SlideShare a Scribd company logo
1 of 31
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 1© 2016 Skycure Inc. 1 August 3, 2016
Three Secrets to Becoming a Mobile Security
Superhero
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 2© 2016 Skycure Inc. 2
Quick Housekeeping
• There will be time for Q&A at the end
• Ask questions using the GTW chat pane
• The webinar is being recorded
• All attendees will receive a copy of the slides/recording
Join the discussion #MobileThreatDefense
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 3© 2016 Skycure Inc. 3
Meet Your Speakers
John Dickson
Director of IT Infrastructure
& Cybersecurity,
Republic National
Distributing Company
Brian Katz
Director of Mobile Strategy,
VMware
Varun Kohli
Vice President,
Skycure
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 4© 2016 Skycure Inc. 4
Agenda
• Mobile Security Superhero
- How to prove to your management that mobile threats are real
- How to choose the right mobile security solution – SANS checklist
- What to report to your CEO and board of directors
• Meet a real mobile security superhero: John Dickson from RNDC
• EMM Leader: Brian Katz from VMware AirWatch
• How Skycure can help
• Q & A
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 5© 2016 Skycure Inc. 5
Is Mobile Security Important?
Source: BYOD and Mobile Security – 2016 Spotlight Report
Q: What are your main security concerns related to BYOD?
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 6© 2016 Skycure Inc. 6
Are Mobile Attacks Real?
Source: BYOD and Mobile Security – 2016 Spotlight Report & Skycure Threat Intelligence Report
Q: Have any of your BYO or corporate-owned devices downloaded malware in the past?
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 7© 2016 Skycure Inc. 7
Are Mobile Attacks Real?
Q: Have any of your BYO or corporate-owned devices connected to a malicious WiFi in the past?
Source: BYOD and Mobile Security – 2016 Spotlight Report
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 8© 2016 Skycure Inc. 8
Are Organizations Getting Impacted?
Q: Have mobile devices been involved in security breaches in your organization in the past?
Source: BYOD and Mobile Security – 2016 Spotlight Report
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 9© 2016 Skycure Inc. 9
Are Organizations Getting Impacted?
What is the real impact?
Source: Department of Health and Human Services
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 10© 2016 Skycure Inc. 10
What Are Leading Analysts Saying?
Physical
Network
Vulnerabilities
Malware
“Concerns related to advanced threats cannot be
countered with traditional mobile security tools [such
as EMM], as well as protection from wireless
vulnerabilities and untrusted public networks, are the
main drivers for adoption of these technologies.”
“Work environment is shifting away from employees
using computers on premise towards causing
smartphones and tablets off a corporate network. This
will drive a growing priority around securing mobile
devices.”
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 11© 2016 Skycure Inc. 11
Selection Criteria
Mobile Threat Defense/Protection/Prevention
Requirement Priority
Deployment
Process
Support app download from public stores High
Overall ease of deployment High
End User
Experience
Low impact on device battery usage High
Low data usage Medium
App maintains end user’s privacy High
Clear display of detected threats and mitigation
options
High
Provide automatic mitigation options for most
threats
High
Management &
Administration
Provide visibility on detected threats and
vulnerabilities
High
Provide an overall risk estimate per device High
Provide forensic capabilities on identified threats Medium
Provide the option to define an organization-level
compliance policy
High
Reporting High
Other
EMM integration High
SIEM integration High
Provide a third-party API Low
Requirement Priority
Threat
Detection
Network Threats
Secure communication downgrading (SSL stripping) attack
detection
High
Secure traffic decryption (SSL decryption) attack detection High
Content manipulation attack detection Medium
Rogue networks detection High
Ability to perform automatic mitigation on detected network
threats
High
Malware
Detection of malicious apps based on different app
properties
High
Detection of repackaged/fake apps High
Detection of malicious apps based on signatures/known
exploits
Medium
Ability to block malicious app installation High
Detection of iOS malware High
Detection of malicious profiles on iOS devices High
Device Vulnerabilities
Ability to identify jailbroken or rooted devices Medium
Ability to identify device OS vulnerabilities High
Ability to prompt end users to upgrade their device OS
version
Medium
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 12© 2016 Skycure Inc. 12
7 Things to Report to Your CEO and Board
1. Details about the high profile public breach from last week/month
2. Reason why the same thing cannot happen to your company
3. What the current mobile risk score is and how you compare to your peers
4. Number of mobile incidents prevented in the last month
