SlideShare a Scribd company logo
1 of 24
Download to read offline
Securing Mobile Apps: New
  Approaches for the BYOD World                                                                               !




  Presented by:

  Cimarron Buser!
  Apperian, Inc.





                                                                                                     	

	

                                                                                     	

The information and images contained in this document are of a proprietary and confidential nature.
The disclosure, duplication, use in whole, or use in part, of the document for any purposes other than
client evaluation without the written permission of Apperian, Inc. is strictly prohibited.




© Apperian, Inc. 2012. All Rights Reserved.!
Today’s Webinar
Twitter: #AppSecurity

Direct Messages: “Chat Box” in Webinar Session

Q&A At the End of the Presentation




                                                 Page! 2!
About Apperian

     Top tier investors                                        Award winning product




                                                                      2012 Product Finalist
                                                                                              Company to Watch




    Experienced team                                         Strong customer base




                          Copyright © 2012, Apperian, Inc.                                                   Page! 3!
Agenda!

              Mobile Device & App Security

        Challenges for Mobile Apps and Security
        Security in Context: Mobile Enterprise Strategy
        Many Options: MDM, MEAP, MAM, MSSS …
        Specific Approaches: Virtualization, Sandboxes,
         Wrappers, and SDKs
        Moving Forward: Balancing and Managing Mobile
         Risk




                          Copyright © 2012, Apperian, Inc.   Page! 4!
Challenges for Mobile Security


         Users
I want quick and                                  IT
   easy access to
                                     How do I
    business apps
                                     securely                                      Dev
        and data!
                                   deploy and                                   How do
                                      manage                                 I make an
                                      devices                               enterprise-
                                    and apps?                               grade app?




    “BYOD”
    Consumerization of IT
                                         Need a solution now!
    Single personal/work device                                                Need App examples
                                         Security is still #1
    Increased mobility                                                         Lack of IT Apple or Android
                                         Have to mobilize workforce             experience
                                                                                Smartphone SDKs not built
                                                                                 for enterprise

                                         Copyright © 2012, Apperian, Inc.                              Page! 5!
Challenge: Where do users get the Apps?




iTunes App Store or Google Market
       Consumer app focus
       Apps and updates are “optional”
       Personal iTunes or Gmail account based

Private “App Catalog” approach
       Enterprise “in-house” app focus
       Apps and updates “mandatory”
       Corporate directory authenticated


                                  Copyright © 2012, Apperian, Inc.   Page! 6!
                                                                     Page!
Security in Context: Mobile Enterprise Strategy




                                                        Source: The Enterprise
                                                        Mobility Foundation


                     Copyright © 2012, Apperian, Inc.                     Page! 7!
Security in Context: How Big is the Threat?!

        Mobile is “attack surface” that can be exploited
              Unmanaged devices, networks, OS’s, apps
               data flows and storage
        Mobile Risk exists and past “events” sound scary
              Since 2001 $25B+ in loss (PC/Win based)
              Mobile anti-virus and anti-malware emerging
        But so far, no “major” similar events in mobile
              However – SMS fraud is still a problem…
                       Congratulations!!! You won R1,000,000.00 in the on-going
                       Chevron UK bonanza. Claim code: CHVUKB/SA/10. Call
                       Elizabeth on 0835161978 from 9am to 4pm for claim.



                                  Copyright © 2012, Apperian, Inc.                Page! 8!
Enterprise Mobile Apps


  R U Ready?	


                         Page!
Many Options: But it’s Alphabet Soup!

         Mobile Device & App Security Options

        The Acronyms:
              MDM: Mobile Device Management
              MEAP: Mobile Enterprise Application Platform
              MAM: Mobile Application Management
              MSSS: Mobile Security Software Suite
        The Approaches:
              Virtualization, Wrappers, SDKs, Sandboxes…



                            Copyright © 2012, Apperian, Inc.   Page! 10!
Many Security Touch Points


               Visibility            Policy                Monitoring   GRC

                   User              Auth-n/z              Education    Policies

                    App              SDK                    Wrapper     Middleware

               Partition             VM                    Container    Partition

                  Agent              AV                     Firewall    Blacklist

                 Device              VPN                   Location     Encryption

                      OS             Sandbox                Profiles    APIs

               Network               Carrier                 Wi-Fi      Bluetooth




                        Copyright © 2012, Apperian, Inc.                             Page! 11!
Anatomy of an iOS Device Security Posture

                                                                       Remotely wipe devices, track lost or
                                                                       stolen devices, ensure deletion of data.	



