SlideShare a Scribd company logo
1 of 34
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
1Daniel Kandel, VP R&D
2016 Review and Predictions for 2017
January 2017
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
2
Quick Housekeeping
• There will be time for Q&A at the end
• Ask questions using the GTW chat pane
• The webinar is being recorded
• All attendees will receive a copy of the slides/recording
Join the discussion #MobileThreatDefense
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
3
Meet Your Speaker
Daniel Kandel
VP of R&D
Skycure
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
4© 2015 Skycure Inc.
Review of 2016
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
5
Review of 2016:
TRENDS
Increasing focus
on iOS
Increasingly
targeted
attack types
Greater access to
powerful
hacking tools
No longer considered
the “safe” OS
Corporate espionage
and nation state spying
Spy without much
technical expertise
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
6
Review of 2016:
INCIDENTS & EVENTS
Accessibility Clickjacking
2016 2017
Accessibility Clickjacking
Combine two benign Android features to gain
access to all content presented on the device
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
7
Review of 2016:
INCIDENTS & EVENTS
2016 2017
AceDeceiver
FairPlay Man-In-The-Middle technique is
used to spread iOS malware
Accessibility Clickjacking
AceDeceiver
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
8
Review of 2016:
INCIDENTS & EVENTS
2016 2017
HummingBad
Malware that roots the device to generate
revenue by forcing ad clicks and app downloads
Accessibility Clickjacking
AceDeceiver
HummingBad
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
9
Review of 2016:
INCIDENTS & EVENTS
Pokémon Go
Repackaged versions created and
distributed in less than 48 hours
HummingBad
Pokémon GoAccessibility Clickjacking
AceDeceiver
2016 2017
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
10
Review of 2016:
INCIDENTS & EVENTS
Pangu Jailbreak
Jailbreak manipulation that caused Apple to
issue a late update to iOS 9
Pokémon Go
Pangu Jailbreak
HummingBad
Accessibility Clickjacking
AceDeceiver
2016 2017
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
11
Review of 2016:
INCIDENTS & EVENTS
Pegasus
First major public exposure of sophisticated
state-sponsored cyber espionage, leveraging
3 separate iOS vulnerabilities
Pangu Jailbreak
Pegasus
Pokémon Go
HummingBad
Accessibility Clickjacking
AceDeceiver
2016 2017
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
12
Review of 2016:
INCIDENTS & EVENTS
California data security law
New regulations on ANY
business licensing or maintaining
personal data about CA residents
Pegasus
DIGITAL
PRIVACY
RIGHTS
HIPAA fights ransomware
New HIPAA guidance aimed at
better protection of personal
health information (PHI)
Pangu Jailbreak
Pokémon Go
HummingBad
Accessibility Clickjacking
AceDeceiver
California data security law
HIPPA Adds Ransomware
2016 2017
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
13
Review of 2016:
INCIDENTS & EVENTS
Apple intentionally leaves iOS
kernel unencrypted
Did Apple just choose system performance over
system security? Or is security actually improved?
California data security law
HIPPA Adds Ransomware
iOS 10Pegasus
Pangu Jailbreak
Pokémon Go
HummingBad
Accessibility Clickjacking
AceDeceiver
2016 2017
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
14
Review of 2016:
INCIDENTS & EVENTS
Off-the-shelf Spyware
It is easier than ever for non-hackers to
deploy and operate spyware
California data security law
HIPPA Adds Ransomware
iOS 10Pegasus
Pangu Jailbreak
Pokémon Go
HummingBad
Accessibility Clickjacking
AceDeceiver
Exaspy
2016 2017
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
15
Review of 2016:
MOBILE THREAT
INTELLIGENCE
REPORTS
2016 2017
Accessibility Clickjacking
AceDeceiver
HummingBad
Pokémon Go
Pangu Jailbreak
Pegasus
California data security law
HIPPA Adds Ransomware
iOS 10
Exaspy
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
16
Review of 2016:
INDUSTRY FOCUS ON
MOBILE THREAT
DEFENSE
3 FROM GARTNER ALONE
Accessibility Clickjacking
AceDeceiver
HummingBad
Pokémon Go
Pangu Jailbreak
Pegasus
California data security law
HIPPA Adds Ransomware
iOS 10
Exaspy
2016 2017
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
17© 2015 Skycure Inc.
What to expect in 2017
THE BAD NEWS
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
18
Mobile attacks will grow in sophistication and impact
PROBLEM
• Zero-day threats will predominate
• Threat signatures will not help to protect
• Attack timeline:
- Jailbreak
- Hide the jailbreak
- Alter app behavior
- Monitoring
- Collection
- Exfiltration
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
19
Mobile attacks will grow in sophistication and impact
SOLUTION
MTD solutions must be able to identify zero-day
