SlideShare a Scribd company logo
1 of 23
Simple & secure
Enterprise App Store
Mobile Application
Protection & Enhancement
+
> Presenters:
+Julien Ott, CEO – Appaloosa
+Amit Lavi, VP Product - AppDome
> Topics
+Joint solution presentation
+Focus on AppDome features & demo
+Q&A
Agenda
Appaloosa & AppDome are partnering
to help companies distribute and
protect enterprise mobile apps without
MDM.
Overview
Appaloosa
>Established in 2014 by a team of experts in
digital consulting
>Part of OCTO Technology, founded in 1998.
>Identified as leader by Gartner in Mobile
Application Management
>Delivered 4M apps to 170k+ enterprise
users
>Appaloosa.io
Company profiles
AppDome
>Established in 2012 by a team of industry
leaders in enterprise mobility &
cybersecurity
>Unmatched mobile App Fusion
technology works on iOS and Android
>Gartner’s Cool Vendor for Mobile
Security
>Key Investors: Menlo Ventures, JVP,
Draper Nexus
>Appdome.com
Upload any iOS/Android app on Appaloosa and get AppDome
protection within minutes before distribution.
31 4
How it works
2
Your app AppDome
AppFusion
Appaloosa
Dashboard
Appaloosa
App Store
> Add features to your app in minutes without code change
> Features
+Auto-upgrade: when the end-user launches the app and a new version is
available, upgrade will be performed
+Blacklist: prevents a lost/stolen device or terminated user from launching
your app
+Analytics: collect detailed usage stats about user activity, views, network
+Root/Jailbreak: prevent the launch of apps on rooted or jailbroken devices
Automated Appaloosa SDK fusion
Deploy apps with enterprise
authentication to protect access to
the store and apps
Measure app adoption and
engagement for each release
Improve your next version with
feedback and comments
Joint Benefits for Appaloosa+AppDome
Automatic fusion of Appaloosa
SDK into mobile app without a
need for integration
Top notch security, fusion
protects from cyber attacks e.g.
data leakage, man-in-the-middle,
phishing, malware, reverse
engineering
Short time to market – Fusion
process is done in minutes not
months
7
MIN
8
8AppDome| Overview &
Team
Israeli startup established in 2012 by a team of industry leaders in
cybersecurity
9
9
Simple & Secure Enterprise Store
+
The Leading Mobile App Protection & Enhancement
Fuse & Use
10
The Pain | Market Examples
Leading US Financial Institution – Consumer Mobile BankingApplication
Mobile is the new competitive battlefield
(bank branches are becoming irrelevant)
Bank’s mobile application exposed by platform and SDKs vulnerabilities
to confidential customer information leakage and circumvention
Potential $$ effect from a publicized breach and fraud – Huge
(e.g. Target’s breach)
Significant investment in secure coding practices; However…
11
Secure Coding
Functionality UI/UX
Mobile Bank App Priorities Dilemma| Security vs. UX
Guard against introduction of security vulnerabilities (bugs
& logic flaws) during mobile application development (e.g.
SSL, authentication)
Secure Coding Practices
12
Cyber Security
Attack vectors include:
o OS vulnerabilities
o Malicious Wi-Fi / cell attacks
o Vulnerable plugins / SDKs
o Known & unknown financial malwares
Cyber Security Gap
cannot be addressed by Secure Coding.
Secure Coding
Functionality UI/UX
Mobile Application Security | Challenges
13
Cyber Security Cyber Security Gap
cannot be addressed by Secure Coding.
Secure Coding
Functionality UI/UX
Financial Mobile Application Security | Challenges
Out of hundreds of tested mobile apps
40% found vulnerable
for data at rest and data in transit attacks
14
In the News
MAN IN THE MIDDLE
EXPOSED DATA
IMPERSONATION
IMPERSONATION
EXPOSED DATA
MAN IN THE MIDDLE
EXPOSED DATA
MAN IN THE MIDDLE
EXPOSED DATA
IMPERSONATION
IMPERSONATION
EXPOSED DATA
MAN IN THE MIDDLEEXPOSED DATA
MAN IN THE MIDDLE
EXPOSED DATA
IMPERSONATION
IMPERSONATION
EXPOSED DATA
MAN IN THE MIDDLE
EXPOSED DATA
15
Attack Vector Example | Man-in-The-Middle
Fake Wi-Fi
Fake Cell
Social Engineering
Malware
16
Operating System
Libraries
Attack Vector Example | Data-at-rest
o Mobile apps are composed of binaries and
resources, such as user interface and graphics
o Despite application container architecture
(Sandbox…)
§ Data moving acrossinterfaces and in
storage is accessible to maliciouscode
§ Data in storage can be compromised from
inside as well as from outside the device
17
Employees Facing
Apps
Protect mobile apps from:
o Multilayer Protection
o No code change to the app –
o Outside development lifecycle
o Fuse & Use - Protect in minutes not months
o Facilitates regulatory compliance
Gain benefit of:
o Mobile Fraud
o Phishing
o Data Pharming
o Malware and mRAT
usingApp Fusion.
Enterprise
Apps
18
AppDome | Multilayer Protection Feature Matrix
Traffic
Locker
Session
Content
Behavioral
Anomalies
Encryption
Integrity
Authentication
Core
Secured Session
Pharming
Protection
Proactive
Root Detection
Adaptive Secured
Storage
App
Integrity
Security
Passphrase
Advanced
Zero-day Malware
Protection
Backup
Protection
Second Factor
Authentication
Phishing
Blocker
Defacing
Protection
Screen
Blurring
19
AppDome SaaS Service
1
9
Customer / Enterprise
Facing App Development
7
MIN
AppDomeTM
Protection
Dynamic Fusion
Up to 7 min
via an Integrated
Web Service
Distributing via
Online Stores
AppDome
Protection Layer
Libraries
20
Appaloosa Sample Application Flow
2
0
21
AppDome
Secure Coding
Functionality UI/UX
AppDome | DynamicApp Fusion Benefits 2
1No SDK Integration
High performance
Dynamic App Fusion
Short time to market
Bridging the gap between
Functionality and Security
for existing and newly
developed appsSecurity Features Integrated
by App Fusion
Intrusion and malware detection
Data at rest encryption
Data in transit protection
22
It is Time to Protect Your Enterprise Apps with AppDome
Protect your app from cyber attacks
Dynamic App Fusion within minutes
Compliance with regulations
Thank You!
2
3