                         Remediation	

                                Manage access and authorize users based
                                                                       on enterprise credentials.	


                           Auth-n/z	

                                                                       Secure container with App content based
                                                                       on user role, SDK extends to Apps. 	

                       App Container	

                                                                       Manage settings, ensure compliance
                                                                       policies, remotely wipe and delete.	

                            MDM	


Same capabilities      Device Profiles	

                               Control security settings for VPN, Wi-Fi,
available to all	

                                                    email and authentication.	

                      Device Encryption	

                                                                       Apps & Data at rest and in use protected
                        App Sandbox	

                                 via HW encryption.	



                                                                       Limited access to files, preferences,
                                                                       network, hardware and other Apps.	



                                    Copyright © 2012, Apperian, Inc.                                                 Page! 12!
MDM - Mobile Device Management!
   MDM focuses on device-based security, provisioning and
 control of mobile devices. Additional features may provide
    TEMS, Device Inventory, and app lists (part of MAM)

•     MDM is useful for organizations requiring a high level of control over
      Corporate Liable devices due to regulatory requirements, or where
      the risk of users accessing “non approved” information is high.

•     Microsoft Exchange Server provides security with device
      management features via ActiveSync, including security profile
      (e.g., user must have PIN code or specific type and length), and
      device “wipe” and “lock”

•     Apple IOS supports a protocol called “MDM” that allows IOS devices
      to register with a central server, and thereafter receive specific
      commands to perform tasks, e.g., “device wipe”, install security
      profiles, or send back device status without user intervention.


                                  Copyright © 2012, Apperian, Inc.         Page! 13!
MDM – Device Management Examples!




Microsoft Exchange 2007 Server - Device                       Google Apps Device Management Console
Management feature




                                          Copyright © 2012, Apperian, Inc.                            Page! 14!
MEAP - Mobile Enterprise Application Platform!

     MEAPs provide “tools and client/server middleware for
      mobile (targeting any sort of mobile application) and
     multichannel (highly device/OS- and network-adaptive)
      thick (offline) enterprise application development”*

•     MEAPs are used by some organizations that require an integrated
      development environment.

•     MEAPs are attractive to companies that want to deploy an
      enterprise-wide solution across many different device types, using
      central logic for large, complex apps

•     MEAP Sandboxes enable multiple applications within a single
      “native app” sandbox, thereby providing control over the
      application from a single dashboard
                                                                    * Source: Gartner Group


                                 Copyright © 2012, Apperian, Inc.                     Page! 15!
MEAP - Example!




    Source: Antenna Software: AMP Platform



                                      Copyright © 2012, Apperian, Inc.   Page! 16!
MAM - Mobile Application Management!
MAM focuses on the role-based security, provisioning and control
 of mobile apps in an organization with capabilities that may
    include device inventory, reporting/tracking, and user
                         compliance.

•     MAMs are useful for organizations providing “in-house” apps to users
      on either CL or IL devices. For example, if a user leaves an
      organization or group, apps and data belonging to the organization
      can be de-provisioned, without resorting to a full “device wipe”

•     MAM solutions are typically used in mixed (CL/IL) environments or
      where BYOD policies are implemented.

•     Apple and Android supports over-the-air delivery of apps than
      enable apps and profiles to be delivered from a server


                                 Copyright © 2012, Apperian, Inc.         Page! 17!
MAM - Example!




    Source: Apperian, Inc. – EASE App Catalog



                                        Copyright © 2012, Apperian, Inc.   Page! 18!
MSSS - Mobile Security Software Suite!
     MSSS focuses on providing a complete “suite” of solutions that
     may include antivirus, personal firewall, VPN, encryption, anti-
           spam, and remote monitoring and control services.

