SlideShare a Scribd company logo
Securely Enabling Business



    Enterprise Mobility
       Overview
             Business executives are driving the decision to utilize mobile devices throughout their enterprise due to the devices ability to provide greater
             productivity, availability, flexibility, and convenience. Such decisions are forcing IT professionals to quickly find solutions to protect their
             companies’ greatest assets. Mobile devices process and store large amounts of data, remotely access proprietary information, and perform
             most processor-intensive tasks. As the use of these devices increases so does the exposure to risks and vulnerabilities. In order to ensure the
             security and integrity of mobile devices, businesses must take adequate measures.



       Offerings
       99Mobile Security Roadmap                                                    99Mobile Application Security

             FishNet Security has worked with enterprise customers to                         Mobile Design (Architecture) Review
             develop a strategic direction as it relates to mobile security.
                                                                                                   • High-level examination of application artifacts such
             FishNet Security mobile security strategic road map reviews
                                                                                                      as security requirements, secure development
             the current state and provide recommendation based on
                                                                                                      standards, and specific application specifications to
             compliance and industry standards for the following:
                                                                                                      ensure security has been implemented throughout
                      • Security policies as it relates to mobile security                            the development lifecycle of the mobile application.
                      • Mobile security business and technical requirements                         • Identify weaknesses in proposed
                                                                                                      design, and recommend appropriate
                      • Mobile remote access and VDI integration                                      countermeasures to mitigate threats.
                      • Strong Authentication
                                                                                              Mobile Application Threat Modeling
       99Mobile Security Policy Development                                                        • Comprehensive threat assessment delivered with
                                                                                                      FishNet Security’s proven, STRIDE-based methodology
             FishNet Security’s Mobile Security Policy Development is                              • Determine data flows and examine
             designed to help our clients meet the unique challenges posed                            entry and exit points in the application,
             by the evolving space of mobile device platforms. Organizations                          exposing opportunities to subvert security
             are becoming more reliant on mobile computing platforms                                  controls. Recommend countermeasures to
             every day introducing additional risk and considerations for                             eliminate threats and vulnerabilities.
             security. FishNet Security’s consultants understand the business
             drivers and need for mobile computing platforms as well as the
                                                                                              Mobile Application Security Assessment
             nuances to development and maintenance of mobile security
             policies, standards and procedures. FishNet Security can help                         • Analysis of a mobile application’s security posture
             organizations meet their mobile security documentation needs by:                         within a run-time environment on its native platform,
                                                                                                      focused on identifying security vulnerabilities, insecure
                      • Developing, evaluating and enhancing existing                                 configuration and other threats.
                         policies, standards and procedures
                      • Maturing mobile security documentation                                Mobile Application Security Code Review
                         lifecycle management                                                      • Examine applications at the code-level, and
                      • Identify and document potential                                               identify hard-to-find technical bugs that can
                         risks within security policy                                                 be missed in run-time assessments.
             Regardless of the current state of mobile security in your                            • Identify logic flaws and other weaknesses that
             organization, FishNet Security offers several key services to help                       are impossible to locate and analyze without
             ensure that your documentation is established to enable your                             access to the application’s source code.
             business and ensure regulatory or industry specific compliance.




                                                                                                                                                     ID#12SS0040
                                                                                                                                      Last Modified 06.20.2012
Corporate Headquarters | 6130 Sprint Parkway | Ste. 400 | Overland Park, KS 66211 | 888.732.9406                     © 2011 FishNet Security. All rights reserved.
Enterprise Mobility
      Offerings (continued)
      99Mobile Vulnerability Assessment and                                              Mobile Device Remote Access
          Penetration Testing                                                            Customers have the desire to provide connectivity to internal
                                                                                         application through mobile devices. Often times these
               Mobile Architecture and Design Assessment                                 application have sensitive information that needs access
                    • Analyze the infrastructure and security practices                  through remote access solution. FishNet Security has an
                       within the architecture and design.                               extensive product portfolio to support the mobile workforce,
                Mobile Client and Server Penetration Testing                             which consists of the following:

                    • Use various methods to test and evaluate                                • F5 Edge SSL VPN
                       the vulnerabilities of the mobile device and                           • Juniper SA and JUNOS Pulse
                       the backend servers that control them.                                 • Citrix
               Mobile Vulnerability Assessment                                                • VMware VDI
                    • Test the security of the mobile device from an end
                                                                                 99Mobile Security Awareness Training
                       user’s perspective to determine if the mobile device
                       could allow leakage of confidential data, denial of                    • Teach your work force “Mobile Security Best Practices”
                       service or other attacks.
                                                                                              • Teach employees corporate security policy
                                                                                                   for mobile devices on their handheld
      99Mobile Security Strategy Assessment                                                   • Rich Expert Learning Content
            Mobile device management (MDM) is a technology that monitors,                     • Fingertip Compliance
            supports, and manages mobile devices, securing them from                          • Complete Quizzing and Metrics
            external attacks. MDM technologies are a first line of defense for                • Anytime, Anywhere Training Solution
            mobile assets.

