SlideShare una empresa de Scribd logo
1 de 13
IBM Security Systems

Mobile Security: Is your business secure
from the latest threats? A look at the
trends and risks for the first half of 2013

Caleb Barlow’s discussion with Robert Freeman
November 6, 2013

© 2013 IBM Corporation
1

© 2012 IBM Corporation
X-Force is the foundation for advanced security and
threat research across the IBM Security Framework

The mission of X-Force is to:
The mission of X-Force is to:
Monitorand evaluate the
Monitor and evaluate the
rapidly changing threat landscape
rapidly changing threat landscape
Researchnew attack techniques
Research new attack techniques
and develop protection for
and develop protection for
tomorrow’s security challenges
tomorrow’s security challenges
Educateour customers and
Educate our customers and
the general public
the general public

2

IBM Security

© 2013 IBM Corporation
Collaborative IBM teams monitor and analyze
the changing threat landscape

Coverage
20,000+ devices
under contract

3,700+ managed
clients worldwide

15B+ events
managed per day

Depth
20B analyzed
web pages & images

40M spam &
phishing attacks

76K documented
vulnerabilities

133 monitored

Billions of intrusion

countries (MSS)

attempts daily

1,000+ security
related patents

3

IBM Security

Millions of unique
malware samples

© 2013 IBM Corporation
Security
Incidents
in the
first
half of

4

IBM Security

© 2013 IBM Corporation
wherever you go, attackers will follow
Explosive market growth for
Android gets attention of
malware authors
Viable targets with strong intent related
to specific organizations
ROI: Malware authors are investing
more effort into malware that are more
resilient and dangerous

5

IBM Security

© 2013 IBM Corporation
Advances in Android Malware
Chuli

Very targeted attack
-Compromised address book
-Emails sent to targets
-Hooks into Android’s SMS service
-Messages routed to remote C&C server

Obad

Spread primarily through SMS spam
-Spreading through Bluetooth
-Device Administration
-Anti-analysis techniques
-Code obfuscation
6

IBM Security

© 2013 IBM Corporation
X-Force expects the number of Android
Malware applications to continue rising
Degree of sophistication
for this malware will eventually rival those
found in desktop malware

Android Security Enhancements
Older devices more at risk with only 6%
running latest version
Mobile operating system (OS) fragmentation
will remain a problem
7

IBM Security

© 2013 IBM Corporation
has become a new playground
for attackers
Social Media top target for attacks
and mobile devices are expanding
those targets
-Pre-attack intelligence gathering
-Criminals selling accounts
-Campaigns enticing user to click on
malicious links

8

IBM Security

© 2013 IBM Corporation
Security professionals should understand how attackers
are taking advantage of trust in relationships to:

- Breach an
organization
- Target groups
of users
- Create methods
of diversion
9

IBM Security

© 2013 IBM Corporation
Trusteer expands IBM’s capabilities

10

IBM Security

© 2013 IBM Corporation
IBM’s NEW appliance-based solution – ISAM for
Mobile
Mobile Access Management

Mobile Identity Assurance

Mobile Security Compliance

Low TCO, Fast TTV and Highly
Scalable

Solution Highlights
Solution Highlights
• Deliver Mobile SSO and session management
for secure employee and consumer user access to
mobile and web apps
• Enforce context-aware access with mobile
device fingerprinting, geo-location awareness
and IP Reputation
• Improve Identity Assurance using built-in mobile
authentication service and OTP use
• Secure Mobile App deployment with IBM
WorkLight & QRadar security intelligence Integration

IBM Security Access
Manager for Mobile

• Reduce TCO and time to value with an “all-in-one”
access appliance in a virtual & hardware form factors

* Available as virtual or hardware appliance

Implement secure mobile user access with the new ISAM for Mobile
11

IBM Security

© 2013 IBM Corporation
Key takeaways for enterprises embracing
Mobile Technology
Don’t forget the basics
scanning, patching, configurations, passwords

Social Defense needs Socialization
educate users and engender suspicion

Defragment your Mobile posture
constantly apply updates and review BYOD policies

Optimize ahead of Attackers
identify critical assets, analyze behavior, spot anomalies

12

IBM Security

© 2013 IBM Corporation
IBM Security Systems
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

www.ibm.com/security

© Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
13

© 2012 IBM Corporation

Más contenido relacionado

Destacado

Sacropexia MinilaparotóMica Trujillo 2008
Sacropexia MinilaparotóMica Trujillo 2008Sacropexia MinilaparotóMica Trujillo 2008
Sacropexia MinilaparotóMica Trujillo 2008MARTIN CASTILLO MENDOZA
 