More Related Content

What's hot

Security News Bytes
Security News BytesSecurity News Bytes
Security News BytesRaghunath G
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017Bill Chamberlin
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerIBM Security
 
Case Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicCase Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicIBM Security
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessIBM Security
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat ManagementKillian Delaney
 
Mobile's influence on IAM
Mobile's influence on IAMMobile's influence on IAM
Mobile's influence on IAMAbhinaw Kumar
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection securityIBM Security
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionNagarro
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerThierry Matusiak
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Manjula security for startups
Manjula security for startupsManjula security for startups
Manjula security for startupsKesava Reddy
 

What's hot (20)

Security News Bytes
Security News BytesSecurity News Bytes
Security News Bytes
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
 
Case Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographicCase Closed with IBM Application Security on Cloud infographic
Case Closed with IBM Application Security on Cloud infographic
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
Mobile's influence on IAM
Mobile's influence on IAMMobile's influence on IAM
Mobile's influence on IAM
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection security
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Manjula security for startups
Manjula security for startupsManjula security for startups
Manjula security for startups
 

Similar to Appaloosa & AppDome: deploy & protect mobile applications

Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSubho Halder
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOPDevConFu
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017TecsyntSolutions
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...anuragsinghal1981
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech applicationnimbleappgenie
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlTech Mahindra
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxArrow ECS UK
 
Tips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfTips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfFuGenx Technologies
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfvenkatprasadvadla1
 

Similar to Appaloosa & AppDome: deploy & protect mobile applications (20)

Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest Version
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security Control
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptx
 
Tips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfTips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdf
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdf
 

