How to Predict, Detect and Protect Against Mobile Cyber Attacks

37
Title of Presentation DD/MM/YYYY © 2015 Skycure Ltd. 1 Brian Katz, Director of Mobile Strategy, VMware Varun Kohli, Vice President, Skycure October, 2015 Predict, Detect and Protect Against Mobile Cyber Attacks

Transcript of How to Predict, Detect and Protect Against Mobile Cyber Attacks

Page 1: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 1Brian Katz, Director of Mobile Strategy, VMware

Varun Kohli, Vice President, SkycureOctober, 2015

Predict, Detect and Protect Against Mobile

Cyber Attacks

Page 2: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 2

Meet Your Speakers

Brian KatzDirector of Mobile Strategy

VMware

Varun KohliVice President

Skycure

Page 3: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 3

Quick Housekeeping

• Q&A panel is available if you have any questions

• There will be time for Q&A at the end

• We are recording this webinar for future viewing

• All attendees will receive a copy of slides/recording

Join the discussion using #MobileThreatDefense hashtag on

Twitter

Page 4: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 4

Agenda

1. Introductions

2. Mobile Threat Landscape

3. The role of EMM

4. Risk-based security

5. How to predict, detect and prevent attacks

6. Demo

7. Q & A

Page 5: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Your Mobile Environment is Becoming Complex

5

Smartphones

Dif

fere

nt

Dev

ices

& P

latf

orm

s

EmailManagement

DeviceManagement

Acc

ess

and

Co

ntr

ol

Network& Security

Cloud

On Premise

SQL

DNS

DHCP

Servers

Corporate Resources

Email

Email Infrastructure

Directory Services

Co

rpo

rate

-ow

ned

Tablets

ApplicationManagement

Apps

Certificates& PKI

SDK

Malware Anti-Virus

Wi-Fi Networks

BYO

D Wi-Fi

Rugged Devices

ContentManagement

RuggedManagement

Content

Content Repositories

Content Filtering

Shar

ed

Desktops & Laptops

Peripherals

SIEM

Shar

ed

Browsing

VPNVPN

Connection

LaptopManagement

Page 6: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 6

Old Endpoint Vs. New Endpoint

?

IP

S

IDS

Firewall

USB SecurityDLP

Data Encryption

Wireless Security

Application Control AV

Page 7: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 7

Page 8: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 8

Mobile Threat Vectors

Page 9: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 9

Physical Security

Loss

Theft

UnauthorizedAccess

Page 10: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 10

Network Security

Wi-Fi/ Cellular

Off-the-shelf

hacking gear

24x7Exposure

Page 11: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 11

Network Security

• 25% of the mobile devices will get exposed to a network attack in the first

month of security monitoring, growing to 40% over the next three months.

Page 12: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 12

Malware

ExternalAndroid Stores

RepackagedApps

New infection vectors

Page 13: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 13

Malware

• Not just an Android problem

Page 14: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 14

Vulnerabilities

OS & App

Level

Patching Challenges

Never Ending Story

Page 15: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 15

Vulnerabilities

0

20

40

60

80

100

120

140

160

180

2007 2008 2009 2010 2011 2012 2013 2014 2015

Number of CVEs Trajectory

Page 16: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 16

What mobile security buyers are

doing

0% 5% 10% 15% 20% 25% 30% 35% 40% 45%

We don't do anything for data protection on smartphones andtablets

We enforce a baseline of device security policies like passwordentry, remote lock, and remote wipe, but we don't do anything…

Application container or wrapping technologies

Device virtualization or dual persona technologies

Virtual desktop infrastructure for user access to corporate datafrom smartphones and tablets

General mobile application management infrastructure

Mobile device management system to enforce device securitypolicies

Enterprise (1000+Employees)SMB (20-999) Employees

Page 17: How to Predict, Detect and Protect Against Mobile Cyber Attacks

AirWatch Simplifies Enterprise Mobility Management

Page 18: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

What Does Security Mean to AirWatch?