5. Which people/devices/department were attacked the most
6. Which dataset was targeted the most
7. The overall ROI of your investment
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 13© 2016 Skycure Inc. 13© 2015 Skycure Inc.
The RNDC Story
WHO WE ARE
14
15
RNDC AT-A-GLANCE
16
RNDC SECURITY TECHNOLOGIES
Mobile Devices
SFA/BYOD
AirWatch MDM*
AntiMalware
AntiHacking
Patch Mgmt
(Skycure)
17
RNDC’S MOBILE THREAT DEFENSE JOURNEY
Mobile is where PC was 20 years ago
Mobile is actually MORE VALUABLE and MORE VULNERABLE than other corporate devices
You don’t just need to manage these devices,
you need to SECURE THEM too
THERE WAS SKEPTICISM EARLIER…
18
MANAGEMENT BUY-IN WAS EASY
1 2
• Leveraged SKYCURE’S iOS
MALICIOUS PROFILE EXPLOIT
• Took over CFO’s iPhone in less
than a minute
• Easiest sell ever
• Skycure gave 250 FREE SEATS as
part of the trial
• 30% DEVICES had known
vulnerabilities
• 10 DEVICES had keystroke
loggers
19
MY SELECTION CRITERIA
USER IT
• USER EXPERIENCE
• PRIVACY
• BATTERY LIFE
• CLOUD was a must
• Integrated like glue with
AIRWATCH
• Protection against
MALICIOUS APPS, NETWORKS
AND DRIVE-BY WEBSITES
WHO ELSE DID
WE LOOK AT?
ZIMPERIUM
AND
LOOKOUT
Zimperium had a complicated UX and
required scripting
Lookout did not do anything for network
awareness and protection
20
WHAT DO I REPORT ON?
• MULTIPLE DEVICES had malicious activity
• SKYCURE HELPED WITH IMMEDIATE REMEDIATION
• GETTING MORE MOBILE RELATED QUESTIONS – There is more awareness
• Helps to drive more applications into the AirWatch App Store rather than fighting the
pushback
• This gives us a touch into the salesforce automation program.
THIS WAS MISSING EARLIER.
• “THANK YOU’S” from all associate levels, especially for securing BYO devices and
personal data in addition to business data
21
OVERALL IMPACT OF SKYCURE
5,000+
Users
8,000
Devices
~10,000
Networks
Scanned
850,000
Apps
Analyzed
4,000,000
Tests
Performed
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 22© 2016 Skycure Inc. 22© 2015 Skycure Inc.
AirWatch Overview
Manage All Endpoints in a Single Solution
23
Any Endpoint Any Use Case
Knowledge
worker
Corporate |
BYO
Task worker
Line of Business
No user
Kiosk | IOT
Modern Management Framework
Out of box
configuration
Policies and
security settings
Over-the-air
management and
updates
Asset
tracking
Full lifecycle
management
Protect Company Apps and Data Through Multi-layered Security
24
Intelligent Access Controls | Automated Compliance
Secure
the Endpoint
Trust
the User
Containerize
the App
Safeguard
the Data
Protect
the Network
25
Skycure + AirWatch allows you to predict, detect and proactively mitigate mobile threats
Skycure and AirWatch Integration
Malware
Vulnerability
Network
Mobile
Threats
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 26© 2016 Skycure Inc. 26© 2015 Skycure Inc.
Skycure Overview
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 27
Skycure – High Level Overview
Leading Product & ResearchCustomers
Venture BackedStrategic Partners
CONSUMER GOODS FINANCIAL SERVICES
MANUFACTURING TRANSPORTATION
FORTUNE 50
PHARMACEUTICAL
COMPANY
250+TV
channelsFORTUNE 100
HEALTHCARE
COMPANY
FORTUNE 500
FINANCIAL SERVICES
COMPANIES
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 28© 2016 Skycure Inc. 28
Skycure Solution Overview
Physical
Network
Vulnerabilities
Malware
• 24x7 detection and
protection
• Network, device and
app analysis
• Multi platform
Seamless
experience
Privacy Minimal
footprint
End-User App
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 29© 2016 Skycure Inc. 29
Physical
Network
Vulnerabilities
Malware
• Policy enforcement
• Risk-based
management
• Enterprise integrations
Security Visibility IT Satisfaction
Management
• 24x7 detection and
protection
• Network, device and
app analysis
• Multi platform
End-User App
Seamless
experience
Privacy Minimal
footprint
Skycure Solution Overview
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 30© 2016 Skycure Inc. 30
Physical
Network
Vulnerabilities
Malware
• Policy enforcement
• Risk-based
management
• Enterprise integrations
Security Visibility IT Satisfaction
Management
• 24x7 detection and
protection
• Network, device and
app analysis
• Multi platform
Seamless
experience
Privacy Minimal
footprint
End-User App
Skycure Solution Overview
Mobile Threat Intelligence Platform
1 Million+ Global Threats Identified
https://maps.skycure.com
Crowd
Wisdom
Millions of
monthly tests -
apps & networks
Skycure
Research
No iOS Zone, Malicious
Profiles, WiFiGate,
LinkedOut
Threat
Aggregator
Dozens of threat feeds
from 3rd parties
Legitimate
Services
Attackers
& Threats
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 31© 2016 Skycure Inc. 31
Is your organization vulnerable?
50 Free Skycure Licenses
• Step 1 – Download Skycure Public App (Recommendation: 5-20 devices)
• Step 2 – Review Skycure Assessment Report in 4 weeks
What do we usually find?
NUMBER OF DEVICES WITH
MALICIOUS APPS INSTALLED
PERCENTAGE OF DEVICES
EXPOSED TO NETWORK THREATS
PERCENTAGE OF MOBILE DEVICES
RUNNING OS WITH HIGH-SEVERITY
VULNERABILITIES
EVERY ORG
with 200+
devices had
iOS malware
81.57%
7.22%
1-800-650-4821
sales@skycure.com