            Properly deployed MDM enables IT professionals to optimize and       99Mobile Forensics
            protect complex, constantly-evolving mobile environments
            while minimizing cost and downtime.                                      Mobile phone forensics is the science of retrieving data from a
                                                                                     mobile phone under forensically sound conditions. This includes
               MDM Design and Integration                                            data retrieval and data examination found on the SIM/USIM, the
                    • Review current architecture and technologies                   phone body itself, and memory cards. Data retrieved and examined
                       related to MDM/MDP for mobile devices                         can include images, videos, text or SMS messages, call times, and
                    • Identify technical and regulatory requirements                 contact numbers
                       as it relates to mobile devices.
                                                                                     Once forensic investigation is completed, a formal report is
               MDM Technology Partnerships:                                          provided. The final report summarizes the purpose of the
                    • Good Technologies                                              engagement including, tasks requested, keywords provided,
                    • McAfee EMM                                                     outline of collection methodology, details of analysis, and findings
                                                                                     of the investigation.
                    • Juniper SSL VPN with Junos Pulse and SMovile for MDM
                    • Mobile Iron




   About FishNet Security
   We Focus on the Threat so You can Focus on the Opportunity.
   Committed to security excellence, FishNet Security is the #1 provider of information security solutions that combine
   technology, services, support, and training. FishNet Security solutions have enabled 4,000 clients to better manage
   risk, meet compliance requirements, and reduce cost while maximizing security effectiveness and operational
   efficiency. For more information on FishNet Security, Inc., visit www.fishnetsecurity.com.

                                                                                                                                                 ID#12SS0040
                                                                                                                                  Last Modified 06.20.2012
Corporate Headquarters | 6130 Sprint Parkway | Ste. 400 | Overland Park, KS 66211 | 888.732.9406                 © 2011 FishNet Security. All rights reserved.

More Related Content

What's hot

Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
IBM Danmark
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Bob Rhubart
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
Anindya Ghosh,
 
CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1
Ian Sommerville
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Bob Rhubart
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
Sophos
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural Decisions
Peter Rawsthorne
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
Denim Group
 
Use GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouUse GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With You
CameronTait3
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Ivanti
 
Testing cloud services - EuroSTAR
Testing cloud services - EuroSTARTesting cloud services - EuroSTAR
Testing cloud services - EuroSTAR
Jeroen Mengerink
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
MobileIron
 
Secure on demand from cdg
Secure on demand from cdgSecure on demand from cdg
Secure on demand from cdg
Shekar N.
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
Ivanti
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identity Defined Security Alliance
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
Symantec
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
Zsolt Nemeth
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
Symantec
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
Symantec
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
Zsolt Nemeth
 

What's hot (20)

Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural Decisions
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
Use GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouUse GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With You
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
Testing cloud services - EuroSTAR
Testing cloud services - EuroSTARTesting cloud services - EuroSTAR
Testing cloud services - EuroSTAR
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Secure on demand from cdg
Secure on demand from cdgSecure on demand from cdg
Secure on demand from cdg
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 

Viewers also liked

GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate Overview
Tawnia Beckwith
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
Tawnia Beckwith
 
Threat Detect Hipaa Compliance
Threat Detect Hipaa ComplianceThreat Detect Hipaa Compliance
Threat Detect Hipaa Compliance
tbeckwith
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
Santosh Satam
 
Dust identification & suppression systems
Dust identification & suppression systemsDust identification & suppression systems
Dust identification & suppression systems
Saptarshi Jana
 
Identity Access Management Fishnet Security
Identity Access Management Fishnet SecurityIdentity Access Management Fishnet Security
Identity Access Management Fishnet Security
tbeckwith
 
Hipaa Gap Assessment.Sanitized Report
Hipaa Gap Assessment.Sanitized ReportHipaa Gap Assessment.Sanitized Report
Hipaa Gap Assessment.Sanitized Report
tbeckwith
 