Tema I Sector Agropecuario Venezolano actual
Tema I Sector Agropecuario Venezolano actualTema I Sector Agropecuario Venezolano actual
Tema I Sector Agropecuario Venezolano actualernestoaguilar2013
 
Complaints on social media (and how to minimise the damage they cause) - Olga...
Complaints on social media (and how to minimise the damage they cause) - Olga...Complaints on social media (and how to minimise the damage they cause) - Olga...
Complaints on social media (and how to minimise the damage they cause) - Olga...Our Social Times
 
Exposición tienda virtuales
Exposición tienda virtualesExposición tienda virtuales
Exposición tienda virtualesMichele Ramón
 
Legis. y pol. amb. pareja blogger
Legis. y pol. amb. pareja blogger Legis. y pol. amb. pareja blogger
Legis. y pol. amb. pareja blogger albino1401
 
Contenido basico del trabajo
Contenido basico del trabajoContenido basico del trabajo
Contenido basico del trabajolucaton
 
Piaget introducción a la epistemología genética introducción traducida
Piaget introducción a la epistemología genética   introducción traducidaPiaget introducción a la epistemología genética   introducción traducida
Piaget introducción a la epistemología genética introducción traducidaHAV
 
Continuous Deployment Practices, with Production, Test and Development Enviro...
Continuous Deployment Practices, with Production, Test and Development Enviro...Continuous Deployment Practices, with Production, Test and Development Enviro...
Continuous Deployment Practices, with Production, Test and Development Enviro...Amazon Web Services
 
Proyecto mezcladora automatica
Proyecto mezcladora automatica Proyecto mezcladora automatica
Proyecto mezcladora automatica Yan Bajac
 
Promotional Plan: ZAFINO Laptop Bags
Promotional Plan: ZAFINO Laptop BagsPromotional Plan: ZAFINO Laptop Bags
Promotional Plan: ZAFINO Laptop BagsJaddan Bruhn
 
A Great Book - Technical English Vocabulary and Grammar
A Great Book - Technical English Vocabulary and GrammarA Great Book - Technical English Vocabulary and Grammar
A Great Book - Technical English Vocabulary and GrammarHai Dang Nguyen
 

Destacado (15)

Sacropexia MinilaparotóMica Trujillo 2008
Sacropexia MinilaparotóMica Trujillo 2008Sacropexia MinilaparotóMica Trujillo 2008
Sacropexia MinilaparotóMica Trujillo 2008
 
Tema I Sector Agropecuario Venezolano actual
Tema I Sector Agropecuario Venezolano actualTema I Sector Agropecuario Venezolano actual
Tema I Sector Agropecuario Venezolano actual
 
Complaints on social media (and how to minimise the damage they cause) - Olga...
Complaints on social media (and how to minimise the damage they cause) - Olga...Complaints on social media (and how to minimise the damage they cause) - Olga...
Complaints on social media (and how to minimise the damage they cause) - Olga...
 
Exposición tienda virtuales
Exposición tienda virtualesExposición tienda virtuales
Exposición tienda virtuales
 
Legis. y pol. amb. pareja blogger
Legis. y pol. amb. pareja blogger Legis. y pol. amb. pareja blogger
Legis. y pol. amb. pareja blogger
 
Contenido basico del trabajo
Contenido basico del trabajoContenido basico del trabajo
Contenido basico del trabajo
 
Tenis de mesa. libro
Tenis de mesa. libroTenis de mesa. libro
Tenis de mesa. libro
 
Qmaha - mandaic
Qmaha - mandaicQmaha - mandaic
Qmaha - mandaic
 
Piaget introducción a la epistemología genética introducción traducida
Piaget introducción a la epistemología genética   introducción traducidaPiaget introducción a la epistemología genética   introducción traducida
Piaget introducción a la epistemología genética introducción traducida
 
Amazon Case Study
Amazon Case Study Amazon Case Study
Amazon Case Study
 
Continuous Deployment Practices, with Production, Test and Development Enviro...
Continuous Deployment Practices, with Production, Test and Development Enviro...Continuous Deployment Practices, with Production, Test and Development Enviro...
Continuous Deployment Practices, with Production, Test and Development Enviro...
 