and other unknown threats, across all vectors
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
20
Mobile corporate espionage will become more common
PROBLEM
• Much easier to compromise mobile –
Better ROI for the hackers
- Always ON, always connected
- More access – Location, camera, voice, data
- Difficult to manage security on BYOD devices
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
21
Mobile corporate espionage will become more common
SOLUTION
Comprehensive detection and real-time
protection from multi-vector zero-day threats
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
22
Hackers will target the security solutions for attack
PROBLEM
What if they target
your EMM? Your MTD?
Naïve scenario
Device
EMM
MitM Detected
Message From EMM
Corrective Command
Message to EMM
MitM Detected
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
23
Hackers will target the security solutions for attack
PROBLEM
What if they target
your EMM? Your MTD?
What really happens
Device
EMM
MitM Detected
MitM
Message to EMM
MitM Detected
Hacker blocks traffic
Message From EMM
Corrective Command
Hacker blocks traffic
Hampered Productivity & False Sense of Security
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
24
Hackers will target the security solutions for attack
SOLUTION
Be sure MTD solution
is self-sufficient in
protecting critical
enterprise resources
Secured Connection
Protection
If possible, opens
VPN (seamless
experience even
under attack)
If VPN not possible,
continues to protect
critical resources (safe
apps still reachable)
MitM
?
Public and
Corporate Resources
Skycure or
Third-party
VPN ENABLED
Safe AppsSELECTIVE RESOURCES
PROTECTION
100% on device
No network access dependency
No Corporate
Data Exposed
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
25
Exploitation of operating system security flaws will grow
PROBLEM
• All operating systems have flaws
• Concerted efforts to find OS flaws
• Exploit, not disclose and fix
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
26
Exploitation of operating system security flaws will grow
SOLUTION
Deep monitoring of system
configuration and resources will
be essential
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
27© 2015 Skycure Inc.
What to expect in 2017
THE GOOD NEWS
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
28
More organizations will adopt a diversified mobile
security strategy
TREND
• Increasing awareness that traditional
solutions and EMM alone are not enough
• More public disclosures of mobile breaches
• Current solutions can’t protect their whole
mobile fleet - managed & non-managed
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
29
More organizations will adopt a diversified mobile
security strategy
ADVANTAGE
• Common, holistic solution that works across
managed and unmanaged devices
• Integration with existing systems and
policies is a must
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
30
Classic operating systems will adopt
mobile OS architecture
TREND
• Changing user behavior – multiple
devices, apps, cloud services and
storage
• More user & app oriented use vs.
file system oriented
• Mobile and wirelessly connected
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
31
Classic operating systems will adopt
mobile OS architecture
ADVANTAGE
• Comprehensive security becomes
simpler as common solutions may
be applied across organizations
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
32
In Summary
• It is getting more dangerous to do
business on mobile devices
• The environment is improving for
awareness of the problems and
availability of effective solutions
• Skycure offers the best mobile threat
defense solution to protect you in 2017
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
33
Skycure Visibility & Protection
ON DEVICE
Continued protection with or without
Internet
Selective Resource Protection
Stops communication to sensitive resources
when under a targeted network attack
Malware Defense
Blocks malicious apps before installation
Message Defense
Detects malicious MMS/SMS (e.g.
Stagefright)
App2App Communication
Notifies EMM app about changing risk
ON SERVER
Visibility
Educates admins and users giving “technical
proof” behind identified incidents
Network Defense
Only when under a network
attack by rerouting through
Enterprise Integrations
Leverages existing security/compliance policies
and systems such as EMM, Exchange, SIEM
Notifications
Policy based alerts to admins and end-users to
ensure proactive security
Skycure VPN
3rd Party VPN
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc.
34
Next Steps
Request a FREE 30 Day Trial!
https://www.skycure.com/trial
sales@skycure.com, Phone: 1-800-650-4821
https://blog.skycure.com
@SkycureSecurity, @daniel_kandel
https://www.linkedin.com/company/skycure
Q&A
?

