SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
The Evolution of
Mobile Security
Fifteen years of learning from mobile mistakes
The first
smartphones
start to appear
Palm added email, basic
web access and a phone to
a personal organizerwith
the Treo 650. There was
almost no security.
2004
2006
Nokia’s N95 made
camera, music and
GPS a priority.
Name: Software 2.0
Publisher: ABD Software Inc.
From: http//: ABDsoftware2.com
CERTIFICATE
Symbian and
Nokia take viruses
seriously
Symbian 9 required most
apps to be signed to
protect against viruses.
2007
Early iPhones used ASLR, code signing,
sandboxing and hardware encryption,
setting new expectations forphones.
Hash
Function
Code Hashed Code Signed Code
SignatureEncrypt Hash Using
a Private Key
Attached
to Code
Encrypted Hash &
Time Stamp
Apple reinvents the phone with
open software, closed hardware
Read on formore Mobile Security historical facts
Protect Your Enterprise With
Samsung Knox Security
Discoverwhy Samsung phones are the most secure
and manageable mobile devices available.
2008
Policies
Manage
Devices
InfoSec and
ITManagers
Exchange Server
With ActiveSync
Microsoft Exchange
ActiveSync (EAS)
builds in MDM
Microsoft built basic MDM
feature into EAS, bolstering
admin security. BlackBerry
broadened MDM beyond
Exchange in 2009.
Mobile Devices
2010
Android v2.2 makes
EAS management easy
with built-in support
Security policy controls like remote
wipe became part of mainstream
Android, shifting it toward
enterprise environments.
REMOTE
WIPE
2012
Samsung Knox identifies
key enterprise security
requirements
Samsung began investing in
securityto make Android
enterprise-safe, pushing
features like SE Linux into
the mainstream.
2013
TrustZone, a secure
mode supported by
ARM processors,
protects information
against compromise.
Normal
Apps
Nonsecure World
Client TEE API
Rich OS
Trusted
Apps
Secure World
Secure TEE API
Trusted OS
Monitor
ARM Security Extensions
TrustZone protects
encryption keys and
identity information
2014 2017
READ
ONLY
RKP
SECURE WORLD NORMALWORLD
KERNEL
Control instructions and page table
update functions are replaced by
traps to the Secure World
Page tables are mapped
read-only so they cannot be
directly modified by the kernel
Galaxy Note4
(2014)
Galaxy Note Edge
(2014)
Galaxy Note5
(2015)
Galaxy S7
(2016)
Galaxy Note8
(2017)
Galaxy S8
(2017)
Samsung
Knox innovations
continue to add
security to Android
Knox brought critical features to
Android, like biometrics, real-time
kernel protection and separate
work/home profiles.
2018
Samsung Knox continues
to blaze the trail in mobile
security, as olderfeatures
are reimagined by Google
forAndroid.
Knox 3.0 joins Google’s
Android Enterprise with
Samsung security
©2019 Samsung Electronics America, Inc. Samsung is a registered mark of Samsung Electronics Corp., Ltd. All brand, product,
service names and logos are trademarks and/or registered trademarks of their respective manufacturers and companies.
Samsung Knox security empowers
enterprises to go mobile-first confidently.

Más contenido relacionado

La actualidad más candente

Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
pankaj009
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
Sourav Roy
 

La actualidad más candente (20)

Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
 
Oscp preparation
Oscp preparationOscp preparation
Oscp preparation
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
installation of VM and ubuntu.pptx
installation of VM and ubuntu.pptxinstallation of VM and ubuntu.pptx
installation of VM and ubuntu.pptx
 
Enterprise network
Enterprise networkEnterprise network
Enterprise network
 
Protocoles WebSSO CAS, OpenID, SAML : comment choisir ?
Protocoles WebSSO CAS, OpenID, SAML : comment choisir ?Protocoles WebSSO CAS, OpenID, SAML : comment choisir ?
Protocoles WebSSO CAS, OpenID, SAML : comment choisir ?
 
