
Byod
 

Viewers also liked

NODE JS OC Meetup 1
NODE JS OC Meetup 1NODE JS OC Meetup 1
NODE JS OC Meetup 1eddify
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...IBM Security
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report PresentationSophos
 
Mobile roadmap & maturity model
Mobile roadmap & maturity modelMobile roadmap & maturity model
Mobile roadmap & maturity modelPatrick McLean
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility StrategyFreeform Dynamics
 
Build a successful enterprise mobility strategy
Build a successful enterprise mobility strategyBuild a successful enterprise mobility strategy
Build a successful enterprise mobility strategyAjit Gokhale
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapPomeroy
 

Viewers also liked (7)

NODE JS OC Meetup 1
NODE JS OC Meetup 1NODE JS OC Meetup 1
NODE JS OC Meetup 1
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
Mobile roadmap & maturity model
Mobile roadmap & maturity modelMobile roadmap & maturity model
Mobile roadmap & maturity model
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility Strategy
 
Build a successful enterprise mobility strategy
Build a successful enterprise mobility strategyBuild a successful enterprise mobility strategy
Build a successful enterprise mobility strategy
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 

Similar to Mobile Security

MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security William John Todd
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAtakidozen
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 
Managing BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise DataManaging BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise Datakidozen
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom BainEC-Council
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020tmbainjr131
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014Irene Ventayol
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 

Similar to Mobile Security (20)

MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAta
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Managing BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise DataManaging BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise Data
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 

More from James Sutter

Future of intelligent transportation CIO Roundtable 080214
Future of intelligent transportation   CIO Roundtable 080214Future of intelligent transportation   CIO Roundtable 080214
Future of intelligent transportation CIO Roundtable 080214James Sutter
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
3-D Printing_feb_13_2014
3-D Printing_feb_13_20143-D Printing_feb_13_2014
3-D Printing_feb_13_2014James Sutter
 
Scrum Agile by David Mann
 Scrum Agile by David Mann Scrum Agile by David Mann
Scrum Agile by David MannJames Sutter
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013James Sutter
 
CIO evolution 10102013
CIO evolution 10102013CIO evolution 10102013
CIO evolution 10102013James Sutter
 
CIO RoundtableIot IOT
CIO RoundtableIot IOTCIO RoundtableIot IOT
CIO RoundtableIot IOTJames Sutter
 
Technology business management_7.13
Technology business management_7.13Technology business management_7.13
Technology business management_7.13James Sutter
 
Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...James Sutter
 
Erp governance methodology and case studies v rjt
Erp governance methodology and case studies  v rjtErp governance methodology and case studies  v rjt
Erp governance methodology and case studies v rjtJames Sutter
 
Controlling project costs
Controlling project costsControlling project costs
Controlling project costsJames Sutter
 
Google apps CIO Peer Group presentation
Google apps CIO Peer Group presentationGoogle apps CIO Peer Group presentation
Google apps CIO Peer Group presentationJames Sutter
 
CIO Roundtable 10-12
CIO Roundtable 10-12CIO Roundtable 10-12
CIO Roundtable 10-12James Sutter
 
CIO presentation aug 2012
CIO presentation aug 2012 CIO presentation aug 2012
CIO presentation aug 2012 James Sutter
 
Mobile security v2
Mobile security v2Mobile security v2
Mobile security v2James Sutter
 
Peer group itsm presentation 6.12
Peer group itsm presentation 6.12Peer group itsm presentation 6.12
Peer group itsm presentation 6.12James Sutter
 
Google apps cio peer group presentation
Google apps cio peer group presentationGoogle apps cio peer group presentation
Google apps cio peer group presentationJames Sutter
 

More from James Sutter (20)

Future of intelligent transportation CIO Roundtable 080214
Future of intelligent transportation   CIO Roundtable 080214Future of intelligent transportation   CIO Roundtable 080214
Future of intelligent transportation CIO Roundtable 080214
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
3-D Printing_feb_13_2014
3-D Printing_feb_13_20143-D Printing_feb_13_2014
3-D Printing_feb_13_2014
 