More Related Content

What's hot

The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesKaspersky
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMSkycure
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Kyle Lai
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecuritySkycure
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Skycure
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesInfosec
 
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...DevOps Indonesia
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecuritySymantec
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on VehiclesPriyanka Aash
 
Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response Adrian Guthrie
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020DevOps.com
 

What's hot (20)

The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
 
Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020Cyber Threat Intelligence: Highlights and Trends for 2020
Cyber Threat Intelligence: Highlights and Trends for 2020
 

Viewers also liked

Roche Considers Enterprise Contract Management Software from Icertis
Roche Considers Enterprise Contract Management Software from IcertisRoche Considers Enterprise Contract Management Software from Icertis
Roche Considers Enterprise Contract Management Software from IcertisIcertis
 
Marketing Agility: A Brand Point Management Perspective
Marketing Agility: A Brand Point Management PerspectiveMarketing Agility: A Brand Point Management Perspective
Marketing Agility: A Brand Point Management PerspectiveSchawk, Inc.
 
When Healthcare Data Analysts Fulfill the Data Detective Role
When Healthcare Data Analysts Fulfill the Data Detective RoleWhen Healthcare Data Analysts Fulfill the Data Detective Role
When Healthcare Data Analysts Fulfill the Data Detective RoleHealth Catalyst
 
Healthcare Analytics Adoption Model -- Updated
Healthcare Analytics Adoption Model -- UpdatedHealthcare Analytics Adoption Model -- Updated
Healthcare Analytics Adoption Model -- UpdatedHealth Catalyst
 
How to Sustain Healthcare Quality Improvement in 3 Critical Steps
How to Sustain Healthcare Quality Improvement in 3 Critical StepsHow to Sustain Healthcare Quality Improvement in 3 Critical Steps
How to Sustain Healthcare Quality Improvement in 3 Critical StepsHealth Catalyst
 
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?Clinical Data Repository vs. A Data Warehouse - Which Do You Need?
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?Health Catalyst
 