MQTT security
MQTT securityMQTT security
MQTT security
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturity
 
Network Security
Network SecurityNetwork Security
Network Security
 
Debian Linux Overview
Debian Linux OverviewDebian Linux Overview
Debian Linux Overview
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Secure Network Design
Secure Network DesignSecure Network Design
Secure Network Design
 
Microsoft Hyper-V
Microsoft Hyper-VMicrosoft Hyper-V
Microsoft Hyper-V
 
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 

Similar a The Evolution of Mobile Security

Samsung knox the most secure android solution
Samsung knox   the most secure android solutionSamsung knox   the most secure android solution
Samsung knox the most secure android solution
Javier Gonzalez
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
IAEME Publication
 
Android System Design And Power Management
Android System Design And Power ManagementAndroid System Design And Power Management
Android System Design And Power Management
Nilay Mishra
 

Similar a The Evolution of Mobile Security (20)

Samsung and Android Security brochure
Samsung and Android Security brochureSamsung and Android Security brochure
Samsung and Android Security brochure
 
Samsung knox the most secure android solution
Samsung knox   the most secure android solutionSamsung knox   the most secure android solution
Samsung knox the most secure android solution
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
smart phone
smart phonesmart phone
smart phone
 
FIDO Present and Future from the mobile Perspective
FIDO Present and Future from the  mobile PerspectiveFIDO Present and Future from the  mobile Perspective
FIDO Present and Future from the mobile Perspective
 
Smartphone 110810195522-phpapp02
Smartphone 110810195522-phpapp02Smartphone 110810195522-phpapp02
Smartphone 110810195522-phpapp02
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
What Android for Work Means for the Enterprise
What Android for Work Means for the EnterpriseWhat Android for Work Means for the Enterprise
What Android for Work Means for the Enterprise
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business.
 
a study of evolutionary mobile operating system
a study of evolutionary mobile operating system a study of evolutionary mobile operating system
a study of evolutionary mobile operating system
 
Android
AndroidAndroid
Android
 
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORMPERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
 
Workshop on Android App Development
Workshop on Android App DevelopmentWorkshop on Android App Development
Workshop on Android App Development
 
Android os(comparison all other mobile os)
Android os(comparison all other mobile os)Android os(comparison all other mobile os)
Android os(comparison all other mobile os)
 
Network
Network Network
Network
 
Android123
Android123Android123
Android123
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Android System Design And Power Management
Android System Design And Power ManagementAndroid System Design And Power Management
Android System Design And Power Management
 
Mobile Operating System
Mobile Operating SystemMobile Operating System
Mobile Operating System
 

Más de Samsung Business USA

Más de Samsung Business USA (20)

13 tricks to get the most out of the S Pen
13 tricks to get the most out of the S Pen13 tricks to get the most out of the S Pen
13 tricks to get the most out of the S Pen
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the go10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the go
 
10 reasons to upgrade to Samsung’s Galaxy S23
10 reasons to upgrade to Samsung’s Galaxy S2310 reasons to upgrade to Samsung’s Galaxy S23
10 reasons to upgrade to Samsung’s Galaxy S23
 
13 things you didn’t know you could do with the S Pen
13 things you didn’t know you could do with the S Pen13 things you didn’t know you could do with the S Pen
13 things you didn’t know you could do with the S Pen
 
10 ways to fuel productivity
10 ways to fuel productivity10 ways to fuel productivity
10 ways to fuel productivity
 
8 ways ViewFinity monitors set the standard for professionals
8 ways ViewFinity monitors set the standard for professionals8 ways ViewFinity monitors set the standard for professionals
8 ways ViewFinity monitors set the standard for professionals
 
10 field-ready features of Galaxy XCover6 Pro
10 field-ready features of Galaxy XCover6 Pro10 field-ready features of Galaxy XCover6 Pro
10 field-ready features of Galaxy XCover6 Pro
 
5 Ways Smart Hospital Rooms Can Improve The Patient Experience
5 Ways Smart Hospital Rooms Can Improve The Patient Experience5 Ways Smart Hospital Rooms Can Improve The Patient Experience
5 Ways Smart Hospital Rooms Can Improve The Patient Experience
 
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdfINFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
 
10 ways to fuel productivity with Galaxy Book
10 ways to fuel productivity with Galaxy Book10 ways to fuel productivity with Galaxy Book
10 ways to fuel productivity with Galaxy Book
 
The best monitors for teachers: 5 features every educator needs
The best monitors for teachers: 5 features every educator needsThe best monitors for teachers: 5 features every educator needs
The best monitors for teachers: 5 features every educator needs
 
To BYOD or not to BYOD?
To BYOD or not to BYOD?To BYOD or not to BYOD?
To BYOD or not to BYOD?
 
