SlideShare a Scribd company logo
1 of 15
Download to read offline
MOBILE CARE EVERYWHERE
1
Securing the Mobile Enterprise
CyberTechLA – June 30, 2016
Itai Bass
VP Business Development
CommuniTake Technologies Inc.
itai@CommuniTake.com; (650) 515-3578
2Proprietary of CommuniTake
© 2016 COMMUNITAKE TECHNOLOGIES Intellectual Property. All rights reserved.
You will
Ever saw
a malware
in close-up?
Devices
Users
Networks
Applications
© 2016 COMMUNITAKE TECHNOLOGIES Intellectual Property. All rights reserved.
enforce patching<10%
have non-compliant device>52%
deploy anti-malware<5%
have jailbroken device1/10
>20% Remove PW / MDM
6Proprietary of CommuniTake
THE INTACTPHONE
Hardened Device
Secure Firmware
Proprietary of CommuniTake
Encrypted Dialog
Command Center
Anti-malware
Remote Control
Groups’ Policies
Self-Repair
HARDWARE OF TRUST
SECURE BOOT
INTACT ROM UTILITIES
INTACT ROM ENHANCEMENTS
SECURE COMMUNICATIONS
GENERIC DEVICE MANAGEMENT
INTACT APPLICATIONS
Blocking Known TrojansSame-day Patches
Encrypted Communications
Administrating UseGoverning Content
Omni-Resources Control
Crowd Analysis
Managing Connectivity
& Apps Permissions
Abstracting Resources
& Push Notifications
Internal Encryption
The most secure platform Multi-tiered Omni-protection
Built from the ground up Advanced security tool-set
Secure
Device
Safe
Dialog
Cloud
& On Prem
Central
Governance
Productivity BYOD
& Privacy
© 2016 COMMUNITAKE TECHNOLOGIES Intellectual Property. All rights reserved.13
WHO SHOULD USE IT?
Any organization which the risk and implication of compromising their mobile data
(internal or customer’s) is significant:
 Publicly trading companies
 Financial services (banking, investment, wealth management…)
 Professional services to individuals & companies (law firms, auditing, accounting…)
 Critical infrastructure (power/water utilities, airports, seaports, mass transport…)
 Executive/Celebrity protection services
 Physical security operators (G4S...)
 Government and local government organizations
 …
MOBILE CARE
MOBILITY MANAGEMENT
MOBILE SECURITY
Founded in 2009; Privately held; Offices in the US; China; Italy; & Israel.
MOBILE CARE EVERYWHERE
INTERNET OF THINGS
14
We craft security, care and management solutions to provide
people and businesses better more secure device use
Thank you.

More Related Content

What's hot

Phone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations GovernmentsPhone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations GovernmentsJohn Adam
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint SettingsSophos
 
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...Lumension
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_ENMID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_ENVladyslav Radetsky
 
SECURE YOUR NETWORK FROM THE INSIDE OUT
SECURE YOUR NETWORK FROM THE INSIDE OUTSECURE YOUR NETWORK FROM THE INSIDE OUT
SECURE YOUR NETWORK FROM THE INSIDE OUTLen Moncrieffe
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseAirTight Networks
 
Mobile (in)security? @ Mobile Edge '14
Mobile (in)security? @ Mobile Edge '14 Mobile (in)security? @ Mobile Edge '14
Mobile (in)security? @ Mobile Edge '14 Mobile Edge Event
 
White Paper: Defense In Breadth
White Paper: Defense In BreadthWhite Paper: Defense In Breadth
White Paper: Defense In BreadthCourtland Smith
 

What's hot (20)

Psb mobile security
Psb mobile securityPsb mobile security
Psb mobile security
 
Phone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations GovernmentsPhone for Enterprises Business Corporations Governments
Phone for Enterprises Business Corporations Governments
 
4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings4 Steps to Optimal Endpoint Settings
4 Steps to Optimal Endpoint Settings
 
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
PPIT Lecture 17
PPIT Lecture 17PPIT Lecture 17
PPIT Lecture 17
 
PPIT Lecture 19
PPIT Lecture 19PPIT Lecture 19
PPIT Lecture 19
 
MID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_ENMID_Security_Connected_Jan_van_Vliet_EN
MID_Security_Connected_Jan_van_Vliet_EN
 
SECURE YOUR NETWORK FROM THE INSIDE OUT
SECURE YOUR NETWORK FROM THE INSIDE OUTSECURE YOUR NETWORK FROM THE INSIDE OUT
SECURE YOUR NETWORK FROM THE INSIDE OUT
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
Nuro Secure Messaging
Nuro Secure MessagingNuro Secure Messaging
Nuro Secure Messaging
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
 
Mobile (in)security? @ Mobile Edge '14
Mobile (in)security? @ Mobile Edge '14 Mobile (in)security? @ Mobile Edge '14
Mobile (in)security? @ Mobile Edge '14
 
Mobile (in)security ?
Mobile (in)security ?Mobile (in)security ?
Mobile (in)security ?
 
VIISA Investment Day #4 - SecurityBox
VIISA Investment Day #4 - SecurityBoxVIISA Investment Day #4 - SecurityBox
VIISA Investment Day #4 - SecurityBox
 
White Paper: Defense In Breadth
White Paper: Defense In BreadthWhite Paper: Defense In Breadth
White Paper: Defense In Breadth
 

Similar to IntactPhone: Securing the Mobile Enterprise

Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceIvanti
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesIvanti
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網Amazon Web Services
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Relayware
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Survey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetSurvey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetijctet
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat PreventionMarketingArrowECS_CZ
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and EndpointsSymantec
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 
Highlights from the TechSoup Catalog [webinar slides]
Highlights from the TechSoup Catalog [webinar slides]Highlights from the TechSoup Catalog [webinar slides]
Highlights from the TechSoup Catalog [webinar slides]NetSquared
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)Andris Soroka
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldSamsung Business USA
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solutionHexnode
 

Similar to IntactPhone: Securing the Mobile Enterprise (20)

Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網TrendMicro: 從雲到端,打造安全的物聯網
TrendMicro: 從雲到端,打造安全的物聯網
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
sym
symsym
sym
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Survey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetSurvey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manet
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat Prevention
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Highlights from the TechSoup Catalog [webinar slides]
Highlights from the TechSoup Catalog [webinar slides]Highlights from the TechSoup Catalog [webinar slides]
Highlights from the TechSoup Catalog [webinar slides]
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile world
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solution
 

IntactPhone: Securing the Mobile Enterprise