From the Frontline of RASP Adoption
From the Frontline of RASP AdoptionFrom the Frontline of RASP Adoption
From the Frontline of RASP Adoption
Goran Begic
 
Mobile security
Mobile securityMobile security
Mobile security
Basant Kumar
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 

Viewers also liked (11)

GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate Overview
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
 
Threat Detect Hipaa Compliance
Threat Detect Hipaa ComplianceThreat Detect Hipaa Compliance
Threat Detect Hipaa Compliance
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
Dust identification & suppression systems
Dust identification & suppression systemsDust identification & suppression systems
Dust identification & suppression systems
 
Identity Access Management Fishnet Security
Identity Access Management Fishnet SecurityIdentity Access Management Fishnet Security
Identity Access Management Fishnet Security
 
Hipaa Gap Assessment.Sanitized Report
Hipaa Gap Assessment.Sanitized ReportHipaa Gap Assessment.Sanitized Report
Hipaa Gap Assessment.Sanitized Report
 
From the Frontline of RASP Adoption
From the Frontline of RASP AdoptionFrom the Frontline of RASP Adoption
From the Frontline of RASP Adoption
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 

Similar to Enterprise Mobile Security

Application Security
Application SecurityApplication Security
Application Security
onenolesguy
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
IBM Danmark
 
Mobile Device Security Training
Mobile Device Security TrainingMobile Device Security Training
Mobile Device Security Training
Bryan Len
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
Leigh Williamson
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
Avinash Birnale
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Jeremy Siewert
 
Fishnet Security Overview
Fishnet Security   OverviewFishnet Security   Overview
Fishnet Security Overview
tbeckwith
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit India
Leigh Williamson
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Security
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
IBM WebSphereIndia
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
wendyking63
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Dirk Nicol
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
IBM Security
 
UK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteUK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynote
Leigh Williamson
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
Symantec
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
Symantec
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
أحلام انصارى
 
Managed firewall service.
Managed firewall service.Managed firewall service.
Managed firewall service.
Mindtree Ltd.
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
RapidValue
 
Steps For Protecting Your Mobile Life for Enterprises and Consumers
Steps For Protecting Your Mobile Life for Enterprises and ConsumersSteps For Protecting Your Mobile Life for Enterprises and Consumers
Steps For Protecting Your Mobile Life for Enterprises and Consumers
Juniper Networks
 

Similar to Enterprise Mobile Security (20)

Application Security
Application SecurityApplication Security
Application Security
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Mobile Device Security Training
Mobile Device Security TrainingMobile Device Security Training
Mobile Device Security Training
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
 
Fishnet Security Overview
Fishnet Security   OverviewFishnet Security   Overview
Fishnet Security Overview
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit India
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
UK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteUK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynote
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Managed firewall service.
Managed firewall service.Managed firewall service.
Managed firewall service.
 
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...
 
Steps For Protecting Your Mobile Life for Enterprises and Consumers
Steps For Protecting Your Mobile Life for Enterprises and ConsumersSteps For Protecting Your Mobile Life for Enterprises and Consumers
Steps For Protecting Your Mobile Life for Enterprises and Consumers
 