Scrum Agile by David Mann
 Scrum Agile by David Mann Scrum Agile by David Mann
Scrum Agile by David Mann
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
CIO evolution 10102013
CIO evolution 10102013CIO evolution 10102013
CIO evolution 10102013
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
CIO RoundtableIot IOT
CIO RoundtableIot IOTCIO RoundtableIot IOT
CIO RoundtableIot IOT
 
Technology business management_7.13
Technology business management_7.13Technology business management_7.13
Technology business management_7.13
 
Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...Oc cio roundtable mooney management imperatives for realizing value from clou...
Oc cio roundtable mooney management imperatives for realizing value from clou...
 
Erp governance methodology and case studies v rjt
Erp governance methodology and case studies  v rjtErp governance methodology and case studies  v rjt
Erp governance methodology and case studies v rjt
 
Controlling project costs
Controlling project costsControlling project costs
Controlling project costs
 
CIO Branding
CIO BrandingCIO Branding
CIO Branding
 
Google apps CIO Peer Group presentation
Google apps CIO Peer Group presentationGoogle apps CIO Peer Group presentation
Google apps CIO Peer Group presentation
 
CIO Roundtable 10-12
CIO Roundtable 10-12CIO Roundtable 10-12
CIO Roundtable 10-12
 
CIO presentation aug 2012
CIO presentation aug 2012 CIO presentation aug 2012
CIO presentation aug 2012
 
Mobile security v2
Mobile security v2Mobile security v2
Mobile security v2
 
Peer group itsm presentation 6.12
Peer group itsm presentation 6.12Peer group itsm presentation 6.12
Peer group itsm presentation 6.12
 
CIO Value Issue
CIO Value IssueCIO Value Issue
CIO Value Issue
 
Google apps cio peer group presentation
Google apps cio peer group presentationGoogle apps cio peer group presentation
Google apps cio peer group presentation
 

Recently uploaded

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Recently uploaded (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Mobile Security

