1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE.

5
1 Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE

Transcript of 1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE.

Page 1: 1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE.

1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

MOBILE THREAT EXAMPLE

Page 2: 1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE.

2Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

Mobile Web Browser Desktop Web BrowserNative Mobile

www.facebook.com

Mobile App Gap

TYPES OF APPLICATIONS

Application behavior & available operations vary across application types

m.facebook.com

Page 3: 1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE.

3Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

www.facebook.com

COMMON THREATS ACROSS APPLICATIONS

Similar malware can be delivered to all application types Focusing on just one type of application leaves enterprise

vulnerable

m.facebook.com

Mobile Web Browser Desktop Web BrowserNative

Page 4: 1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE.

4Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

Mobile Web Browser Desktop Web Browser

Native

www.facebook.com

REQUIREMENT FOR GRANULAR APP CONTROL

Security policy across all types of applications

Granular app control must distinguish between different types of application

Page 5: 1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE.

5Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

Blue CoatSecurity Empowers Business™