SlideShare a Scribd company logo
WITH CHECK POIN T
SANDBL AST MOBILE
PROTECT YOUR ENTERPRISE
FROM THE NEXT SECURITY BREACH:
MOBILE DEVICES
”Our supplier claims we
didn’t pay them for the last two
orders, a total of $520,000!”
”Yes we did, we transferred the
money to their new bank account”
CFO:
“Their new what?!”CEO:
A global healthcare company
providing medical solutions
CEO:
CASE I
Fictitious company, inspired by Gooligan malware
THE WHALE SCAM
BANK
Sent mail asking to
transfer the money to a
new bank account,
controlled by the hacker
Money transferred to
the hackers' bank
account
Purchasing manager's 8
year old son downloaded
a malicious app to his
dad’s BYOD mobile
device
1 MONTH EARLIER
App was infected and
compromised the
corporate email
credentials
USER
PASSWORD
Hackers learn about
the relationship with
the supplier
Compromised business email accounts
have cost companies more than $2.3
billion in losses over the past three years
source: www.fbi.gov
THE HACKERS CAN:
Access
corporate file
servers
Infect corporate
computers by sending
internal malicious emails
Access the data center
after obtaining VPN
credentials from
corporate helpdesk
PUBLIC COMPANY’S STOCK
PRICES SUDDENLY DROP
CASE II
*a fictitious story inspired by actual cases
3 WEEKS EARLIER…
Hackers tapped into
the CFO’s device
Hackers recorded the
quarterly results discussed
at a board meeting before
the public announcement
CFO downloaded a
malicious conference
app by scanning a
QR code
• On and connected as needed
• Primary use: business
• Attack vector: malicious files
• 24/7 on, connected, with you constantly
• Primary uses: personal and business
• Attack vector: Malicious apps
MOBILE IS MORE VULNERABLE AND LESS PROTECTED THAN PCs
PROTECTION
• Anti-malware
• Network protection
PROTECTION
Most organizations today do not have
any cyber protection for mobile devices
VULNERABILITY LEVEL
?
MOBILE
PC
MOBILE IS THE
NEW WINDOW
INTO CORPORATE
NETWORKS
HOW MOBILE DEVICES
ARE INFECTED?
MOBILE’S UNIQUE
ATTACK VECTORS
Infected Apps
Network Attacks
OS Exploits
SMS Attacks
DAMAGES
Intercepting
text messages
Stealing
passwords
Taking
photos
Microphone
recordings
Stealing
contact lists
Stealing
email
Tracking
location
Breaking into
corporate network
OF ALL
ORGANIZATIONS
ARE INFECTED WITH
MOBILE MALWARE
Source: Check Point Mobile Threat Prevention | N=850 Check Point customers, each protecting more than 500 devices
100%
Averaged 35
jailbroken or
rooted devices
75% 89%
Experienced a
man-in-the-middle
attack over Wi-Fi
APT 28 (FANCY-BEAR)
3 DIFFERENT MALWARE – SAME C&C BACKEND AND IOCs
NATOUKRAINE ARMYDNCTARGETS:
UNIQUE CHALLENGES
REQUIRE
UNIQUE SOLUTIONS
THE CYBER SECURITY ARCHITECTURE OF THE FUTURE
THE FIRST CONSOLIDATED SECURITY SOLUTION ACROSS
NETWORKS, CLOUD, AND MOBILE, PROVIDING THE HIGHEST LEVEL
OF THREAT PREVENTION.
NGTX GATEWAYS
Perimeter and Datacenter
protection
SANDBLAST AGENT
Endpoint and Browsers
protection
SANDBLAST CLOUD
Cloud Applications
protection
SANDBLAST API
Custom applications
protection
SHARING COMMON INTELLIGENCE AND THREAT MANAGEMENT
THE FIRST AND ONLY UNIFIED
CROSS-PLATFORM THREAT PREVENTION
Mobile Device
protection
SANDBLAST MOBILE
M O B I L E
ZERO DAY PROTECTION FOR MOBILE DEVICES
SANDBLAST
MOBILE
Complete threat detection
and mitigation
Best mobile threat
catch rate
Full visibility
Simple deployment
HOW IT WORKSHOW IT WORKS
APP ANALYSIS
(INFECTED APPS)
CLOUD-BASED
BEHAVIORAL RISK ENGINE
ON DEVICE DETECTION
OS EXPLOITS
(JAILBREAK/ROOT)
NETWORK
ATTACKS
(WIFI)
SMS ATTACKS
REAL-TIME INTELLIGENCE,
MONITORING AND CONTROL
HOW IT WORKSHOW IT WORKS
APP ANALYSIS
(INFECTED APPS)
CLOUD-BASED
BEHAVIORAL RISK ENGINE
ON DEVICE DETECTION
OS EXPLOITS
(JAILBREAK/ROOT)
NETWORK
ATTACKS
(WIFI)
SMS ATTACKS
REAL-TIME INTELLIGENCE,
MONITORING AND CONTROL
500,000,000+
Malicious file hashes
and sites
250,000,000
C & C addresses
11,000,000
Malware behavioral
signatures
The world’s largest
IoC database
Daily inputs from traffic across 100K
security gateways world wide
THE CHECK POINT ADVANTAGE
* Source: Miercom March 2017 (tests included: Known, Unknown Modified, Unknown Zero-day, False Positives, and iOS)
** Lookout, Zimperium and Better Mobile were unwilling to participate in the test
BEST MALICIOUS APPS CATCH RATE
100%
89%
63%
42%
INDUSTRY
AVERAGE
Sandblast Mobile Malicious Application Detection Efficiency
24©2016 Check Point Software Technologies Ltd.
11
3 3
1
14
9
2
1
LARGEST NUMBER OF ZERO DAYS DISCOVERED
2015-JAN 2017
GOOGLE SECURITY
HALL OF FAME
SC MEDIA TOP 25
THREAT SEEKERS 2016
MITRE CVE
AUTHORITY
Vulnerabilities Malware
Check Point Lookout Zimperium Skycure
25©2016 Check Point Software Technologies Ltd.
2014 20162015
GodlessGhost Push* Turkish Clicker HummingBad DressCode Gooligan
Quadrooter.C
CVE-2016-2059
Quadrooter.A
CVE-2016-2503
Quadrooter.B
CVE-2016-2504
Quadrooter.D
CVE-2016-5340
= DISCOVERED BY CHECK POINT
Source: Google Android Security 2016 Year In Review
CVE-2015-1805
Dirty Cow
ATTACKS
VULNERABILITIES
APRFEB JUN JULY AUG OCT NOVJANOCT
data transmission
Adups
CVE-2015-1805
GOOGLE ANDROID SECURITY 2016 REPORT
70% OF THE THREATS WERE FIRST DISCOVERED BY CHECK POINT
*Partially Check Point : BrainTest, Sept 2015
SANDBLAST MOBILE:
INTRODUCING
FIRST-OF-ITS-KIND
PROTECTION AGAINST
SMS ATTACKS
27©2016 Check Point Software Technologies Ltd.
INDUSTRY’S WIDEST SET OF MOBILE INTEGRATIONS
NEW!
VISIBILITY
FULL
SIMPLE TO DEPLOY
Integration with all leading
EMM platforms and containers
Cloud base SaaS solution
Without impacting usability:
No impact on battery life
Complete end user privacy
SUMMARY
MOBILE CYBER THREATS
ARE ON THE RISE
EMPLOYEES’ MOBILE
DEVICES ARE WEAKEST LINK
IN ANY IT INFRASTRUCTURE
CHECK POINT PROTECTS
YOUR DEVICES FROM
ADVANCED MOBILE THREATS
WITH CHECK POINT
SANDBLAST MOBILE
PROTECT YOUR ENTERPRISE AGAINST
MOBILE THREATS