6 smart ways Samsung's 85-inch Interactive Display changes the classroom
6 smart ways Samsung's 85-inch Interactive Display changes the classroom6 smart ways Samsung's 85-inch Interactive Display changes the classroom
6 smart ways Samsung's 85-inch Interactive Display changes the classroom
 
13 things you didn't know you could do with the S Pen
13 things you didn't know you could do with the S Pen13 things you didn't know you could do with the S Pen
13 things you didn't know you could do with the S Pen
 
10 reasons to choose Galaxy Tab S8 for work on the go
10 reasons to choose Galaxy Tab S8 for work on the go10 reasons to choose Galaxy Tab S8 for work on the go
10 reasons to choose Galaxy Tab S8 for work on the go
 
10 reasons to upgrade to Galaxy S22 Ultra
10 reasons to upgrade to Galaxy S22 Ultra10 reasons to upgrade to Galaxy S22 Ultra
10 reasons to upgrade to Galaxy S22 Ultra
 
9 benefits of mobilizing patient care with hospital technology
9 benefits of mobilizing patient care with hospital technology9 benefits of mobilizing patient care with hospital technology
9 benefits of mobilizing patient care with hospital technology
 
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
 
7 ways displays create a connected campus
7 ways displays create a connected campus7 ways displays create a connected campus
7 ways displays create a connected campus
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

The Evolution of Mobile Security

  • 1. The Evolution of Mobile Security Fifteen years of learning from mobile mistakes
  • 2. The first smartphones start to appear Palm added email, basic web access and a phone to a personal organizerwith the Treo 650. There was almost no security. 2004
  • 3. 2006 Nokia’s N95 made camera, music and GPS a priority. Name: Software 2.0 Publisher: ABD Software Inc. From: http//: ABDsoftware2.com CERTIFICATE Symbian and Nokia take viruses seriously Symbian 9 required most apps to be signed to protect against viruses.
  • 4. 2007 Early iPhones used ASLR, code signing, sandboxing and hardware encryption, setting new expectations forphones. Hash Function Code Hashed Code Signed Code SignatureEncrypt Hash Using a Private Key Attached to Code Encrypted Hash & Time Stamp Apple reinvents the phone with open software, closed hardware
  • 5. Read on formore Mobile Security historical facts Protect Your Enterprise With Samsung Knox Security Discoverwhy Samsung phones are the most secure and manageable mobile devices available.
  • 6. 2008 Policies Manage Devices InfoSec and ITManagers Exchange Server With ActiveSync Microsoft Exchange ActiveSync (EAS) builds in MDM Microsoft built basic MDM feature into EAS, bolstering admin security. BlackBerry broadened MDM beyond Exchange in 2009. Mobile Devices
  • 7. 2010 Android v2.2 makes EAS management easy with built-in support Security policy controls like remote wipe became part of mainstream Android, shifting it toward enterprise environments. REMOTE WIPE
  • 8. 2012 Samsung Knox identifies key enterprise security requirements Samsung began investing in securityto make Android enterprise-safe, pushing features like SE Linux into the mainstream.
  • 9. 2013 TrustZone, a secure mode supported by ARM processors, protects information against compromise. Normal Apps Nonsecure World Client TEE API Rich OS Trusted Apps Secure World Secure TEE API Trusted OS Monitor ARM Security Extensions TrustZone protects encryption keys and identity information
  • 10. 2014 2017 READ ONLY RKP SECURE WORLD NORMALWORLD KERNEL Control instructions and page table update functions are replaced by traps to the Secure World Page tables are mapped read-only so they cannot be directly modified by the kernel Galaxy Note4 (2014) Galaxy Note Edge (2014) Galaxy Note5 (2015) Galaxy S7 (2016) Galaxy Note8 (2017) Galaxy S8 (2017) Samsung Knox innovations continue to add security to Android Knox brought critical features to Android, like biometrics, real-time kernel protection and separate work/home profiles.
  • 11. 2018 Samsung Knox continues to blaze the trail in mobile security, as olderfeatures are reimagined by Google forAndroid. Knox 3.0 joins Google’s Android Enterprise with Samsung security
  • 12. ©2019 Samsung Electronics America, Inc. Samsung is a registered mark of Samsung Electronics Corp., Ltd. All brand, product, service names and logos are trademarks and/or registered trademarks of their respective manufacturers and companies. Samsung Knox security empowers enterprises to go mobile-first confidently.