Appaloosa & AppDome: deploy & protect mobile applications

  • 1. Simple & secure Enterprise App Store Mobile Application Protection & Enhancement +
  • 2. > Presenters: +Julien Ott, CEO – Appaloosa +Amit Lavi, VP Product - AppDome > Topics +Joint solution presentation +Focus on AppDome features & demo +Q&A Agenda
  • 3. Appaloosa & AppDome are partnering to help companies distribute and protect enterprise mobile apps without MDM. Overview
  • 4. Appaloosa >Established in 2014 by a team of experts in digital consulting >Part of OCTO Technology, founded in 1998. >Identified as leader by Gartner in Mobile Application Management >Delivered 4M apps to 170k+ enterprise users >Appaloosa.io Company profiles AppDome >Established in 2012 by a team of industry leaders in enterprise mobility & cybersecurity >Unmatched mobile App Fusion technology works on iOS and Android >Gartner’s Cool Vendor for Mobile Security >Key Investors: Menlo Ventures, JVP, Draper Nexus >Appdome.com
  • 5. Upload any iOS/Android app on Appaloosa and get AppDome protection within minutes before distribution. 31 4 How it works 2 Your app AppDome AppFusion Appaloosa Dashboard Appaloosa App Store
  • 6. > Add features to your app in minutes without code change > Features +Auto-upgrade: when the end-user launches the app and a new version is available, upgrade will be performed +Blacklist: prevents a lost/stolen device or terminated user from launching your app +Analytics: collect detailed usage stats about user activity, views, network +Root/Jailbreak: prevent the launch of apps on rooted or jailbroken devices Automated Appaloosa SDK fusion
  • 7. Deploy apps with enterprise authentication to protect access to the store and apps Measure app adoption and engagement for each release Improve your next version with feedback and comments Joint Benefits for Appaloosa+AppDome Automatic fusion of Appaloosa SDK into mobile app without a need for integration Top notch security, fusion protects from cyber attacks e.g. data leakage, man-in-the-middle, phishing, malware, reverse engineering Short time to market – Fusion process is done in minutes not months 7 MIN
  • 8. 8 8AppDome| Overview & Team Israeli startup established in 2012 by a team of industry leaders in cybersecurity
  • 9. 9 9 Simple & Secure Enterprise Store + The Leading Mobile App Protection & Enhancement Fuse & Use
  • 10. 10 The Pain | Market Examples Leading US Financial Institution – Consumer Mobile BankingApplication Mobile is the new competitive battlefield (bank branches are becoming irrelevant) Bank’s mobile application exposed by platform and SDKs vulnerabilities to confidential customer information leakage and circumvention Potential $$ effect from a publicized breach and fraud – Huge (e.g. Target’s breach) Significant investment in secure coding practices; However…
  • 11. 11 Secure Coding Functionality UI/UX Mobile Bank App Priorities Dilemma| Security vs. UX Guard against introduction of security vulnerabilities (bugs & logic flaws) during mobile application development (e.g. SSL, authentication) Secure Coding Practices
  • 12. 12 Cyber Security Attack vectors include: o OS vulnerabilities o Malicious Wi-Fi / cell attacks o Vulnerable plugins / SDKs o Known & unknown financial malwares Cyber Security Gap cannot be addressed by Secure Coding. Secure Coding Functionality UI/UX Mobile Application Security | Challenges
  • 13. 13 Cyber Security Cyber Security Gap cannot be addressed by Secure Coding. Secure Coding Functionality UI/UX Financial Mobile Application Security | Challenges Out of hundreds of tested mobile apps 40% found vulnerable for data at rest and data in transit attacks
  • 14. 14 In the News MAN IN THE MIDDLE EXPOSED DATA IMPERSONATION IMPERSONATION EXPOSED DATA MAN IN THE MIDDLE EXPOSED DATA MAN IN THE MIDDLE EXPOSED DATA IMPERSONATION IMPERSONATION EXPOSED DATA MAN IN THE MIDDLEEXPOSED DATA MAN IN THE MIDDLE EXPOSED DATA IMPERSONATION IMPERSONATION EXPOSED DATA MAN IN THE MIDDLE EXPOSED DATA
  • 15. 15 Attack Vector Example | Man-in-The-Middle Fake Wi-Fi Fake Cell Social Engineering Malware
  • 16. 16 Operating System Libraries Attack Vector Example | Data-at-rest o Mobile apps are composed of binaries and resources, such as user interface and graphics o Despite application container architecture (Sandbox…) § Data moving acrossinterfaces and in storage is accessible to maliciouscode § Data in storage can be compromised from inside as well as from outside the device
  • 17. 17 Employees Facing Apps Protect mobile apps from: o Multilayer Protection o No code change to the app – o Outside development lifecycle o Fuse & Use - Protect in minutes not months o Facilitates regulatory compliance Gain benefit of: o Mobile Fraud o Phishing o Data Pharming o Malware and mRAT usingApp Fusion. Enterprise Apps
  • 18. 18 AppDome | Multilayer Protection Feature Matrix Traffic Locker Session Content Behavioral Anomalies Encryption Integrity Authentication Core Secured Session Pharming Protection Proactive Root Detection Adaptive Secured Storage App Integrity Security Passphrase Advanced Zero-day Malware Protection Backup Protection Second Factor Authentication Phishing Blocker Defacing Protection Screen Blurring
  • 19. 19 AppDome SaaS Service 1 9 Customer / Enterprise Facing App Development 7 MIN AppDomeTM Protection Dynamic Fusion Up to 7 min via an Integrated Web Service Distributing via Online Stores AppDome Protection Layer Libraries
  • 21. 21 AppDome Secure Coding Functionality UI/UX AppDome | DynamicApp Fusion Benefits 2 1No SDK Integration High performance Dynamic App Fusion Short time to market Bridging the gap between Functionality and Security for existing and newly developed appsSecurity Features Integrated by App Fusion Intrusion and malware detection Data at rest encryption Data in transit protection
  • 22. 22 It is Time to Protect Your Enterprise Apps with AppDome Protect your app from cyber attacks Dynamic App Fusion within minutes Compliance with regulations