Proyecto mezcladora automatica
Proyecto mezcladora automatica Proyecto mezcladora automatica
Proyecto mezcladora automatica
 
Proyecto animales 1
Proyecto animales 1Proyecto animales 1
Proyecto animales 1
 
Promotional Plan: ZAFINO Laptop Bags
Promotional Plan: ZAFINO Laptop BagsPromotional Plan: ZAFINO Laptop Bags
Promotional Plan: ZAFINO Laptop Bags
 
A Great Book - Technical English Vocabulary and Grammar
A Great Book - Technical English Vocabulary and GrammarA Great Book - Technical English Vocabulary and Grammar
A Great Book - Technical English Vocabulary and Grammar
 

Más de IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 

Más de IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Is your business secure from the latest mobile threats? A look at the trends and risks for the first half of 2013

  • 1. IBM Security Systems Mobile Security: Is your business secure from the latest threats? A look at the trends and risks for the first half of 2013 Caleb Barlow’s discussion with Robert Freeman November 6, 2013 © 2013 IBM Corporation 1 © 2012 IBM Corporation
  • 2. X-Force is the foundation for advanced security and threat research across the IBM Security Framework The mission of X-Force is to: The mission of X-Force is to: Monitorand evaluate the Monitor and evaluate the rapidly changing threat landscape rapidly changing threat landscape Researchnew attack techniques Research new attack techniques and develop protection for and develop protection for tomorrow’s security challenges tomorrow’s security challenges Educateour customers and Educate our customers and the general public the general public 2 IBM Security © 2013 IBM Corporation
  • 3. Collaborative IBM teams monitor and analyze the changing threat landscape Coverage 20,000+ devices under contract 3,700+ managed clients worldwide 15B+ events managed per day Depth 20B analyzed web pages & images 40M spam & phishing attacks 76K documented vulnerabilities 133 monitored Billions of intrusion countries (MSS) attempts daily 1,000+ security related patents 3 IBM Security Millions of unique malware samples © 2013 IBM Corporation
  • 4. Security Incidents in the first half of 4 IBM Security © 2013 IBM Corporation
  • 5. wherever you go, attackers will follow Explosive market growth for Android gets attention of malware authors Viable targets with strong intent related to specific organizations ROI: Malware authors are investing more effort into malware that are more resilient and dangerous 5 IBM Security © 2013 IBM Corporation
  • 6. Advances in Android Malware Chuli Very targeted attack -Compromised address book -Emails sent to targets -Hooks into Android’s SMS service -Messages routed to remote C&C server Obad Spread primarily through SMS spam -Spreading through Bluetooth -Device Administration -Anti-analysis techniques -Code obfuscation 6 IBM Security © 2013 IBM Corporation
  • 7. X-Force expects the number of Android Malware applications to continue rising Degree of sophistication for this malware will eventually rival those found in desktop malware Android Security Enhancements Older devices more at risk with only 6% running latest version Mobile operating system (OS) fragmentation will remain a problem 7 IBM Security © 2013 IBM Corporation
  • 8. has become a new playground for attackers Social Media top target for attacks and mobile devices are expanding those targets -Pre-attack intelligence gathering -Criminals selling accounts -Campaigns enticing user to click on malicious links 8 IBM Security © 2013 IBM Corporation
  • 9. Security professionals should understand how attackers are taking advantage of trust in relationships to: - Breach an organization - Target groups of users - Create methods of diversion 9 IBM Security © 2013 IBM Corporation
  • 10. Trusteer expands IBM’s capabilities 10 IBM Security © 2013 IBM Corporation
  • 11. IBM’s NEW appliance-based solution – ISAM for Mobile Mobile Access Management Mobile Identity Assurance Mobile Security Compliance Low TCO, Fast TTV and Highly Scalable Solution Highlights Solution Highlights • Deliver Mobile SSO and session management for secure employee and consumer user access to mobile and web apps • Enforce context-aware access with mobile device fingerprinting, geo-location awareness and IP Reputation • Improve Identity Assurance using built-in mobile authentication service and OTP use • Secure Mobile App deployment with IBM WorkLight & QRadar security intelligence Integration IBM Security Access Manager for Mobile • Reduce TCO and time to value with an “all-in-one” access appliance in a virtual & hardware form factors * Available as virtual or hardware appliance Implement secure mobile user access with the new ISAM for Mobile 11 IBM Security © 2013 IBM Corporation
  • 12. Key takeaways for enterprises embracing Mobile Technology Don’t forget the basics scanning, patching, configurations, passwords Social Defense needs Socialization educate users and engender suspicion Defragment your Mobile posture constantly apply updates and review BYOD policies Optimize ahead of Attackers identify critical assets, analyze behavior, spot anomalies 12 IBM Security © 2013 IBM Corporation
  • 13. IBM Security Systems Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. www.ibm.com/security © Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. 13 © 2012 IBM Corporation