  • 1. Mobile Security David Mann – CIO & EVP david.mann@atmecs.com (714) 606-9356 May 6, 2014 © ATMECS
  • 2. Agenda • About ATMECS • Why Mobile Security? • Mobile Security Challenges • Mobile Security Strategy • Gartner’s Magic Quadrant • References Let's Partner
  • 3. Let's Partner ATMECS is a trusted technology partner providing real business solutions. • Application Development • Systems Integration • Database Solutions • Data Monetization • Big Data • Behavior Insight • Predictive Analytic • BI & Data Warehouse • Data Security • Quality Assurance • QA Manual Testing • QA Automation • Service Oriented Architecture • SOA Assessment • SOA Implementation • Expert Offshore Resources • Maintenance and Support What is ATMECS?
  • 5. ATMECS MISSION To Improve Our Clients’ IT Projects Success Let's Partner
  • 6. Let's Partner What’s in the name? A – Aspire T – Think M – Manage E – Engage C – Create S – Succeed ATMECS – Passionate Minds
  • 7. Let's Partner PEOPLE (Users, Employees, Contractors, Customers, Partners) DEVICES (Mobile Phones, IOTs, Servers, Laptops, Tablets) DATA (Unstructured & Structured) Network is no longer point of control. So security is no more single point of control. Why Mobile Security ?
  • 8. Let's Partner Mobile Usage Statistics As per Google ThinkInsights, mobile search is of 48%. As per Consumer Preference Q4 2013, 89% of time is spent on Mobile App
  • 9. Let's Partner Mobile Threats Loss / Stolen Devices Mobile Malware / Phishing Too many mobile platforms Traversing insecure networks Overlap of Personal and Official Usage Outside enterprise network, mobile access of Cloud based data storage IoT devices with gateway Any other threats Mobile Security Threats and Challenges
  • 11. Lost & Stolen Mobile Devices • As per The Huffington Post, • In San Francisco, record rose 23% in 2013 • In New York, iPhones/iPads stolen reported 8% increase in 2013 • In Washington D.C, 6% increase in 2013 • In Philadelphia, 6% increase from 2012, 44% increase from 2011 Let's Partner 0 5 10 15 20 25 San Francisco New York Washington D.C Philadelphia Percentage Increase in Thefts - 2013
  • 12. Mobile Security Strategy Let's Partner Mobile Security StrategyMobile Device Management (MDM) Mobile Application Management (MAM) Mobile Device Security Mobile Data Protection Mobile Virtual Desktop Infrastructure Mobile App Risk Management Always-On- VPN Trusted Execution Environment
  • 13. Mobile Device Management • MDM software secures, manages, controls smartphones and tablets. • MDM tools include the ability to enforce policies, track inventory and perform real- time monitoring and reporting. • Keeping Track of Assets • Corporate Owned • BYOD (Bring Your Own Device) • Onboarding Procedure, Training • Ownership (who has them) • Configuration (software & hardware) Let's Partner
  • 14. • Keeping Devices Safe • Password Protection • Numeric & Alphanumeric • Biometric (face detection, voice, fingerprint) • Virus & Malware • Lost Devices – Remote Wipe, Remote Lock, Locators (ex: Find My iPhone) • Backup & Restore Let's Partner Mobile Device Security
  • 15. Mobile Device Data Protection • Decide what Corporate Data is allowed on the Device • Email, File Sharing, App Data Access • Protect the Data • Secure Application Development Guidelines • Encryption (data at rest, data in transition, data in use) • Local Password Protection for Accessing the Data • Minimal Data on User’s Device • Wipe the Data when we lose physical control Let's Partner
  • 16. Mobile Virtual Desktop Interface • Vendors have begun offering VDI clients for mobile platforms • Remote Access, Organizations at low risk • Protect the Data • Data access is on server, no download to mobile Let's Partner
  • 17. Mobile App Risk Management Let's Partner • Enterprise can use private clouds for their apps • Instead of downloading app from App Store, enterprise apps can be available in private clouds • Protect as per Enterprise Policy • It ensures risk based policy and apps downloaded from private clouds are risk free from malicious attacks
  • 18. Always-On-VPN Let's Partner • It involves routing all data traffic to company/organization • Use encrypted tunnel, traffic load on corporate usage • Ensures organizations centrally implemented countermeasures apply to mobile as well
  • 19. Trusted Execution Environment (TEE) • GlobalPlatform is standardizing TEE technology • It offers separate execution space alongside of OS • It offers high level of security • Protects Every Data • Protects user input entered on screen through touch or keyboard • Protects data displayed on screen • Protects sensitive data such as encryption keys, and PINs Let's Partner
  • 20. Magic Quadrant (Mobile Device Management Software) Let's Partner Gartner’s Magic Quadrant (2012) Top Five Vendors of 2012 1. MobileIron 2. AirWatch 3. Fiberlink 4. Zenprise 5. Good Technology Gartner’s Magic Quadrant (2013) Top Three Vendors of 2013 1. AirWatch 2. MobileIron 3. Citrix
  • 21. Magic Quadrant (Mobile Data Protection products) Let's Partner Gartner’s Magic Quadrant (2013) Top Three Vendors of 2013 1. McAfee 2. Sophos 3. Check Point
  • 23. Let's Partner Q & A www.atmecs.com
  • 24. References • http://searchconsumerization.techtarget.com/feature/Mobile-device- management-vs-mobile-application-management • https://www.owasp.org/index.php/OWASP_Mobile_Security_Project • http://appleinsider.com/articles/14/02/27/apple-touts-secure-design-of-ios-as- google-chief-admits-android-is-best-target-for-malicious-hackers • http://www.slideshare.net/jay123min/report-on-mobile- security?qid=8b57be79-a610-4290-8a51- a9f34e94c1d7&v=qf1&b=&from_search=5 • http://globalplatform.org/aboutus.asp • http://www.slideshare.net/OracleMKTPR20/oracle-id-m-mobile-security- overview • http://blog.cygnet-infotech.com/2013/06/mobile-device-management-mdm- essential.html • https://codeproof.com/PressRelease/Mobile_Security_Infographics_2013 Let's Partner