Submit Search
Upload
Mobile Security: 2016 Wrap-Up and 2017 Predictions
•
3 likes
•
617 views
S
Skycure
Follow
Watch recorded webinar here - http://get.skycure.com/mobile-security-2017-predictions
Read less
Read more
Mobile
Report
Share
Report
Share
1 of 34
Recommended
How Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile Devices
Skycure
Tools for Evaluating Mobile Threat Defense Solutions
Tools for Evaluating Mobile Threat Defense Solutions
Skycure
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
Skycure
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability
Skycure
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
Skycure
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
Skycure
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Skycure
Recommended
How Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile Devices
Skycure
Tools for Evaluating Mobile Threat Defense Solutions
Tools for Evaluating Mobile Threat Defense Solutions
Skycure
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
Skycure
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability
Skycure
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
Skycure
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
Skycure
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Skycure
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
Kaspersky
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Skycure
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
Kaspersky
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
Andrew Wong
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
Skycure
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
Kaspersky
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada
The World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the Rescue
Cisco Canada
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
Kirill Kertsenbaum
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
Data Unit
Cisco amp for endpoints
Cisco amp for endpoints
Cisco Canada
Cisco umbrella overview
Cisco umbrella overview
Cisco Canada
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1
Sylvain Martinez
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Skybox Security
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
Cristian Garcia G.
Cyber intro 2017_hebrew
Cyber intro 2017_hebrew
Moti Sagey מוטי שגיא
Next Generation Security
Next Generation Security
Cisco Canada
Partner Welcome Kit
Partner Welcome Kit
Luca Simonelli
Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
Sylvain Martinez
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
Skycure
Mobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn't
Skycure
More Related Content
What's hot
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
Kaspersky
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Skycure
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
Kaspersky
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
Andrew Wong
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
Skycure
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
Kaspersky
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada
The World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the Rescue
Cisco Canada
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
Kirill Kertsenbaum
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
Data Unit
Cisco amp for endpoints
Cisco amp for endpoints
Cisco Canada
Cisco umbrella overview
Cisco umbrella overview
Cisco Canada
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1
Sylvain Martinez
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Skybox Security
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
Cristian Garcia G.
Cyber intro 2017_hebrew
Cyber intro 2017_hebrew
Moti Sagey מוטי שגיא
Next Generation Security
Next Generation Security
Cisco Canada
Partner Welcome Kit
Partner Welcome Kit
Luca Simonelli
Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
Sylvain Martinez
What's hot
(20)
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
The World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the Rescue
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
Cisco amp for endpoints
Cisco amp for endpoints
Cisco umbrella overview
Cisco umbrella overview
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
Cyber intro 2017_hebrew
Cyber intro 2017_hebrew
Next Generation Security
Next Generation Security
Partner Welcome Kit
Partner Welcome Kit
Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
Viewers also liked
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
Skycure
Mobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn't
Skycure
Zimperium - Technology Briefing
Zimperium - Technology Briefing
Jake Leonard
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
Zimperium
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
Jimmy Shah
Gifted futures
Gifted futures
Carmen Tschofen
Food safety in one page talal khalid hasan
Food safety in one page talal khalid hasan
Amqc Almumtaz
Does the Bible mean what it says?
Does the Bible mean what it says?
Wycliffe Bible Translators
Disruptor 2015-12-22 @ java.il
Disruptor 2015-12-22 @ java.il
Amir Langer
Saúl “canelo”álvarez
Saúl “canelo”álvarez
2vherrera
САМ - силовой активный материал
САМ - силовой активный материал
kulibin
So much UX data! Now what?
So much UX data! Now what?
Jennifer Romano Bergstrom
Viewers also liked
(12)
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
Mobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn't
Zimperium - Technology Briefing
Zimperium - Technology Briefing
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
Gifted futures
Gifted futures
Food safety in one page talal khalid hasan
Food safety in one page talal khalid hasan
Does the Bible mean what it says?
Does the Bible mean what it says?
Disruptor 2015-12-22 @ java.il
Disruptor 2015-12-22 @ java.il
Saúl “canelo”álvarez
Saúl “canelo”álvarez
САМ - силовой активный материал
САМ - силовой активный материал
So much UX data! Now what?
So much UX data! Now what?
