How to Predict, Detect and Protect Against Mobile Cyber Attacks
Transcript of How to Predict, Detect and Protect Against Mobile Cyber Attacks
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 1Brian Katz, Director of Mobile Strategy, VMware
Varun Kohli, Vice President, SkycureOctober, 2015
Predict, Detect and Protect Against Mobile
Cyber Attacks
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 2
Meet Your Speakers
Brian KatzDirector of Mobile Strategy
VMware
Varun KohliVice President
Skycure
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 3
Quick Housekeeping
• Q&A panel is available if you have any questions
• There will be time for Q&A at the end
• We are recording this webinar for future viewing
• All attendees will receive a copy of slides/recording
Join the discussion using #MobileThreatDefense hashtag on
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 4
Agenda
1. Introductions
2. Mobile Threat Landscape
3. The role of EMM
4. Risk-based security
5. How to predict, detect and prevent attacks
6. Demo
7. Q & A
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Your Mobile Environment is Becoming Complex
5
Smartphones
Dif
fere
nt
Dev
ices
& P
latf
orm
s
EmailManagement
DeviceManagement
Acc
ess
and
Co
ntr
ol
Network& Security
Cloud
On Premise
SQL
DNS
DHCP
Servers
Corporate Resources
Email Infrastructure
Directory Services
Co
rpo
rate
-ow
ned
Tablets
ApplicationManagement
Apps
Certificates& PKI
SDK
Malware Anti-Virus
Wi-Fi Networks
BYO
D Wi-Fi
Rugged Devices
ContentManagement
RuggedManagement
Content
Content Repositories
Content Filtering
Shar
ed
Desktops & Laptops
Peripherals
SIEM
Shar
ed
Browsing
VPNVPN
Connection
LaptopManagement
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 6
Old Endpoint Vs. New Endpoint
?
IP
S
IDS
Firewall
USB SecurityDLP
Data Encryption
Wireless Security
Application Control AV
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 7
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 8
Mobile Threat Vectors
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 9
Physical Security
Loss
Theft
UnauthorizedAccess
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 10
Network Security
Wi-Fi/ Cellular
Off-the-shelf
hacking gear
24x7Exposure
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 11
Network Security
• 25% of the mobile devices will get exposed to a network attack in the first
month of security monitoring, growing to 40% over the next three months.
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 12
Malware
ExternalAndroid Stores
RepackagedApps
New infection vectors
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 13
Malware
• Not just an Android problem
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 14
Vulnerabilities
OS & App
Level
Patching Challenges
Never Ending Story
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 15
Vulnerabilities
0
20
40
60
80
100
120
140
160
180
2007 2008 2009 2010 2011 2012 2013 2014 2015
Number of CVEs Trajectory
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 16
What mobile security buyers are
doing
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
We don't do anything for data protection on smartphones andtablets
We enforce a baseline of device security policies like passwordentry, remote lock, and remote wipe, but we don't do anything…
Application container or wrapping technologies
Device virtualization or dual persona technologies
Virtual desktop infrastructure for user access to corporate datafrom smartphones and tablets
General mobile application management infrastructure
Mobile device management system to enforce device securitypolicies
Enterprise (1000+Employees)SMB (20-999) Employees
AirWatch Simplifies Enterprise Mobility Management
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
What Does Security Mean to AirWatch?
Protecting sensitive information
Compliance monitoring
Multi-factor authentication Secure access to corporate resources
Device restrictions
Remote commands
Device and app-level policies
App whitelists/blacklists
Compromised device detection
Built-in security features
FIPS-140 compliance
Data loss prevention
256-bit SSL encryption
Certificate-based access
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
True Mobile SecurityMobile security is securing your enterprise at all end points
19
Networks need to know what user,
on what device, on what app before
granting accessAirWatch offers a
comprehensive, end-to-end security through
our architecture, solutions and
admin console
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Enterprise Mobility Management Platform
Every Endpoint
Mobile Devices
Laptops
RuggedDevices
Printers & Peripherals
Every Use Case
Corporate BYOD
Line of Business
Shared
Every OS
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Single Pane of Glass
Manage any device, anywhere in the world, from
a single console
21
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Intuitive Console Interface
22
Software that is powerful, yet easy to use
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Mobile Device Management• Single management console
• Interactive dashboards for real-time device and user information
• Support for all major platforms and device types
• Remote commands and over-the-air management
• Simple enrollment for users or IT
• Global and granular management
• Management based on ownership, group and role
• Role-based access for administrators
• Advanced logging and reporting capabilities
A simplified, efficient way to view and manage all devices from the
central admin console
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Mobile Application Management
24
• Full application lifecycle management
• Intuitive, easy-to-navigate app catalog
• Flexible options for app containerization
• Advanced connectivity, authentication, security and analytics features
• Comprehensive app ecosystem
Acquire, distribute, secure and track mobile applications
with AirWatch® Mobile Application Management
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Self-Service Portal to Empower End UsersReduce IT burden by allowing users basic administration over devices
Simplify enrollment, configuration and support
Enable users to drag-and-drop files into personal folders in AirWatch Secure Content Locker
Share files with others and set different access and editing privileges
25
Self-Service User Capabilities
Enroll additional devicesPerform remote commands
• Device query• Send message• Clear passcode• Wipe device
Download optional profilesView device information
• Compliance audit• Installed profiles and apps• GPS location
Request applications and technical supportAdd personal content to SCLEnable secure collaboration on content
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Automated Compliance Engine
26
Build PoliciesApplication listCompromised statusEncryptionModel, OS versionPasscodeRoaming
Define EscalationTime based:• Minutes• Hours• DaysTiered actionsRepeat actions
Specify ActionsNotify admin when non-compliantSend SMS, email, push notificationRequest device check-inRemove or block specific profilesInstall compliance profileRemove all profilesRemove or block appsEnterprise wipe
1 2 3
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 27
How To
PredictSee high-risk situations
in advance using
crowd wisdom
DetectFind mobile threats
before they reach
your network
PreventStop threats
automatically using
existing policies
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 28
You need “Waze”Predict
• Protect against known, unknown and
ZERO-day attacks
Malware: How do you predict next-gen malware attacks?
Exploit: How do you know if the exploit was not tailor-made for your organization?
Network: How do you know if the network you connect to is real or fake?
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 29
Predict
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 30
DetectAnalyze
Applications• Policy Violations• Malware
Operating System• Vulnerabilities• Configurations
Device• Lost• Stole
Networks• Suspicious• Malicious
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 31
PreventAutomated Remediation
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 32
Skycure Mobile Threat Defense
• Seamless experience
• 24x7 detection and protection
• Device, app, and network analysis
• Multi platform – Android and iOS
Employee
• Flexible deployment
• Policy creation and enforcement
• Reporting and compliance
• Enterprise integrations
IT Team
Mobile Threat Intelligence
• Millions of tests per month
• 500K+ networks and apps analyzed• Zero-day threat protection
• Predictive Security
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 33
Mobile Threat Intelligence
https://maps.skycure.com
Predict
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 34
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 35
Promotional Offer
50 FREE Licenses
Send an email to :
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 36
Summary
• The problem of mobile security is real and is already
here
• An ideal solution should offer layered security:
- Physical compromise
- Network attacks
- Malware infections
- Vulnerability exploitation
• Enterprises are moving towards risk-based mobility
• Skycure + AirWatch is leading the charter
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 37
Next Steps
Request a FREE 30 Day Trial!
[email protected], Phone: 1-800-650-4821
https://www.skycure.com/trial
https://blog.skycure.com
@SkycureSecurity, @vk_is
https://www.linkedin.com/company/skycure