•      MSSS solutions extend traditional “enterprise” protections for the
       PC environment to mobility. Services can include remote back up
       and restore, lost and stolen device location, as well as data wipe.

•      MSSS can also send an alert when “security” events occur, e.g.,
       when a SIM card has been removed or replaced.

•      MSSS capabilities are beginning to overlap or be subsumed by MDM
       or built-in OS solutions (e.g. iCloud) and certain features, such as
       anti-virus, are not necessarily viewed as critical… yet




                                   Copyright © 2012, Apperian, Inc.           Page! 19!
Approaches to Data/App Security!

•     Virtualization allows a device to having a different “partition” or
      “persona” that provides two or more virtual device modes; apps built
      for these modes may require an SDK or Wrapper
•     SDKs provide direct support to native app developers for
      authentication, authorization, reporting/tracking and other services
      to provide for app and data security enforcement
•     Wrappers offer the promise of “wrapping” an existing mobile app
      without the need to re-compile or change code; the resulting app can
      then be managed centrally
•     Sandboxes allow a single or multiple apps to live within a “sandbox”
      and be logically separated from other apps but managed centrally

      … Application Developers may use one or more of these approaches
      to address security issues, or use “do it yourself” methods	


                                                                    * Source: ISO


                                 Copyright © 2012, Apperian, Inc.                   Page! 20!
Mobile Security Solutions

                                                                                              “Holy Grail Solution”
                                MDM	


                             Mobile Iron
                             Air Watch	

                              BoxTone	

                                                Virtualization (OS)	

                                                                                                 MAM	

  Device Management	





                                                VMWare Horizon	

                                                 ATT Toggle	

                         Device Mgmt	

                                                        Apperian
                                                                                              AppCentral	

                         MS Exchange                                                      Partnerpedia	

                          Google DM	

                         Apple Profile
                             Mgr	

              MEAP	

                           MPSS	

                                              (Sandboxes)	

                                                                               Symantec	

                                               Antenna	

                       McAfee	

                                                Sybase	

                                            Wrappers	

                                                                                 RSA	

                                                 Pyxis	

                                                GOOD	

                                               Mocana	

                                                                                                      Arxan	





                                                    App and Data Management	



                                                         Copyright © 2012, Apperian, Inc.                                Page! 21!
Moving Forward: Balancing Risk and Objectives!

Security Objective	

                  Risk	

                                Low	

              Medium	

           High	


Confidentiality	

                      Unauthorized disclosure of             limited             serious             severe or
Preserving authorized restrictions     information … to                       adverse effect	

   adverse effect	

   catastrophic
on information access and              organizational operations,                                                     adverse effect	

disclosure, including means for        organizational assets, or
protecting personal privacy and        individuals	

proprietary information.	




Integrity	

                           Unauthorized modification or            limited             serious             severe or
Guarding against improper              destruction of information …           adverse effect	

   adverse effect	

   catastrophic
information modification or             to operations, organizational                                                  adverse effect	

destruction, and includes ensuring     assets, or individuals.	

information non- repudiation and
authenticity.	




Availability	

                        Disruption of access to or use         limited             serious             severe or
Ensuring timely and reliable           of information or an                   adverse effect	

   adverse effect	

   catastrophic
access to and use of information.	

   information system .. on                                                       adverse effect	

                                       organizational operations,
                                       organizational assets, or
                                       individuals	


                                                   Source: Adapted from “Standards for Security Categorization of Federal
                                                   Information and Information Systems” (FIPS PUB 199)

                                                        Copyright © 2012, Apperian, Inc.                                                  Page! 22!
Moving Forward: Making a Plan!