Protecting sensitive information

Compliance monitoring

Multi-factor authentication Secure access to corporate resources

Device restrictions

Remote commands

Device and app-level policies

App whitelists/blacklists

Compromised device detection

Built-in security features

FIPS-140 compliance

Data loss prevention

256-bit SSL encryption

Certificate-based access

Page 19: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

True Mobile SecurityMobile security is securing your enterprise at all end points

19

Networks need to know what user,

on what device, on what app before

granting accessAirWatch offers a

comprehensive, end-to-end security through

our architecture, solutions and

admin console

Page 20: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Enterprise Mobility Management Platform

Every Endpoint

Mobile Devices

Laptops

RuggedDevices

Printers & Peripherals

Every Use Case

Corporate BYOD

Line of Business

Shared

Every OS

Page 21: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Single Pane of Glass

Manage any device, anywhere in the world, from

a single console

21

Page 22: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Intuitive Console Interface

22

Software that is powerful, yet easy to use

Page 23: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Mobile Device Management• Single management console

• Interactive dashboards for real-time device and user information

• Support for all major platforms and device types

• Remote commands and over-the-air management

• Simple enrollment for users or IT

• Global and granular management

• Management based on ownership, group and role

• Role-based access for administrators

• Advanced logging and reporting capabilities

A simplified, efficient way to view and manage all devices from the

central admin console

Page 24: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Mobile Application Management

24

• Full application lifecycle management

• Intuitive, easy-to-navigate app catalog

• Flexible options for app containerization

• Advanced connectivity, authentication, security and analytics features

• Comprehensive app ecosystem

Acquire, distribute, secure and track mobile applications

with AirWatch® Mobile Application Management

Page 25: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Self-Service Portal to Empower End UsersReduce IT burden by allowing users basic administration over devices

Simplify enrollment, configuration and support

Enable users to drag-and-drop files into personal folders in AirWatch Secure Content Locker

Share files with others and set different access and editing privileges

25

Self-Service User Capabilities

Enroll additional devicesPerform remote commands

• Device query• Send message• Clear passcode• Wipe device

Download optional profilesView device information

• Compliance audit• Installed profiles and apps• GPS location

Request applications and technical supportAdd personal content to SCLEnable secure collaboration on content

Page 26: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.

Automated Compliance Engine

26

Build PoliciesApplication listCompromised statusEncryptionModel, OS versionPasscodeRoaming

Define EscalationTime based:• Minutes• Hours• DaysTiered actionsRepeat actions

Specify ActionsNotify admin when non-compliantSend SMS, email, push notificationRequest device check-inRemove or block specific profilesInstall compliance profileRemove all profilesRemove or block appsEnterprise wipe

1 2 3

Page 27: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 27

How To

PredictSee high-risk situations

in advance using

crowd wisdom

DetectFind mobile threats

before they reach

your network

PreventStop threats

automatically using

existing policies

Page 28: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 28

You need “Waze”Predict

• Protect against known, unknown and

ZERO-day attacks

Malware: How do you predict next-gen malware attacks?

Exploit: How do you know if the exploit was not tailor-made for your organization?

Network: How do you know if the network you connect to is real or fake?

Page 29: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 29

Predict

Page 30: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 30

DetectAnalyze

Applications• Policy Violations• Malware

Operating System• Vulnerabilities• Configurations

Device• Lost• Stole

Networks• Suspicious• Malicious

Page 31: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 31

PreventAutomated Remediation

Page 32: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 32

Skycure Mobile Threat Defense

• Seamless experience

• 24x7 detection and protection

• Device, app, and network analysis

• Multi platform – Android and iOS

Employee

• Flexible deployment

• Policy creation and enforcement

• Reporting and compliance

• Enterprise integrations

IT Team

Mobile Threat Intelligence

• Millions of tests per month

• 500K+ networks and apps analyzed• Zero-day threat protection

• Predictive Security

Page 33: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 33

Mobile Threat Intelligence

https://maps.skycure.com

Predict

Page 34: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 34

Page 35: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 35

Promotional Offer

50 FREE Licenses

Send an email to :

[email protected]

Page 36: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 36

Summary

• The problem of mobile security is real and is already

here

• An ideal solution should offer layered security:

- Physical compromise

- Network attacks

- Malware infections

- Vulnerability exploitation

• Enterprises are moving towards risk-based mobility

• Skycure + AirWatch is leading the charter

Page 37: How to Predict, Detect and Protect Against Mobile Cyber Attacks

Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 37

Next Steps

Request a FREE 30 Day Trial!

[email protected], Phone: 1-800-650-4821

https://www.skycure.com/trial

https://blog.skycure.com

@SkycureSecurity, @vk_is

https://www.linkedin.com/company/skycure