More Related Content

What's hot

2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
e-Xpert Solutions SA
 
Protecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero ToleranceProtecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero Tolerance
Check Point Software Technologies
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey מוטי שגיא
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat Prevention
MarketingArrowECS_CZ
 
Ecosystem
EcosystemEcosystem
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
Moti Sagey מוטי שגיא
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
Moti Sagey מוטי שגיא
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
e-Xpert Solutions SA
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
Check point Infinity Overview
Check point Infinity OverviewCheck point Infinity Overview
Check point Infinity Overview
Moti Sagey מוטי שגיא
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
MarketingArrowECS_CZ
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Skybox Security
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
Rahul Neel Mani
 
SandBlast Agent
SandBlast AgentSandBlast Agent
SandBlast Agent
MarketingArrowECS_CZ
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
MarketingArrowECS_CZ
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
Moti Sagey מוטי שגיא
 
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
Skycure
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
Group of company MUK
 

What's hot (20)

2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
 
Protecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero ToleranceProtecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero Tolerance
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat Prevention
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Check point Infinity Overview
Check point Infinity OverviewCheck point Infinity Overview
Check point Infinity Overview
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
SandBlast Agent
SandBlast AgentSandBlast Agent
SandBlast Agent
 
Cyber intro 2017_hebrew
Cyber intro 2017_hebrew Cyber intro 2017_hebrew
Cyber intro 2017_hebrew
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
 
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 

Similar to Are You Prepared for the Next Mobile Attack?

Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
MarketingArrowECS_CZ
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
TestingXperts
 
Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015
Cybernetic Global Intelligence
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
IBM Security
 
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
IBM Sverige
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
GGV Capital
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
Fibonalabs
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec Technology and Consulting
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
Mastel Indonesia
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
Skycure
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
Kavita Rastogi
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
Mark Gibson
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon Berlin
 
CyberDen 2020
CyberDen 2020CyberDen 2020
CyberDen 2020
Fahad Al-Hasan
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
Vertex Holdings
 
Distil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryDistil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony Industry
Paul Hobbs
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
Juniper Networks
 
Check Point Infinity
Check Point Infinity Check Point Infinity
Check Point Infinity
Alexander Kravchenko
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
moldovaictsummit2016
 

Similar to Are You Prepared for the Next Mobile Attack? (20)

Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 
CyberDen 2020
CyberDen 2020CyberDen 2020
CyberDen 2020
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Distil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryDistil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony Industry
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Check Point Infinity
Check Point Infinity Check Point Infinity
Check Point Infinity
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Are You Prepared for the Next Mobile Attack?

  • 1. WITH CHECK POIN T SANDBL AST MOBILE PROTECT YOUR ENTERPRISE FROM THE NEXT SECURITY BREACH: MOBILE DEVICES
  • 2. ”Our supplier claims we didn’t pay them for the last two orders, a total of $520,000!” ”Yes we did, we transferred the money to their new bank account” CFO: “Their new what?!”CEO: A global healthcare company providing medical solutions CEO: CASE I Fictitious company, inspired by Gooligan malware
  • 3. THE WHALE SCAM BANK Sent mail asking to transfer the money to a new bank account, controlled by the hacker Money transferred to the hackers' bank account Purchasing manager's 8 year old son downloaded a malicious app to his dad’s BYOD mobile device 1 MONTH EARLIER App was infected and compromised the corporate email credentials USER PASSWORD Hackers learn about the relationship with the supplier Compromised business email accounts have cost companies more than $2.3 billion in losses over the past three years source: www.fbi.gov
  • 4. THE HACKERS CAN: Access corporate file servers Infect corporate computers by sending internal malicious emails Access the data center after obtaining VPN credentials from corporate helpdesk
  • 5. PUBLIC COMPANY’S STOCK PRICES SUDDENLY DROP CASE II *a fictitious story inspired by actual cases
  • 6. 3 WEEKS EARLIER… Hackers tapped into the CFO’s device Hackers recorded the quarterly results discussed at a board meeting before the public announcement CFO downloaded a malicious conference app by scanning a QR code
  • 7. • On and connected as needed • Primary use: business • Attack vector: malicious files • 24/7 on, connected, with you constantly • Primary uses: personal and business • Attack vector: Malicious apps MOBILE IS MORE VULNERABLE AND LESS PROTECTED THAN PCs PROTECTION • Anti-malware • Network protection PROTECTION Most organizations today do not have any cyber protection for mobile devices VULNERABILITY LEVEL ? MOBILE PC