More Related Content

What's hot

Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesSkycure
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesKaspersky
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
The World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the RescueThe World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the RescueCisco Canada
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpointsCisco Canada
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Sylvain Martinez
 
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Skybox Security
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCristian Garcia G.
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Sylvain Martinez
 

What's hot (20)

Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
The World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the RescueThe World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the Rescue
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpoints
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1
 
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
Cyber intro 2017_hebrew
Cyber intro 2017_hebrew Cyber intro 2017_hebrew
Cyber intro 2017_hebrew
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
 

Viewers also liked

Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowSkycure
 
Mobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn'tMobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn'tSkycure
 
Zimperium - Technology Briefing
Zimperium - Technology BriefingZimperium - Technology Briefing
Zimperium - Technology BriefingJake Leonard
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumZimperium
 
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APTBYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APTJimmy Shah
 
Food safety in one page talal khalid hasan
Food safety in one page talal khalid hasanFood safety in one page talal khalid hasan
Food safety in one page talal khalid hasanAmqc Almumtaz
 
Disruptor 2015-12-22 @ java.il
Disruptor 2015-12-22 @ java.ilDisruptor 2015-12-22 @ java.il
Disruptor 2015-12-22 @ java.ilAmir Langer
 
Saúl “canelo”álvarez
Saúl “canelo”álvarezSaúl “canelo”álvarez
Saúl “canelo”álvarez2vherrera
 
САМ - силовой активный материал
САМ - силовой активный материалСАМ - силовой активный материал
САМ - силовой активный материалkulibin
 

Viewers also liked (12)

Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
 
Mobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn'tMobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn't
 
Zimperium - Technology Briefing
Zimperium - Technology BriefingZimperium - Technology Briefing
Zimperium - Technology Briefing
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
 
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APTBYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
 
Gifted futures
Gifted futures Gifted futures
Gifted futures
 
Food safety in one page talal khalid hasan
Food safety in one page talal khalid hasanFood safety in one page talal khalid hasan
Food safety in one page talal khalid hasan
 
Does the Bible mean what it says?
Does the Bible mean what it says?Does the Bible mean what it says?
Does the Bible mean what it says?
 
Disruptor 2015-12-22 @ java.il
Disruptor 2015-12-22 @ java.ilDisruptor 2015-12-22 @ java.il
Disruptor 2015-12-22 @ java.il
 
Saúl “canelo”álvarez
Saúl “canelo”álvarezSaúl “canelo”álvarez
Saúl “canelo”álvarez
 
САМ - силовой активный материал
САМ - силовой активный материалСАМ - силовой активный материал
САМ - силовой активный материал
 
So much UX data! Now what?
So much UX data! Now what?So much UX data! Now what?
So much UX data! Now what?
 

Similar to Mobile Security: 2016 Wrap-Up and 2017 Predictions

Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCSA Argentina
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcomescoopnewsgroup
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
 
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...Capgemini
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsSkycure
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions OverviewJohn D. Haden
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpointe-Xpert Solutions SA
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
Risk Analytics: One Intelligent View
Risk Analytics: One Intelligent ViewRisk Analytics: One Intelligent View
Risk Analytics: One Intelligent ViewSkybox Security
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyMarketingArrowECS_CZ
 
Online security (Daniel Beazer)
Online security (Daniel Beazer)Online security (Daniel Beazer)
Online security (Daniel Beazer)Screen Pages
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the CloudMike Spaulding
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterSpanning Cloud Apps
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCrowdStrike
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for CloudMphasis
 
"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the OpportunityDean Iacovelli
 

Similar to Mobile Security: 2016 Wrap-Up and 2017 Predictions (20)

Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcome
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Risk Analytics: One Intelligent View
Risk Analytics: One Intelligent ViewRisk Analytics: One Intelligent View
Risk Analytics: One Intelligent View
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
 
Online security (Daniel Beazer)
Online security (Daniel Beazer)Online security (Daniel Beazer)
Online security (Daniel Beazer)
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the Cloud
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
 