                                      Make Security part of overall Strategy
                                                 Focus on “high impact” areas
                                      Establish Basic Policies  User Agreement
                                                 “Best Practices” including encryption
                                                  for data in transit and data at rest
                                                 Basic security policy for PINs,
                                                  registration (“Find Me”) and enabling
                                                  wipe for company and user
                                      Have Plan in Place for Data Breach
                                                 Event reporting protocol
                                                 Specific steps and actions
                                      Measure and Monitor
                    Copyright © 2012, Apperian, Inc.                              Page! 23!
QA

      www.apperian.com


         Additional Questions?
         Contact Cimarron Buser



         cbuser@apperian.com

                                  Page! 24!

More Related Content

What's hot

MYZEAL IT Solutions-Offshore Mobile Apps Development Company India
MYZEAL IT Solutions-Offshore Mobile Apps Development Company IndiaMYZEAL IT Solutions-Offshore Mobile Apps Development Company India
MYZEAL IT Solutions-Offshore Mobile Apps Development Company IndiaMYZEAL IT Solutions LLC
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiMasha Geller
 
Cygnet mobility solutions & case studies
Cygnet mobility solutions & case studiesCygnet mobility solutions & case studies
Cygnet mobility solutions & case studiesTarak Joshi
 
Kony Mobile Management
Kony Mobile ManagementKony Mobile Management
Kony Mobile ManagementDipesh Mukerji
 
Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012CorSource
 
Demystifying the Mobile Container - PART I
Demystifying the Mobile Container - PART IDemystifying the Mobile Container - PART I
Demystifying the Mobile Container - PART IRelayware
 
Kony-Cognizant Webinar: Finding the Silver Bullet in Retail Mobility
Kony-Cognizant Webinar: Finding the Silver Bullet in Retail MobilityKony-Cognizant Webinar: Finding the Silver Bullet in Retail Mobility
Kony-Cognizant Webinar: Finding the Silver Bullet in Retail MobilityKony, Inc.
 
BlackBerry 10 Implications for Enterprise Mobility
BlackBerry 10 Implications for Enterprise MobilityBlackBerry 10 Implications for Enterprise Mobility
BlackBerry 10 Implications for Enterprise MobilityRelayware
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
 
Single sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceSingle sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceCA API Management
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Relayware
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD OpportunityJuniper Networks
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
BYOD - it's an identity thing
BYOD - it's an identity thingBYOD - it's an identity thing
BYOD - it's an identity thingPaul Madsen
 
Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12Salesforce Partners
 
YUDU iPad and iPhone apps for the travel industry - Presentation
YUDU iPad and iPhone apps for the travel industry - PresentationYUDU iPad and iPhone apps for the travel industry - Presentation
YUDU iPad and iPhone apps for the travel industry - PresentationYUDU Media
 
Penrillian.com - Mobile Money
Penrillian.com - Mobile MoneyPenrillian.com - Mobile Money
Penrillian.com - Mobile MoneyMobileMoney
 
The Modern Web, Part 1: Mobility
The Modern Web, Part 1: MobilityThe Modern Web, Part 1: Mobility
The Modern Web, Part 1: MobilityDavid Pallmann
 

What's hot (20)

MYZEAL IT Solutions-Offshore Mobile Apps Development Company India
MYZEAL IT Solutions-Offshore Mobile Apps Development Company IndiaMYZEAL IT Solutions-Offshore Mobile Apps Development Company India
MYZEAL IT Solutions-Offshore Mobile Apps Development Company India
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
 
Cygnet mobility solutions & case studies
Cygnet mobility solutions & case studiesCygnet mobility solutions & case studies
Cygnet mobility solutions & case studies
 
Kony Mobile Management
Kony Mobile ManagementKony Mobile Management
Kony Mobile Management
 
Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012
 
Demystifying the Mobile Container - PART I
Demystifying the Mobile Container - PART IDemystifying the Mobile Container - PART I
Demystifying the Mobile Container - PART I
 
Kony-Cognizant Webinar: Finding the Silver Bullet in Retail Mobility
Kony-Cognizant Webinar: Finding the Silver Bullet in Retail MobilityKony-Cognizant Webinar: Finding the Silver Bullet in Retail Mobility
Kony-Cognizant Webinar: Finding the Silver Bullet in Retail Mobility
 