Similar to Mobile Security: 2016 Wrap-Up and 2017 Predictions
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
CSA Argentina
Pat Gelsinger - Welcome
Pat Gelsinger - Welcome
scoopnewsgroup
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
Capgemini
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
Skycure
Trend Micro Solutions Overview
Trend Micro Solutions Overview
John D. Haden
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
Ramy Houssaini
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
e-Xpert Solutions SA
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
Amazon Web Services
Risk Analytics: One Intelligent View
Risk Analytics: One Intelligent View
Skybox Security
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
MarketingArrowECS_CZ
Online security (Daniel Beazer)
Online security (Daniel Beazer)
Screen Pages
Akamai Intelligent Edge Security
Akamai Intelligent Edge Security
Akamai Technologies
Redefining Security in the Cloud
Redefining Security in the Cloud
Mike Spaulding
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
Spanning Cloud Apps
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
CrowdStrike
Encryption Algorithms for Cloud
Encryption Algorithms for Cloud
Mphasis
"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity
Dean Iacovelli
Similar to Mobile Security: 2016 Wrap-Up and 2017 Predictions
(20)
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
Pat Gelsinger - Welcome
Pat Gelsinger - Welcome
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
Trend Micro Solutions Overview
Trend Micro Solutions Overview
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
Risk Analytics: One Intelligent View
Risk Analytics: One Intelligent View
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
Online security (Daniel Beazer)
Online security (Daniel Beazer)
Akamai Intelligent Edge Security
Akamai Intelligent Edge Security
Redefining Security in the Cloud
Redefining Security in the Cloud
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
Encryption Algorithms for Cloud
Encryption Algorithms for Cloud
"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity
Mobile Security: 2016 Wrap-Up and 2017 Predictions
1.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 1Daniel Kandel, VP R&D 2016 Review and Predictions for 2017 January 2017
2.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 2 Quick Housekeeping • There will be time for Q&A at the end • Ask questions using the GTW chat pane • The webinar is being recorded • All attendees will receive a copy of the slides/recording Join the discussion #MobileThreatDefense
3.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 3 Meet Your Speaker Daniel Kandel VP of R&D Skycure
4.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 4© 2015 Skycure Inc. Review of 2016
5.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 5 Review of 2016: TRENDS Increasing focus on iOS Increasingly targeted attack types Greater access to powerful hacking tools No longer considered the “safe” OS Corporate espionage and nation state spying Spy without much technical expertise
6.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 6 Review of 2016: INCIDENTS & EVENTS Accessibility Clickjacking 2016 2017 Accessibility Clickjacking Combine two benign Android features to gain access to all content presented on the device
7.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 7 Review of 2016: INCIDENTS & EVENTS 2016 2017 AceDeceiver FairPlay Man-In-The-Middle technique is used to spread iOS malware Accessibility Clickjacking AceDeceiver
8.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 8 Review of 2016: INCIDENTS & EVENTS 2016 2017 HummingBad Malware that roots the device to generate revenue by forcing ad clicks and app downloads Accessibility Clickjacking AceDeceiver HummingBad
9.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 9 Review of 2016: INCIDENTS & EVENTS Pokémon Go Repackaged versions created and distributed in less than 48 hours HummingBad Pokémon GoAccessibility Clickjacking AceDeceiver 2016 2017
10.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 10 Review of 2016: INCIDENTS & EVENTS Pangu Jailbreak Jailbreak manipulation that caused Apple to issue a late update to iOS 9 Pokémon Go Pangu Jailbreak HummingBad Accessibility Clickjacking AceDeceiver 2016 2017
11.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 11 Review of 2016: INCIDENTS & EVENTS Pegasus First major public exposure of sophisticated state-sponsored cyber espionage, leveraging 3 separate iOS vulnerabilities Pangu Jailbreak Pegasus Pokémon Go HummingBad Accessibility Clickjacking AceDeceiver 2016 2017
12.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 12 Review of 2016: INCIDENTS & EVENTS California data security law New regulations on ANY business licensing or maintaining personal data about CA residents Pegasus DIGITAL PRIVACY RIGHTS HIPAA fights ransomware New HIPAA guidance aimed at better protection of personal health information (PHI) Pangu Jailbreak Pokémon Go HummingBad Accessibility Clickjacking AceDeceiver California data security law HIPPA Adds Ransomware 2016 2017
13.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 13 Review of 2016: INCIDENTS & EVENTS Apple intentionally leaves iOS kernel unencrypted Did Apple just choose system performance over system security? Or is security actually improved? California data security law HIPPA Adds Ransomware iOS 10Pegasus Pangu Jailbreak Pokémon Go HummingBad Accessibility Clickjacking AceDeceiver 2016 2017
14.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 14 Review of 2016: INCIDENTS & EVENTS Off-the-shelf Spyware It is easier than ever for non-hackers to deploy and operate spyware California data security law HIPPA Adds Ransomware iOS 10Pegasus Pangu Jailbreak Pokémon Go HummingBad Accessibility Clickjacking AceDeceiver Exaspy 2016 2017