"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity
 

Mobile Security: 2016 Wrap-Up and 2017 Predictions

  • 1. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 1Daniel Kandel, VP R&D 2016 Review and Predictions for 2017 January 2017
  • 2. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 2 Quick Housekeeping • There will be time for Q&A at the end • Ask questions using the GTW chat pane • The webinar is being recorded • All attendees will receive a copy of the slides/recording Join the discussion #MobileThreatDefense
  • 3. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 3 Meet Your Speaker Daniel Kandel VP of R&D Skycure
  • 4. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 4© 2015 Skycure Inc. Review of 2016
  • 5. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 5 Review of 2016: TRENDS Increasing focus on iOS Increasingly targeted attack types Greater access to powerful hacking tools No longer considered the “safe” OS Corporate espionage and nation state spying Spy without much technical expertise
  • 6. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 6 Review of 2016: INCIDENTS & EVENTS Accessibility Clickjacking 2016 2017 Accessibility Clickjacking Combine two benign Android features to gain access to all content presented on the device
  • 7. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 7 Review of 2016: INCIDENTS & EVENTS 2016 2017 AceDeceiver FairPlay Man-In-The-Middle technique is used to spread iOS malware Accessibility Clickjacking AceDeceiver
  • 8. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 8 Review of 2016: INCIDENTS & EVENTS 2016 2017 HummingBad Malware that roots the device to generate revenue by forcing ad clicks and app downloads Accessibility Clickjacking AceDeceiver HummingBad
  • 9. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 9 Review of 2016: INCIDENTS & EVENTS Pokémon Go Repackaged versions created and distributed in less than 48 hours HummingBad Pokémon GoAccessibility Clickjacking AceDeceiver 2016 2017
  • 10. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 10 Review of 2016: INCIDENTS & EVENTS Pangu Jailbreak Jailbreak manipulation that caused Apple to issue a late update to iOS 9 Pokémon Go Pangu Jailbreak HummingBad Accessibility Clickjacking AceDeceiver 2016 2017
  • 11. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 11 Review of 2016: INCIDENTS & EVENTS Pegasus First major public exposure of sophisticated state-sponsored cyber espionage, leveraging 3 separate iOS vulnerabilities Pangu Jailbreak Pegasus Pokémon Go HummingBad Accessibility Clickjacking AceDeceiver 2016 2017
  • 12. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 12 Review of 2016: INCIDENTS & EVENTS California data security law New regulations on ANY business licensing or maintaining personal data about CA residents Pegasus DIGITAL PRIVACY RIGHTS HIPAA fights ransomware New HIPAA guidance aimed at better protection of personal health information (PHI) Pangu Jailbreak Pokémon Go HummingBad Accessibility Clickjacking AceDeceiver California data security law HIPPA Adds Ransomware 2016 2017
  • 13. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 13 Review of 2016: INCIDENTS & EVENTS Apple intentionally leaves iOS kernel unencrypted Did Apple just choose system performance over system security? Or is security actually improved? California data security law HIPPA Adds Ransomware iOS 10Pegasus Pangu Jailbreak Pokémon Go HummingBad Accessibility Clickjacking AceDeceiver 2016 2017
  • 14. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 14 Review of 2016: INCIDENTS & EVENTS Off-the-shelf Spyware It is easier than ever for non-hackers to deploy and operate spyware California data security law HIPPA Adds Ransomware iOS 10Pegasus Pangu Jailbreak Pokémon Go HummingBad Accessibility Clickjacking AceDeceiver Exaspy 2016 2017
  • 15. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 15 Review of 2016: MOBILE THREAT INTELLIGENCE REPORTS 2016 2017 Accessibility Clickjacking AceDeceiver HummingBad Pokémon Go Pangu Jailbreak Pegasus California data security law HIPPA Adds Ransomware iOS 10 Exaspy
  • 16. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 16 Review of 2016: INDUSTRY FOCUS ON MOBILE THREAT DEFENSE 3 FROM GARTNER ALONE Accessibility Clickjacking AceDeceiver HummingBad Pokémon Go Pangu Jailbreak Pegasus California data security law HIPPA Adds Ransomware iOS 10 Exaspy 2016 2017
  • 17. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 17© 2015 Skycure Inc. What to expect in 2017 THE BAD NEWS
  • 18. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 18 Mobile attacks will grow in sophistication and impact PROBLEM • Zero-day threats will predominate • Threat signatures will not help to protect • Attack timeline: - Jailbreak - Hide the jailbreak - Alter app behavior - Monitoring - Collection - Exfiltration
  • 19. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 19 Mobile attacks will grow in sophistication and impact SOLUTION MTD solutions must be able to identify zero-day and other unknown threats, across all vectors