BlackBerry 10 Implications for Enterprise Mobility
BlackBerry 10 Implications for Enterprise MobilityBlackBerry 10 Implications for Enterprise Mobility
BlackBerry 10 Implications for Enterprise Mobility
 
Mobilemonday b2b mobco
Mobilemonday b2b   mobcoMobilemonday b2b   mobco
Mobilemonday b2b mobco
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
Single sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceSingle sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConference
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
 
Ibeacons bible
Ibeacons bibleIbeacons bible
Ibeacons bible
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
BYOD - it's an identity thing
BYOD - it's an identity thingBYOD - it's an identity thing
BYOD - it's an identity thing
 
Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12
 
YUDU iPad and iPhone apps for the travel industry - Presentation
YUDU iPad and iPhone apps for the travel industry - PresentationYUDU iPad and iPhone apps for the travel industry - Presentation
YUDU iPad and iPhone apps for the travel industry - Presentation
 
Penrillian.com - Mobile Money
Penrillian.com - Mobile MoneyPenrillian.com - Mobile Money
Penrillian.com - Mobile Money
 
The Modern Web, Part 1: Mobility
The Modern Web, Part 1: MobilityThe Modern Web, Part 1: Mobility
The Modern Web, Part 1: Mobility
 

Viewers also liked

9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...
9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...
9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...Moscow State University
 
Presentation1[2]
Presentation1[2]Presentation1[2]
Presentation1[2]georgb2789
 
Retailin france 2011_kh
Retailin france 2011_khRetailin france 2011_kh
Retailin france 2011_khAllystephen
 
David mahmood dallas business journal facetime profile
David mahmood   dallas business journal facetime profileDavid mahmood   dallas business journal facetime profile
David mahmood dallas business journal facetime profileBruce Condit
 
Ancillaries planning & Evolution
Ancillaries planning & EvolutionAncillaries planning & Evolution
Ancillaries planning & EvolutionGeeetarBen
 
2 класс. lesson 29. рождественская история
2 класс. lesson 29. рождественская история2 класс. lesson 29. рождественская история
2 класс. lesson 29. рождественская историяshpinat
 
University of the fraser valley
University of the fraser valleyUniversity of the fraser valley
University of the fraser valleyDhrron Consultancy
 
11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...
11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...
11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...Moscow State University
 
Photoshop assignment #1
Photoshop assignment #1Photoshop assignment #1
Photoshop assignment #1pranidhi
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now. Apperian
 

Viewers also liked (20)

9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...
9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...
9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...
 
Presentation1[2]
Presentation1[2]Presentation1[2]
Presentation1[2]
 
Retailin france 2011_kh
Retailin france 2011_khRetailin france 2011_kh
Retailin france 2011_kh
 
David mahmood dallas business journal facetime profile
David mahmood   dallas business journal facetime profileDavid mahmood   dallas business journal facetime profile
David mahmood dallas business journal facetime profile
 
Ancillaries planning & Evolution
Ancillaries planning & EvolutionAncillaries planning & Evolution
Ancillaries planning & Evolution
 
Trabajo del examen
Trabajo del examenTrabajo del examen
Trabajo del examen
 
Video games
Video gamesVideo games
Video games
 
Photo project
Photo projectPhoto project
Photo project
 
itcslive ppt
itcslive pptitcslive ppt
itcslive ppt
 
2 класс. lesson 29. рождественская история
2 класс. lesson 29. рождественская история2 класс. lesson 29. рождественская история
2 класс. lesson 29. рождественская история
 
Slide blog
Slide blogSlide blog
Slide blog
 
University of the fraser valley
University of the fraser valleyUniversity of the fraser valley
University of the fraser valley
 
11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...
11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...
11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...
 
Navegadores de internet
Navegadores de internetNavegadores de internet
Navegadores de internet
 
Photoshop assignment #1
Photoshop assignment #1Photoshop assignment #1
Photoshop assignment #1
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.
 