What is the best Healthcare Data Warehouse Model for Your Organization?
What is the best Healthcare Data Warehouse Model for Your Organization?What is the best Healthcare Data Warehouse Model for Your Organization?
What is the best Healthcare Data Warehouse Model for Your Organization?Health Catalyst
 

Viewers also liked (7)

Roche Considers Enterprise Contract Management Software from Icertis
Roche Considers Enterprise Contract Management Software from IcertisRoche Considers Enterprise Contract Management Software from Icertis
Roche Considers Enterprise Contract Management Software from Icertis
 
Marketing Agility: A Brand Point Management Perspective
Marketing Agility: A Brand Point Management PerspectiveMarketing Agility: A Brand Point Management Perspective
Marketing Agility: A Brand Point Management Perspective
 
When Healthcare Data Analysts Fulfill the Data Detective Role
When Healthcare Data Analysts Fulfill the Data Detective RoleWhen Healthcare Data Analysts Fulfill the Data Detective Role
When Healthcare Data Analysts Fulfill the Data Detective Role
 
Healthcare Analytics Adoption Model -- Updated
Healthcare Analytics Adoption Model -- UpdatedHealthcare Analytics Adoption Model -- Updated
Healthcare Analytics Adoption Model -- Updated
 
How to Sustain Healthcare Quality Improvement in 3 Critical Steps
How to Sustain Healthcare Quality Improvement in 3 Critical StepsHow to Sustain Healthcare Quality Improvement in 3 Critical Steps
How to Sustain Healthcare Quality Improvement in 3 Critical Steps
 
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?Clinical Data Repository vs. A Data Warehouse - Which Do You Need?
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?
 
What is the best Healthcare Data Warehouse Model for Your Organization?
What is the best Healthcare Data Warehouse Model for Your Organization?What is the best Healthcare Data Warehouse Model for Your Organization?
What is the best Healthcare Data Warehouse Model for Your Organization?
 

Similar to Three Secrets to Becoming a Mobile Security Superhero

Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsSkycure
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Clouditalia Telecomunicazioni
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfSetiya Nugroho
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsBlueboxer2014
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinarZscaler
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersFrederik Lawson
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPSData#3 Limited
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copperscoopnewsgroup
 
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRockwell Automation
 

Similar to Three Secrets to Becoming a Mobile Security Superhero (20)

Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I start
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Three Secrets to Becoming a Mobile Security Superhero