  • 20. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 20 Mobile corporate espionage will become more common PROBLEM • Much easier to compromise mobile – Better ROI for the hackers - Always ON, always connected - More access – Location, camera, voice, data - Difficult to manage security on BYOD devices
  • 21. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 21 Mobile corporate espionage will become more common SOLUTION Comprehensive detection and real-time protection from multi-vector zero-day threats
  • 22. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 22 Hackers will target the security solutions for attack PROBLEM What if they target your EMM? Your MTD? Naïve scenario Device EMM MitM Detected Message From EMM Corrective Command Message to EMM MitM Detected
  • 23. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 23 Hackers will target the security solutions for attack PROBLEM What if they target your EMM? Your MTD? What really happens Device EMM MitM Detected MitM Message to EMM MitM Detected Hacker blocks traffic Message From EMM Corrective Command Hacker blocks traffic Hampered Productivity & False Sense of Security
  • 24. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 24 Hackers will target the security solutions for attack SOLUTION Be sure MTD solution is self-sufficient in protecting critical enterprise resources Secured Connection Protection If possible, opens VPN (seamless experience even under attack) If VPN not possible, continues to protect critical resources (safe apps still reachable) MitM ? Public and Corporate Resources Skycure or Third-party VPN ENABLED Safe AppsSELECTIVE RESOURCES PROTECTION 100% on device No network access dependency No Corporate Data Exposed
  • 25. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 25 Exploitation of operating system security flaws will grow PROBLEM • All operating systems have flaws • Concerted efforts to find OS flaws • Exploit, not disclose and fix
  • 26. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 26 Exploitation of operating system security flaws will grow SOLUTION Deep monitoring of system configuration and resources will be essential
  • 27. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 27© 2015 Skycure Inc. What to expect in 2017 THE GOOD NEWS
  • 28. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 28 More organizations will adopt a diversified mobile security strategy TREND • Increasing awareness that traditional solutions and EMM alone are not enough • More public disclosures of mobile breaches • Current solutions can’t protect their whole mobile fleet - managed & non-managed
  • 29. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 29 More organizations will adopt a diversified mobile security strategy ADVANTAGE • Common, holistic solution that works across managed and unmanaged devices • Integration with existing systems and policies is a must
  • 30. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 30 Classic operating systems will adopt mobile OS architecture TREND • Changing user behavior – multiple devices, apps, cloud services and storage • More user & app oriented use vs. file system oriented • Mobile and wirelessly connected
  • 31. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 31 Classic operating systems will adopt mobile OS architecture ADVANTAGE • Comprehensive security becomes simpler as common solutions may be applied across organizations
  • 32. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 32 In Summary • It is getting more dangerous to do business on mobile devices • The environment is improving for awareness of the problems and availability of effective solutions • Skycure offers the best mobile threat defense solution to protect you in 2017
  • 33. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 33 Skycure Visibility & Protection ON DEVICE Continued protection with or without Internet Selective Resource Protection Stops communication to sensitive resources when under a targeted network attack Malware Defense Blocks malicious apps before installation Message Defense Detects malicious MMS/SMS (e.g. Stagefright) App2App Communication Notifies EMM app about changing risk ON SERVER Visibility Educates admins and users giving “technical proof” behind identified incidents Network Defense Only when under a network attack by rerouting through Enterprise Integrations Leverages existing security/compliance policies and systems such as EMM, Exchange, SIEM Notifications Policy based alerts to admins and end-users to ensure proactive security Skycure VPN 3rd Party VPN
  • 34. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 34 Next Steps Request a FREE 30 Day Trial! https://www.skycure.com/trial sales@skycure.com, Phone: 1-800-650-4821 https://blog.skycure.com @SkycureSecurity, @daniel_kandel https://www.linkedin.com/company/skycure Q&A ?

Editor's Notes

  1. Elizabeth, I am working on flushing this slide further. Will send you another version as soon as it ready.