Slide blog
Slide blogSlide blog
Slide blog
 
"Going Mobile - Not the 'WHO', the How"
"Going Mobile - Not the 'WHO', the How""Going Mobile - Not the 'WHO', the How"
"Going Mobile - Not the 'WHO', the How"
 
Jodhpur media
Jodhpur mediaJodhpur media
Jodhpur media
 
Camosun college
Camosun collegeCamosun college
Camosun college
 

Similar to Securing Mobile Apps: New Approaches for the BYOD World

Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them OutApperian
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end reviewLeigh Williamson
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightDirk Nicol
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidMobile March
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaLeigh Williamson
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMIBM Danmark
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseCA API Management
 
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...CA API Management
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel BilgilendirmeSybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel BilgilendirmeSybase Türkiye
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USIBM Danmark
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
Enterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, ImplementationEnterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, ImplementationYugan Sikri
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApperian
 
Debunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application DevelopmentDebunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application DevelopmentAntenna Software
 

Similar to Securing Mobile Apps: New Approaches for the BYOD World (20)

Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end review
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit India
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
 
IBM Worklight-Overview
IBM Worklight-OverviewIBM Worklight-Overview
IBM Worklight-Overview
 
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel BilgilendirmeSybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
Enterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, ImplementationEnterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, Implementation
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
Debunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application DevelopmentDebunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application Development
 

More from Apperian

Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilityApperian
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with MocanaApperian
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityApperian
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityApperian
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldApperian
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19Apperian
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21Apperian
 
Applification of Business
Applification of BusinessApplification of Business
Applification of BusinessApperian
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Apperian
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE Apperian
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDMApperian
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesApperian
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in RetailApperian
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseApperian
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsApperian
 

More from Apperian (15)

Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of Mobility
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great Opportunity
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM World
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21
 
Applification of Business
Applification of BusinessApplification of Business
Applification of Business
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile Devices
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in Retail
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native Apps
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Securing Mobile Apps: New Approaches for the BYOD World

