Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Check point

131 views

Published on

security

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Check point

  1. 1. WITH CH ECK P OINT S ANDB L AST MOB IL E PROTECT YOUR ENTERPRISE FROM THE NEXT SECURITY BREACH: MOBILE DEVICES Nikita Durov Security Engineers Manager Check Point Software Russia & CIS ndurov@checkpoint.com
  2. 2. ”Our supplier claims we didn’t pay them for the last two orders, a total of $520,000!” ”Yes we did, we transferred the money to their new bank account” CFO: “Their new what?!”CEO: A global healthcare company providing medical solutions CEO: CASE I Fictitious company, inspired by Gooligan malware
  3. 3. THE WHALE SCAM BANK Sent mail asking to transfer the money to a new bank account, controlled by the hacker Money transferred to the hackers' bank account Purchasing manager's 8 year old son downloaded a malicious app to his dad’s BYOD mobile device 1 MONTH EARLIER App was infected and contained corporate email credentials USER PASSWORD Hackers learn about the relationship with the supplier Compromised business email accounts have cost companies more than $2.3 billion in losses over the past three years source: www.fbi.gov
  4. 4. THE HACKERS CAN: Access corporate file servers Infect corporate computers by sending internal malicious emails Access the data center after obtaining VPN credentials from corporate helpdesk
  5. 5. PUBLIC COMPANY’S STOCK PRICES SUDDENLY DROP CASE II *a fictitious story inspired by actual cases
  6. 6. 3 WEEKS EARLIER… Hackers tapped into the CFO’s device Hackers recorded the quarterly results discussed at a board meeting before the public announcement CFO downloaded a malicious conference app by scanning a QR code
  7. 7. • On and connected as needed • Primary use: business • Attack vector: malicious files • 24/7 on, connected, with you constantly • Primary uses: personal and business • Attack vector: Malicious apps MOBILE IS MORE VULNERABLE AND LESS PROTECTED THAN PCs PROTECTION • Anti-virus • Network protection PROTECTION Most organizations today do not have any cyber protection for mobile devices VULNERABILITY LEVEL ? MOBILE PC
  8. 8. MOBILE IS THE NEW WINDOW INTO CORPORATE NETWORKS
  9. 9. of organizations already 80% Source: 2016 BYOD and Mobile Security Report, Crowd Research Partners ADOPTED BYOD programs or plan to adopt in the next 12 months HOW DO YOU PROTECT YOUR NETWORK FROM MOBILE THREATS?
  10. 10. HOW MOBILE DEVICES ARE INFECTED?
  11. 11. MOBILE’S UNIQUE ATTACK VECTORS Infected Apps Network Attacks OS Exploits SMS Attacks
  12. 12. DAMAGES Intercepting text messages Stealing passwords Taking photos Microphone recordings Stealing contact lists Stealing email Tracking location Breaking into corporate network
  13. 13. OF ALL ORGANIZATIONS ARE INFECTED WITH MOBILE MALWARE Source: Check Point Mobile Threat Prevention | N=850 Check Point customers, each protecting more than 500 devices 100% Averaged 35 jailbroken or rooted devices 74% 89% Experienced a man-in-the-middle attack over Wi-Fi
  14. 14. UNIQUE CHALLENGES REQUIRE UNIQUE SOLUTIONS
  15. 15. ZERO DAY PROTECTION FOR MOBILE DEVICES
  16. 16. SANDBLAST MOBILE Complete threat detection and mitigation Best mobile threat catch rate Full visibility Simple deployment
  17. 17. HOW IT WORKSHOW IT WORKS APP ANALYSIS (INFECTED APPS) CLOUD-BASED BEHAVIORAL RISK ENGINE ON DEVICE DETECTION OS EXPLOITS (JAILBREAK/ROOT) NETWORK ATTACKS (WIFI) SMS ATTACKS REAL-TIME INTELLIGENCE, MONITORING AND CONTROL
  18. 18. * Source: Miercom March 2017 (tests included: Known, Unknown Modified, Unknown Zero-day, False Positives, and iOS) ** Lookout, Zimperium and Better Mobile were unwilling to participate in the test BEST MALICIOUS APPS CATCH RATE 100% 89% 63% 42% INDUSTRY AVERAGE Sandblast Mobile Malicious Application Detection Efficiency
  19. 19. 19©2016 Check Point Software Technologies Ltd. 11 3 3 1 14 9 2 1 LARGEST NUMBER OF ZERO DAYS DISCOVERED 2015-JAN 2017 GOOGLE SECURITY HALL OF FAME SC MEDIA TOP 25 THREAT SEEKERS 2016 MITRE CVE AUTHORITY Vulnerabilities Malware Check Point Lookout Zimperium Skycure
  20. 20. 500,000,000+ Malicious file hashes and sites 250,000,000 C & C addresses 11,000,000 Malware behavioral signatures The world’s largest IoC database Daily inputs from traffic across 100K security gateways world wide THE CHECK POINT ADVANTAGE
  21. 21. VISIBILITY FULL
  22. 22. SIMPLE TO DEPLOY Integration with all leading EMM platforms and containers Cloud base SaaS solution Without impacting usability: No impact on battery life Complete end user privacy
  23. 23. Container EMM 1,200 Devices BYOD 400 CHECK POINT CUSTOMER CASE STUDY
  24. 24. INFECTED DEVICES DETECTED Credential Stealers Unauthorized Root Kits mRATs Keystroke Loggers
  25. 25. Devices quarantined by EMM SOLUTION Sandblast Mobile + EMM + secure container integration Sandblast Mobile detected infected devices
  26. 26. SUMMARY MOBILE CYBER THREATS ARE ON THE RISE EMPLOYEES’ MOBILE DEVICES ARE WEAKEST LINK IN ANY IT INFRASTRUCTURE CHECK POINT PROTECTS YOUR DEVICES FROM ADVANCED MOBILE THREATS
  27. 27. WITH CHECK POINT SANDBLAST MOBILE PROTECT YOUR ENTERPRISE AGAINST MOBILE THREATS Nikita Durov Security Engineers Manager Check Point Software Russia & CIS ndurov@checkpoint.com Thank you
  28. 28. APPENDIX SLIDES
  29. 29. 2014 20162015 GodlessGhost Push* Turkish Clicker HummingBad DressCode Gooligan Quadrooter.C CVE-2016-2059 Quadrooter.A CVE-2016-2503 Quadrooter.B CVE-2016-2504 Quadrooter.D CVE-2016-5340 Source: Google Android Security 2016 Year In Review*Partially Check Point : BrainTest, Sept 2015 = DISCOVERED BY CHECK POINT GOOGLE ANDROID SECURITY 2016 REPORT 70% OF THE THREATS WERE FIRST DISCOVERED BY CHECK POINT CVE-2015-1805 Dirty Cow ATTACKS VULNERABILITIES APRFEB JUN JULY AUG OCT NOVJANOCT data transmission Adups CVE-2015-1805

×