  • 8. MOBILE IS THE NEW WINDOW INTO CORPORATE NETWORKS
  • 10. MOBILE’S UNIQUE ATTACK VECTORS Infected Apps Network Attacks OS Exploits SMS Attacks
  • 12. OF ALL ORGANIZATIONS ARE INFECTED WITH MOBILE MALWARE Source: Check Point Mobile Threat Prevention | N=850 Check Point customers, each protecting more than 500 devices 100% Averaged 35 jailbroken or rooted devices 75% 89% Experienced a man-in-the-middle attack over Wi-Fi
  • 13. APT 28 (FANCY-BEAR) 3 DIFFERENT MALWARE – SAME C&C BACKEND AND IOCs NATOUKRAINE ARMYDNCTARGETS:
  • 15. THE CYBER SECURITY ARCHITECTURE OF THE FUTURE THE FIRST CONSOLIDATED SECURITY SOLUTION ACROSS NETWORKS, CLOUD, AND MOBILE, PROVIDING THE HIGHEST LEVEL OF THREAT PREVENTION.
  • 16. NGTX GATEWAYS Perimeter and Datacenter protection SANDBLAST AGENT Endpoint and Browsers protection SANDBLAST CLOUD Cloud Applications protection SANDBLAST API Custom applications protection SHARING COMMON INTELLIGENCE AND THREAT MANAGEMENT THE FIRST AND ONLY UNIFIED CROSS-PLATFORM THREAT PREVENTION Mobile Device protection SANDBLAST MOBILE M O B I L E
  • 17. ZERO DAY PROTECTION FOR MOBILE DEVICES
  • 18. SANDBLAST MOBILE Complete threat detection and mitigation Best mobile threat catch rate Full visibility Simple deployment
  • 19. HOW IT WORKSHOW IT WORKS APP ANALYSIS (INFECTED APPS) CLOUD-BASED BEHAVIORAL RISK ENGINE ON DEVICE DETECTION OS EXPLOITS (JAILBREAK/ROOT) NETWORK ATTACKS (WIFI) SMS ATTACKS REAL-TIME INTELLIGENCE, MONITORING AND CONTROL
  • 20. HOW IT WORKSHOW IT WORKS APP ANALYSIS (INFECTED APPS) CLOUD-BASED BEHAVIORAL RISK ENGINE ON DEVICE DETECTION OS EXPLOITS (JAILBREAK/ROOT) NETWORK ATTACKS (WIFI) SMS ATTACKS REAL-TIME INTELLIGENCE, MONITORING AND CONTROL
  • 21. 500,000,000+ Malicious file hashes and sites 250,000,000 C & C addresses 11,000,000 Malware behavioral signatures The world’s largest IoC database Daily inputs from traffic across 100K security gateways world wide THE CHECK POINT ADVANTAGE
  • 22. * Source: Miercom March 2017 (tests included: Known, Unknown Modified, Unknown Zero-day, False Positives, and iOS) ** Lookout, Zimperium and Better Mobile were unwilling to participate in the test BEST MALICIOUS APPS CATCH RATE 100% 89% 63% 42% INDUSTRY AVERAGE Sandblast Mobile Malicious Application Detection Efficiency
  • 23. 24©2016 Check Point Software Technologies Ltd. 11 3 3 1 14 9 2 1 LARGEST NUMBER OF ZERO DAYS DISCOVERED 2015-JAN 2017 GOOGLE SECURITY HALL OF FAME SC MEDIA TOP 25 THREAT SEEKERS 2016 MITRE CVE AUTHORITY Vulnerabilities Malware Check Point Lookout Zimperium Skycure
  • 24. 25©2016 Check Point Software Technologies Ltd. 2014 20162015 GodlessGhost Push* Turkish Clicker HummingBad DressCode Gooligan Quadrooter.C CVE-2016-2059 Quadrooter.A CVE-2016-2503 Quadrooter.B CVE-2016-2504 Quadrooter.D CVE-2016-5340 = DISCOVERED BY CHECK POINT Source: Google Android Security 2016 Year In Review CVE-2015-1805 Dirty Cow ATTACKS VULNERABILITIES APRFEB JUN JULY AUG OCT NOVJANOCT data transmission Adups CVE-2015-1805 GOOGLE ANDROID SECURITY 2016 REPORT 70% OF THE THREATS WERE FIRST DISCOVERED BY CHECK POINT *Partially Check Point : BrainTest, Sept 2015
  • 26. 27©2016 Check Point Software Technologies Ltd. INDUSTRY’S WIDEST SET OF MOBILE INTEGRATIONS NEW!
  • 28. SIMPLE TO DEPLOY Integration with all leading EMM platforms and containers Cloud base SaaS solution Without impacting usability: No impact on battery life Complete end user privacy
  • 29. SUMMARY MOBILE CYBER THREATS ARE ON THE RISE EMPLOYEES’ MOBILE DEVICES ARE WEAKEST LINK IN ANY IT INFRASTRUCTURE CHECK POINT PROTECTS YOUR DEVICES FROM ADVANCED MOBILE THREATS
  • 30. WITH CHECK POINT SANDBLAST MOBILE PROTECT YOUR ENTERPRISE AGAINST MOBILE THREATS