Federal-grade security with Appthority
Upcoming SlideShare
Loading in...5
×
 

Federal-grade security with Appthority

on

  • 295 views

 

Statistics

Views

Total Views
295
Views on SlideShare
295
Embed Views
0

Actions

Likes
0
Downloads
2
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • http://www.businesswire.com/news/home/20120228005949/en/Appthority-Named-%E2%80%9CMost-Innovative-Company-RSA%C2%AE-Conference

Federal-grade security with Appthority Federal-grade security with Appthority Presentation Transcript

  • AppthorityAppthorityAppthority helps people learn what apps do and what risks they contain The Authority in App Security™“Yes, You Can Have Federal Grade Mobile Data SecurityToo!” Appthority © Copyright 2012 All Rights Reserved 1 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • AppthorityMost Innovative of RSA AwardNamed “The Most Innovative Company of RSA Conference® 2012”“Appthority and its Appthority Platform won the award based on the currentand future need to secure mobile applications, as well their ability to build anestablished partner network and demonstrate robust customer traction.”– RSA Innovation Sandbox Judging Committee Appthority © Copyright 2012 All Rights Reserved 2 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • Appthority teamAppthorityManagement team from such companies asWith top notch investors with backgrounds funding successful Enterprisesecurity companies Steve Krausz invested in such Enterprise security companies as CheckPoint Software, Imperva, Vontu, ThreatMetrix, Trusteer, and CipherTrust Ray Rothrock invested in such Enterprise security companies as CheckPoint Software, Imperva, Vontu, PGP, WholeSecurity, RedSeal, CoreTrace, and CloudFlare Appthority © Copyright 2012 All Rights Reserved 3 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • Appthority challengesCustomerEnterprises can’t create or enforce mobile policy nor comply withregulatory requirements if they don’t know what risks the apps contain • Explosion in apps and exponential growth in malware • Existing mobile security expertise scarce within the Enterprise • No one knows which apps are safe • Legacy security technologies are not keeping up with the changes in mobile • New apps being released faster than they can be manually reviewed • Cost to determine if an individual app is safe is prohibitively expensive and everyone has a different opinion of “safe” Appthority © Copyright 2012 All Rights Reserved 4 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • AppthorityWhy use Appthority in EASE?Before distributing apps inside the Enterprise, the apps need to be checkedby Appthority • Best-in-class behavior-based malware detection • Works on Android and iOS apps • Reduces supply-chain risk from third-party app developers • Superior protection when paired with Mocana- Appthority keeps malware away from VPN clients • Risk management approach to screening mobile apps • Allows Enterprises to reject or adjust apps that don’t meet Enterprise policy • Helps Enterprises understand what the mobile apps are really doing and what Enterprise data they have access to • Easy-to-use Appthority App Inspection within EASE Appthority © Copyright 2012 All Rights Reserved 5 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • Appthority PlatformAppthorityOnly Appthority can scan iOS apps for malware & risky behaviors seen inAndroid • Screens mobile apps (Android and iOS) in minutes, in the cloud • Integrates w/ Enterprise solutions like Apperian and Mocana • Detects attributes in apps, such as: • Malware (behavior-based NOT hash-based, detects new & never before seen malware) • Location tracking (even without permission) • Ad networks • Data leakage risks • Cryptographic risks Appthority © Copyright 2012 All Rights Reserved 6 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • Appthority in ApperianWorkflowSimply click the magnifying glass in the Apperian Applications console tobegin inspecting apps with Appthority! Contact your Apperian accountmanager for eval access today! Best practice: Before distributing apps to employees, ensure you’ve Appthority © Copyright 2012 All Rights Reserved 7 inspected contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com the apps!
  • AppthorityExample inspection report Appthority © Copyright 2012 All Rights Reserved 8 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • Appthority and best practicesSummaryDon’t distribute software within the Enterprise, without inspecting what thesoftware does! • All apps should be inspected, for malware and policy compliance, prior to: • Distributing the apps into the Enterprise • Adding VPN clients into the apps • Appthority helps organizations answer: • Are third-party file sharing systems like DropBox used by the app • Does the app take the contact book off the device? • Does the app location track users (with or without permission)? • Is malware present? • Does the app communicate with known sites that serve malware? Appthority © Copyright 2012 All Rights Reserved 9 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • AppthorityQ&AWrap-up and Q&A. Questions? Thank you! The Authority in App Security™Thank you!– Anthony Bettini, Founder & CEO, Appthority Appthority © Copyright 2012 All Rights Reserved 10 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com