  • 1. Securing Mobile Apps: New Approaches for the BYOD World ! Presented by:
 Cimarron Buser! Apperian, Inc.
 The information and images contained in this document are of a proprietary and confidential nature. The disclosure, duplication, use in whole, or use in part, of the document for any purposes other than client evaluation without the written permission of Apperian, Inc. is strictly prohibited. © Apperian, Inc. 2012. All Rights Reserved.!
  • 2. Today’s Webinar Twitter: #AppSecurity Direct Messages: “Chat Box” in Webinar Session Q&A At the End of the Presentation Page! 2!
  • 3. About Apperian Top tier investors Award winning product 2012 Product Finalist Company to Watch Experienced team Strong customer base Copyright © 2012, Apperian, Inc. Page! 3!
  • 4. Agenda! Mobile Device & App Security   Challenges for Mobile Apps and Security   Security in Context: Mobile Enterprise Strategy   Many Options: MDM, MEAP, MAM, MSSS …   Specific Approaches: Virtualization, Sandboxes, Wrappers, and SDKs   Moving Forward: Balancing and Managing Mobile Risk Copyright © 2012, Apperian, Inc. Page! 4!
  • 5. Challenges for Mobile Security Users I want quick and IT easy access to How do I business apps securely Dev and data! deploy and How do manage I make an devices enterprise- and apps? grade app?   “BYOD”   Consumerization of IT   Need a solution now!   Single personal/work device   Need App examples   Security is still #1   Increased mobility   Lack of IT Apple or Android   Have to mobilize workforce experience   Smartphone SDKs not built for enterprise Copyright © 2012, Apperian, Inc. Page! 5!
  • 6. Challenge: Where do users get the Apps? iTunes App Store or Google Market   Consumer app focus   Apps and updates are “optional”   Personal iTunes or Gmail account based Private “App Catalog” approach   Enterprise “in-house” app focus   Apps and updates “mandatory”   Corporate directory authenticated Copyright © 2012, Apperian, Inc. Page! 6! Page!
  • 7. Security in Context: Mobile Enterprise Strategy Source: The Enterprise Mobility Foundation Copyright © 2012, Apperian, Inc. Page! 7!
  • 8. Security in Context: How Big is the Threat?!   Mobile is “attack surface” that can be exploited   Unmanaged devices, networks, OS’s, apps data flows and storage   Mobile Risk exists and past “events” sound scary   Since 2001 $25B+ in loss (PC/Win based)   Mobile anti-virus and anti-malware emerging   But so far, no “major” similar events in mobile   However – SMS fraud is still a problem… Congratulations!!! You won R1,000,000.00 in the on-going Chevron UK bonanza. Claim code: CHVUKB/SA/10. Call Elizabeth on 0835161978 from 9am to 4pm for claim. Copyright © 2012, Apperian, Inc. Page! 8!
  • 9. Enterprise Mobile Apps R U Ready? Page!
  • 10. Many Options: But it’s Alphabet Soup! Mobile Device & App Security Options   The Acronyms:   MDM: Mobile Device Management   MEAP: Mobile Enterprise Application Platform   MAM: Mobile Application Management   MSSS: Mobile Security Software Suite   The Approaches:   Virtualization, Wrappers, SDKs, Sandboxes… Copyright © 2012, Apperian, Inc. Page! 10!
  • 11. Many Security Touch Points Visibility Policy Monitoring GRC User Auth-n/z Education Policies App SDK Wrapper Middleware Partition VM Container Partition Agent AV Firewall Blacklist Device VPN Location Encryption OS Sandbox Profiles APIs Network Carrier Wi-Fi Bluetooth Copyright © 2012, Apperian, Inc. Page! 11!
  • 12. Anatomy of an iOS Device Security Posture Remotely wipe devices, track lost or stolen devices, ensure deletion of data. Remediation Manage access and authorize users based on enterprise credentials. Auth-n/z Secure container with App content based on user role, SDK extends to Apps. App Container Manage settings, ensure compliance policies, remotely wipe and delete. MDM Same capabilities Device Profiles Control security settings for VPN, Wi-Fi, available to all email and authentication. Device Encryption Apps & Data at rest and in use protected App Sandbox via HW encryption. Limited access to files, preferences, network, hardware and other Apps. Copyright © 2012, Apperian, Inc. Page! 12!
  • 13. MDM - Mobile Device Management! MDM focuses on device-based security, provisioning and control of mobile devices. Additional features may provide TEMS, Device Inventory, and app lists (part of MAM) •  MDM is useful for organizations requiring a high level of control over Corporate Liable devices due to regulatory requirements, or where the risk of users accessing “non approved” information is high. •  Microsoft Exchange Server provides security with device management features via ActiveSync, including security profile (e.g., user must have PIN code or specific type and length), and device “wipe” and “lock” •  Apple IOS supports a protocol called “MDM” that allows IOS devices to register with a central server, and thereafter receive specific commands to perform tasks, e.g., “device wipe”, install security profiles, or send back device status without user intervention. Copyright © 2012, Apperian, Inc. Page! 13!
  • 14. MDM – Device Management Examples! Microsoft Exchange 2007 Server - Device Google Apps Device Management Console Management feature Copyright © 2012, Apperian, Inc. Page! 14!