Enterprise Mobile Security

  • 1. Securely Enabling Business Enterprise Mobility Overview Business executives are driving the decision to utilize mobile devices throughout their enterprise due to the devices ability to provide greater productivity, availability, flexibility, and convenience. Such decisions are forcing IT professionals to quickly find solutions to protect their companies’ greatest assets. Mobile devices process and store large amounts of data, remotely access proprietary information, and perform most processor-intensive tasks. As the use of these devices increases so does the exposure to risks and vulnerabilities. In order to ensure the security and integrity of mobile devices, businesses must take adequate measures. Offerings 99Mobile Security Roadmap 99Mobile Application Security FishNet Security has worked with enterprise customers to Mobile Design (Architecture) Review develop a strategic direction as it relates to mobile security. • High-level examination of application artifacts such FishNet Security mobile security strategic road map reviews as security requirements, secure development the current state and provide recommendation based on standards, and specific application specifications to compliance and industry standards for the following: ensure security has been implemented throughout • Security policies as it relates to mobile security the development lifecycle of the mobile application. • Mobile security business and technical requirements • Identify weaknesses in proposed design, and recommend appropriate • Mobile remote access and VDI integration countermeasures to mitigate threats. • Strong Authentication Mobile Application Threat Modeling 99Mobile Security Policy Development • Comprehensive threat assessment delivered with FishNet Security’s proven, STRIDE-based methodology FishNet Security’s Mobile Security Policy Development is • Determine data flows and examine designed to help our clients meet the unique challenges posed entry and exit points in the application, by the evolving space of mobile device platforms. Organizations exposing opportunities to subvert security are becoming more reliant on mobile computing platforms controls. Recommend countermeasures to every day introducing additional risk and considerations for eliminate threats and vulnerabilities. security. FishNet Security’s consultants understand the business drivers and need for mobile computing platforms as well as the Mobile Application Security Assessment nuances to development and maintenance of mobile security policies, standards and procedures. FishNet Security can help • Analysis of a mobile application’s security posture organizations meet their mobile security documentation needs by: within a run-time environment on its native platform, focused on identifying security vulnerabilities, insecure • Developing, evaluating and enhancing existing configuration and other threats. policies, standards and procedures • Maturing mobile security documentation Mobile Application Security Code Review lifecycle management • Examine applications at the code-level, and • Identify and document potential identify hard-to-find technical bugs that can risks within security policy be missed in run-time assessments. Regardless of the current state of mobile security in your • Identify logic flaws and other weaknesses that organization, FishNet Security offers several key services to help are impossible to locate and analyze without ensure that your documentation is established to enable your access to the application’s source code. business and ensure regulatory or industry specific compliance. ID#12SS0040 Last Modified 06.20.2012 Corporate Headquarters | 6130 Sprint Parkway | Ste. 400 | Overland Park, KS 66211 | 888.732.9406 © 2011 FishNet Security. All rights reserved.
  • 2. Enterprise Mobility Offerings (continued) 99Mobile Vulnerability Assessment and Mobile Device Remote Access Penetration Testing Customers have the desire to provide connectivity to internal application through mobile devices. Often times these Mobile Architecture and Design Assessment application have sensitive information that needs access • Analyze the infrastructure and security practices through remote access solution. FishNet Security has an within the architecture and design. extensive product portfolio to support the mobile workforce, Mobile Client and Server Penetration Testing which consists of the following: • Use various methods to test and evaluate • F5 Edge SSL VPN the vulnerabilities of the mobile device and • Juniper SA and JUNOS Pulse the backend servers that control them. • Citrix Mobile Vulnerability Assessment • VMware VDI • Test the security of the mobile device from an end 99Mobile Security Awareness Training user’s perspective to determine if the mobile device could allow leakage of confidential data, denial of • Teach your work force “Mobile Security Best Practices” service or other attacks. • Teach employees corporate security policy for mobile devices on their handheld 99Mobile Security Strategy Assessment • Rich Expert Learning Content Mobile device management (MDM) is a technology that monitors, • Fingertip Compliance supports, and manages mobile devices, securing them from • Complete Quizzing and Metrics external attacks. MDM technologies are a first line of defense for • Anytime, Anywhere Training Solution mobile assets. Properly deployed MDM enables IT professionals to optimize and 99Mobile Forensics protect complex, constantly-evolving mobile environments while minimizing cost and downtime. Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This includes MDM Design and Integration data retrieval and data examination found on the SIM/USIM, the • Review current architecture and technologies phone body itself, and memory cards. Data retrieved and examined related to MDM/MDP for mobile devices can include images, videos, text or SMS messages, call times, and • Identify technical and regulatory requirements contact numbers as it relates to mobile devices. Once forensic investigation is completed, a formal report is MDM Technology Partnerships: provided. The final report summarizes the purpose of the • Good Technologies engagement including, tasks requested, keywords provided, • McAfee EMM outline of collection methodology, details of analysis, and findings of the investigation. • Juniper SSL VPN with Junos Pulse and SMovile for MDM • Mobile Iron About FishNet Security We Focus on the Threat so You can Focus on the Opportunity. Committed to security excellence, FishNet Security is the #1 provider of information security solutions that combine technology, services, support, and training. FishNet Security solutions have enabled 4,000 clients to better manage risk, meet compliance requirements, and reduce cost while maximizing security effectiveness and operational efficiency. For more information on FishNet Security, Inc., visit www.fishnetsecurity.com. ID#12SS0040 Last Modified 06.20.2012 Corporate Headquarters | 6130 Sprint Parkway | Ste. 400 | Overland Park, KS 66211 | 888.732.9406 © 2011 FishNet Security. All rights reserved.