  • 1. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 1© 2016 Skycure Inc. 1 August 3, 2016 Three Secrets to Becoming a Mobile Security Superhero
  • 2. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 2© 2016 Skycure Inc. 2 Quick Housekeeping • There will be time for Q&A at the end • Ask questions using the GTW chat pane • The webinar is being recorded • All attendees will receive a copy of the slides/recording Join the discussion #MobileThreatDefense
  • 3. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 3© 2016 Skycure Inc. 3 Meet Your Speakers John Dickson Director of IT Infrastructure & Cybersecurity, Republic National Distributing Company Brian Katz Director of Mobile Strategy, VMware Varun Kohli Vice President, Skycure
  • 4. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 4© 2016 Skycure Inc. 4 Agenda • Mobile Security Superhero - How to prove to your management that mobile threats are real - How to choose the right mobile security solution – SANS checklist - What to report to your CEO and board of directors • Meet a real mobile security superhero: John Dickson from RNDC • EMM Leader: Brian Katz from VMware AirWatch • How Skycure can help • Q & A
  • 5. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 5© 2016 Skycure Inc. 5 Is Mobile Security Important? Source: BYOD and Mobile Security – 2016 Spotlight Report Q: What are your main security concerns related to BYOD?
  • 6. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 6© 2016 Skycure Inc. 6 Are Mobile Attacks Real? Source: BYOD and Mobile Security – 2016 Spotlight Report & Skycure Threat Intelligence Report Q: Have any of your BYO or corporate-owned devices downloaded malware in the past?
  • 7. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 7© 2016 Skycure Inc. 7 Are Mobile Attacks Real? Q: Have any of your BYO or corporate-owned devices connected to a malicious WiFi in the past? Source: BYOD and Mobile Security – 2016 Spotlight Report
  • 8. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 8© 2016 Skycure Inc. 8 Are Organizations Getting Impacted? Q: Have mobile devices been involved in security breaches in your organization in the past? Source: BYOD and Mobile Security – 2016 Spotlight Report
  • 9. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 9© 2016 Skycure Inc. 9 Are Organizations Getting Impacted? What is the real impact? Source: Department of Health and Human Services
  • 10. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 10© 2016 Skycure Inc. 10 What Are Leading Analysts Saying? Physical Network Vulnerabilities Malware “Concerns related to advanced threats cannot be countered with traditional mobile security tools [such as EMM], as well as protection from wireless vulnerabilities and untrusted public networks, are the main drivers for adoption of these technologies.” “Work environment is shifting away from employees using computers on premise towards causing smartphones and tablets off a corporate network. This will drive a growing priority around securing mobile devices.”
  • 11. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 11© 2016 Skycure Inc. 11 Selection Criteria Mobile Threat Defense/Protection/Prevention Requirement Priority Deployment Process Support app download from public stores High Overall ease of deployment High End User Experience Low impact on device battery usage High Low data usage Medium App maintains end user’s privacy High Clear display of detected threats and mitigation options High Provide automatic mitigation options for most threats High Management & Administration Provide visibility on detected threats and vulnerabilities High Provide an overall risk estimate per device High Provide forensic capabilities on identified threats Medium Provide the option to define an organization-level compliance policy High Reporting High Other EMM integration High SIEM integration High Provide a third-party API Low Requirement Priority Threat Detection Network Threats Secure communication downgrading (SSL stripping) attack detection High Secure traffic decryption (SSL decryption) attack detection High Content manipulation attack detection Medium Rogue networks detection High Ability to perform automatic mitigation on detected network threats High Malware Detection of malicious apps based on different app properties High Detection of repackaged/fake apps High Detection of malicious apps based on signatures/known exploits Medium Ability to block malicious app installation High Detection of iOS malware High Detection of malicious profiles on iOS devices High Device Vulnerabilities Ability to identify jailbroken or rooted devices Medium Ability to identify device OS vulnerabilities High Ability to prompt end users to upgrade their device OS version Medium
  • 12. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 12© 2016 Skycure Inc. 12 7 Things to Report to Your CEO and Board 1. Details about the high profile public breach from last week/month 2. Reason why the same thing cannot happen to your company 3. What the current mobile risk score is and how you compare to your peers 4. Number of mobile incidents prevented in the last month 5. Which people/devices/department were attacked the most 6. Which dataset was targeted the most 7. The overall ROI of your investment