15.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 15 Review of 2016: MOBILE THREAT INTELLIGENCE REPORTS 2016 2017 Accessibility Clickjacking AceDeceiver HummingBad Pokémon Go Pangu Jailbreak Pegasus California data security law HIPPA Adds Ransomware iOS 10 Exaspy
16.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 16 Review of 2016: INDUSTRY FOCUS ON MOBILE THREAT DEFENSE 3 FROM GARTNER ALONE Accessibility Clickjacking AceDeceiver HummingBad Pokémon Go Pangu Jailbreak Pegasus California data security law HIPPA Adds Ransomware iOS 10 Exaspy 2016 2017
17.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 17© 2015 Skycure Inc. What to expect in 2017 THE BAD NEWS
18.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 18 Mobile attacks will grow in sophistication and impact PROBLEM • Zero-day threats will predominate • Threat signatures will not help to protect • Attack timeline: - Jailbreak - Hide the jailbreak - Alter app behavior - Monitoring - Collection - Exfiltration
19.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 19 Mobile attacks will grow in sophistication and impact SOLUTION MTD solutions must be able to identify zero-day and other unknown threats, across all vectors
20.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 20 Mobile corporate espionage will become more common PROBLEM • Much easier to compromise mobile – Better ROI for the hackers - Always ON, always connected - More access – Location, camera, voice, data - Difficult to manage security on BYOD devices
21.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 21 Mobile corporate espionage will become more common SOLUTION Comprehensive detection and real-time protection from multi-vector zero-day threats
22.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 22 Hackers will target the security solutions for attack PROBLEM What if they target your EMM? Your MTD? Naïve scenario Device EMM MitM Detected Message From EMM Corrective Command Message to EMM MitM Detected
23.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 23 Hackers will target the security solutions for attack PROBLEM What if they target your EMM? Your MTD? What really happens Device EMM MitM Detected MitM Message to EMM MitM Detected Hacker blocks traffic Message From EMM Corrective Command Hacker blocks traffic Hampered Productivity & False Sense of Security
24.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 24 Hackers will target the security solutions for attack SOLUTION Be sure MTD solution is self-sufficient in protecting critical enterprise resources Secured Connection Protection If possible, opens VPN (seamless experience even under attack) If VPN not possible, continues to protect critical resources (safe apps still reachable) MitM ? Public and Corporate Resources Skycure or Third-party VPN ENABLED Safe AppsSELECTIVE RESOURCES PROTECTION 100% on device No network access dependency No Corporate Data Exposed
25.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 25 Exploitation of operating system security flaws will grow PROBLEM • All operating systems have flaws • Concerted efforts to find OS flaws • Exploit, not disclose and fix
26.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 26 Exploitation of operating system security flaws will grow SOLUTION Deep monitoring of system configuration and resources will be essential
27.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 27© 2015 Skycure Inc. What to expect in 2017 THE GOOD NEWS
28.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 28 More organizations will adopt a diversified mobile security strategy TREND • Increasing awareness that traditional solutions and EMM alone are not enough • More public disclosures of mobile breaches • Current solutions can’t protect their whole mobile fleet - managed & non-managed
29.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 29 More organizations will adopt a diversified mobile security strategy ADVANTAGE • Common, holistic solution that works across managed and unmanaged devices • Integration with existing systems and policies is a must
30.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 30 Classic operating systems will adopt mobile OS architecture TREND • Changing user behavior – multiple devices, apps, cloud services and storage • More user & app oriented use vs. file system oriented • Mobile and wirelessly connected
31.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 31 Classic operating systems will adopt mobile OS architecture ADVANTAGE • Comprehensive security becomes simpler as common solutions may be applied across organizations
32.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 32 In Summary • It is getting more dangerous to do business on mobile devices • The environment is improving for awareness of the problems and availability of effective solutions • Skycure offers the best mobile threat defense solution to protect you in 2017
33.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 33 Skycure Visibility & Protection ON DEVICE Continued protection with or without Internet Selective Resource Protection Stops communication to sensitive resources when under a targeted network attack Malware Defense Blocks malicious apps before installation Message Defense Detects malicious MMS/SMS (e.g. Stagefright) App2App Communication Notifies EMM app about changing risk ON SERVER Visibility Educates admins and users giving “technical proof” behind identified incidents Network Defense Only when under a network attack by rerouting through Enterprise Integrations Leverages existing security/compliance policies and systems such as EMM, Exchange, SIEM Notifications Policy based alerts to admins and end-users to ensure proactive security Skycure VPN 3rd Party VPN
34.
Title of Presentation
DD/MM/YYYY© 2017 Skycure Inc. 34 Next Steps Request a FREE 30 Day Trial! https://www.skycure.com/trial sales@skycure.com, Phone: 1-800-650-4821 https://blog.skycure.com @SkycureSecurity, @daniel_kandel https://www.linkedin.com/company/skycure Q&A ?
Editor's Notes
Elizabeth, I am working on flushing this slide further. Will send you another version as soon as it ready.