DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc ....
Transcript of DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc ....
![Page 1: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/1.jpg)
Session ID:
Session Classification:
Benjamin Mah V-Key Inc
SPO-T03A
General Interest
DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY
![Page 2: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/2.jpg)
![Page 3: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/3.jpg)
Mobile OS Vulnerabilities
![Page 4: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/4.jpg)
► Business to Enterprise – B2E ► Business to Consumer – B2C ► Business to Business – B2B
Addressing Total Enterprise Mobile Security
![Page 5: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/5.jpg)
Key Findings
75% (Device Approach)
Mobile Focused Security Software Agent
Key Findings
Complex and Intrusive Agent Based – 3rd Party Installation
![Page 6: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/6.jpg)
Key Findings (Cont’d)
Mobile Focused Security Software Agent
Key Findings
Unable to Support Business Consumer Application
Agent Based Software Approach Can’t Scale
75% (Device Approach)
![Page 7: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/7.jpg)
Key Findings (Cont’d)
Mobile Focused Security Software Agent
Key Findings
Complex Source Code Changes World of SDKs to integrate back to Legacy
Enterprise Systems
75% (Device Approach)
![Page 8: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/8.jpg)
Key Findings (Cont’d)
Mobile Focused Security Software Agent
Key Findings
False Sense of Security APT(s) are still winning the war
Users are uninstalling mobile security software
75% (Device Approach)
![Page 9: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/9.jpg)
Key Findings (Cont’d)
Mobile Focused Security Software Agent
Key Findings
Non Compliance Reporting Lack of Mobile Threat Visibility and
Compliance Tracking
75% (Device Approach)
![Page 10: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/10.jpg)
Re-Think Enterprise Mobile Security
Mobile Focused Security Software Agent
75% (Device Approach) Mobile App and Data
Focus (Agentless)
100%
Next Gen Mobile App Security
![Page 11: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/11.jpg)
Unify and Simplify Mobile Security
Real Mobile Security Detection and Defense In-Depth
mApp Focus Security Built-In Smart and Focus
Agentless and Simple Business as Usual
![Page 12: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/12.jpg)
Secure Mobile Enterprise
Mobile App and Data Firewall Wrapper
Device Integrity Ensure security of host operating system
![Page 13: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/13.jpg)
Secure Mobile Enterprise
Mobile App and Data Firewall Wrapper
Application Integrity Ensure security of mobile application
![Page 14: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/14.jpg)
Core Mobile Data Protection and Policy Center
Dashboard Overview View all mobile threats at a glance
Mobile Threat Overview Drill down into the threats / events
on each device
Fully Configurable Policies Decide how each application
responds to threats
![Page 15: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/15.jpg)
Enterprise Security Bus Pillars
Enterprise
Extranet
Consumers
Mobile Data Authentication Mobile App Protection Mobile Policy Mobile Messaging
Scaling to Global Mobile Devices
V-OS Secure Storage
Advanced Detection and Protection of Mobile App
V-Guard Mobile App IPS
Securing M-Commerce
V-TAP Adaptive Token
Cross Platform Secure Messaging
V!VA Secure
Collaboration
Threat Analysis and Compliance Reporting
V-Track Mobile Policy Intelligence
![Page 16: DEVELOPING AN ENTERPRISE MOBILE SECURITY … ID: Session Classification: Benjamin Mah . V-Key Inc . SPO-T03A . General Interest . DEVELOPING AN ENTERPRISE MOBILE SECURITY STRATEGY](https://reader033.fdocuments.in/reader033/viewer/2022042801/5afc0af37f8b9a32348fd073/html5/thumbnails/16.jpg)
Questions?