  • 13. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 13© 2016 Skycure Inc. 13© 2015 Skycure Inc. The RNDC Story
  • 16. 16 RNDC SECURITY TECHNOLOGIES Mobile Devices SFA/BYOD AirWatch MDM* AntiMalware AntiHacking Patch Mgmt (Skycure)
  • 17. 17 RNDC’S MOBILE THREAT DEFENSE JOURNEY Mobile is where PC was 20 years ago Mobile is actually MORE VALUABLE and MORE VULNERABLE than other corporate devices You don’t just need to manage these devices, you need to SECURE THEM too
  • 18. THERE WAS SKEPTICISM EARLIER… 18 MANAGEMENT BUY-IN WAS EASY 1 2 • Leveraged SKYCURE’S iOS MALICIOUS PROFILE EXPLOIT • Took over CFO’s iPhone in less than a minute • Easiest sell ever • Skycure gave 250 FREE SEATS as part of the trial • 30% DEVICES had known vulnerabilities • 10 DEVICES had keystroke loggers
  • 19. 19 MY SELECTION CRITERIA USER IT • USER EXPERIENCE • PRIVACY • BATTERY LIFE • CLOUD was a must • Integrated like glue with AIRWATCH • Protection against MALICIOUS APPS, NETWORKS AND DRIVE-BY WEBSITES WHO ELSE DID WE LOOK AT? ZIMPERIUM AND LOOKOUT Zimperium had a complicated UX and required scripting Lookout did not do anything for network awareness and protection
  • 20. 20 WHAT DO I REPORT ON?
  • 21. • MULTIPLE DEVICES had malicious activity • SKYCURE HELPED WITH IMMEDIATE REMEDIATION • GETTING MORE MOBILE RELATED QUESTIONS – There is more awareness • Helps to drive more applications into the AirWatch App Store rather than fighting the pushback • This gives us a touch into the salesforce automation program. THIS WAS MISSING EARLIER. • “THANK YOU’S” from all associate levels, especially for securing BYO devices and personal data in addition to business data 21 OVERALL IMPACT OF SKYCURE 5,000+ Users 8,000 Devices ~10,000 Networks Scanned 850,000 Apps Analyzed 4,000,000 Tests Performed
  • 22. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 22© 2016 Skycure Inc. 22© 2015 Skycure Inc. AirWatch Overview
  • 23. Manage All Endpoints in a Single Solution 23 Any Endpoint Any Use Case Knowledge worker Corporate | BYO Task worker Line of Business No user Kiosk | IOT Modern Management Framework Out of box configuration Policies and security settings Over-the-air management and updates Asset tracking Full lifecycle management
  • 24. Protect Company Apps and Data Through Multi-layered Security 24 Intelligent Access Controls | Automated Compliance Secure the Endpoint Trust the User Containerize the App Safeguard the Data Protect the Network
  • 25. 25 Skycure + AirWatch allows you to predict, detect and proactively mitigate mobile threats Skycure and AirWatch Integration Malware Vulnerability Network Mobile Threats
  • 26. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 26© 2016 Skycure Inc. 26© 2015 Skycure Inc. Skycure Overview
  • 27. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 27 Skycure – High Level Overview Leading Product & ResearchCustomers Venture BackedStrategic Partners CONSUMER GOODS FINANCIAL SERVICES MANUFACTURING TRANSPORTATION FORTUNE 50 PHARMACEUTICAL COMPANY 250+TV channelsFORTUNE 100 HEALTHCARE COMPANY FORTUNE 500 FINANCIAL SERVICES COMPANIES
  • 28. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 28© 2016 Skycure Inc. 28 Skycure Solution Overview Physical Network Vulnerabilities Malware • 24x7 detection and protection • Network, device and app analysis • Multi platform Seamless experience Privacy Minimal footprint End-User App
  • 29. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 29© 2016 Skycure Inc. 29 Physical Network Vulnerabilities Malware • Policy enforcement • Risk-based management • Enterprise integrations Security Visibility IT Satisfaction Management • 24x7 detection and protection • Network, device and app analysis • Multi platform End-User App Seamless experience Privacy Minimal footprint Skycure Solution Overview
  • 30. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 30© 2016 Skycure Inc. 30 Physical Network Vulnerabilities Malware • Policy enforcement • Risk-based management • Enterprise integrations Security Visibility IT Satisfaction Management • 24x7 detection and protection • Network, device and app analysis • Multi platform Seamless experience Privacy Minimal footprint End-User App Skycure Solution Overview Mobile Threat Intelligence Platform 1 Million+ Global Threats Identified https://maps.skycure.com Crowd Wisdom Millions of monthly tests - apps & networks Skycure Research No iOS Zone, Malicious Profiles, WiFiGate, LinkedOut Threat Aggregator Dozens of threat feeds from 3rd parties Legitimate Services Attackers & Threats
  • 31. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 31© 2016 Skycure Inc. 31 Is your organization vulnerable? 50 Free Skycure Licenses • Step 1 – Download Skycure Public App (Recommendation: 5-20 devices) • Step 2 – Review Skycure Assessment Report in 4 weeks What do we usually find? NUMBER OF DEVICES WITH MALICIOUS APPS INSTALLED PERCENTAGE OF DEVICES EXPOSED TO NETWORK THREATS PERCENTAGE OF MOBILE DEVICES RUNNING OS WITH HIGH-SEVERITY VULNERABILITIES EVERY ORG with 200+ devices had iOS malware 81.57% 7.22% 1-800-650-4821 sales@skycure.com