  • 15. MEAP - Mobile Enterprise Application Platform! MEAPs provide “tools and client/server middleware for mobile (targeting any sort of mobile application) and multichannel (highly device/OS- and network-adaptive) thick (offline) enterprise application development”* •  MEAPs are used by some organizations that require an integrated development environment. •  MEAPs are attractive to companies that want to deploy an enterprise-wide solution across many different device types, using central logic for large, complex apps •  MEAP Sandboxes enable multiple applications within a single “native app” sandbox, thereby providing control over the application from a single dashboard * Source: Gartner Group Copyright © 2012, Apperian, Inc. Page! 15!
  • 16. MEAP - Example! Source: Antenna Software: AMP Platform Copyright © 2012, Apperian, Inc. Page! 16!
  • 17. MAM - Mobile Application Management! MAM focuses on the role-based security, provisioning and control of mobile apps in an organization with capabilities that may include device inventory, reporting/tracking, and user compliance. •  MAMs are useful for organizations providing “in-house” apps to users on either CL or IL devices. For example, if a user leaves an organization or group, apps and data belonging to the organization can be de-provisioned, without resorting to a full “device wipe” •  MAM solutions are typically used in mixed (CL/IL) environments or where BYOD policies are implemented. •  Apple and Android supports over-the-air delivery of apps than enable apps and profiles to be delivered from a server Copyright © 2012, Apperian, Inc. Page! 17!
  • 18. MAM - Example! Source: Apperian, Inc. – EASE App Catalog Copyright © 2012, Apperian, Inc. Page! 18!
  • 19. MSSS - Mobile Security Software Suite! MSSS focuses on providing a complete “suite” of solutions that may include antivirus, personal firewall, VPN, encryption, anti- spam, and remote monitoring and control services. •  MSSS solutions extend traditional “enterprise” protections for the PC environment to mobility. Services can include remote back up and restore, lost and stolen device location, as well as data wipe. •  MSSS can also send an alert when “security” events occur, e.g., when a SIM card has been removed or replaced. •  MSSS capabilities are beginning to overlap or be subsumed by MDM or built-in OS solutions (e.g. iCloud) and certain features, such as anti-virus, are not necessarily viewed as critical… yet Copyright © 2012, Apperian, Inc. Page! 19!
  • 20. Approaches to Data/App Security! •  Virtualization allows a device to having a different “partition” or “persona” that provides two or more virtual device modes; apps built for these modes may require an SDK or Wrapper •  SDKs provide direct support to native app developers for authentication, authorization, reporting/tracking and other services to provide for app and data security enforcement •  Wrappers offer the promise of “wrapping” an existing mobile app without the need to re-compile or change code; the resulting app can then be managed centrally •  Sandboxes allow a single or multiple apps to live within a “sandbox” and be logically separated from other apps but managed centrally … Application Developers may use one or more of these approaches to address security issues, or use “do it yourself” methods * Source: ISO Copyright © 2012, Apperian, Inc. Page! 20!
  • 21. Mobile Security Solutions “Holy Grail Solution” MDM Mobile Iron Air Watch BoxTone Virtualization (OS) MAM Device Management VMWare Horizon ATT Toggle Device Mgmt Apperian AppCentral MS Exchange Partnerpedia Google DM Apple Profile Mgr MEAP MPSS (Sandboxes) Symantec Antenna McAfee Sybase Wrappers RSA Pyxis GOOD Mocana Arxan App and Data Management Copyright © 2012, Apperian, Inc. Page! 21!
  • 22. Moving Forward: Balancing Risk and Objectives! Security Objective Risk Low Medium High Confidentiality Unauthorized disclosure of limited serious severe or Preserving authorized restrictions information … to adverse effect adverse effect catastrophic on information access and organizational operations, adverse effect disclosure, including means for organizational assets, or protecting personal privacy and individuals proprietary information. Integrity Unauthorized modification or limited serious severe or Guarding against improper destruction of information … adverse effect adverse effect catastrophic information modification or to operations, organizational adverse effect destruction, and includes ensuring assets, or individuals. information non- repudiation and authenticity. Availability Disruption of access to or use limited serious severe or Ensuring timely and reliable of information or an adverse effect adverse effect catastrophic access to and use of information. information system .. on adverse effect organizational operations, organizational assets, or individuals Source: Adapted from “Standards for Security Categorization of Federal Information and Information Systems” (FIPS PUB 199) Copyright © 2012, Apperian, Inc. Page! 22!
  • 23. Moving Forward: Making a Plan!   Make Security part of overall Strategy   Focus on “high impact” areas   Establish Basic Policies User Agreement   “Best Practices” including encryption for data in transit and data at rest   Basic security policy for PINs, registration (“Find Me”) and enabling wipe for company and user   Have Plan in Place for Data Breach   Event reporting protocol   Specific steps and actions   Measure and Monitor Copyright © 2012, Apperian, Inc. Page! 23!
  • 24. QA www.apperian.com Additional Questions? Contact Cimarron Buser cbuser@apperian.com Page! 24!