SlideShare a Scribd company logo
Mobile Data Security w/MAP

The Power of Application Wrapping
September 2012
Introducing Mocana

Offices                 Target Market                     Major Products
                                                            Major Products         Target Segments
San Francisco, CA       - Enterprises                     - Mobile App Protection™ - Automotive & Aviation
                                                            Shipping Security Platform: 22 Modules
                                                            Smart Device
Headquarters            - Device Manufacturers              (MAP)                  - Banking & Finance
                        - Service Providers
                                                             spanning end-to-end device security
                                                          - Smart Device Security  - Consumer Electronics
Industry                                                    Platform™ (SDSP):      - Datacom
                        Primary                             24 Modules             - Defense & Government
Smart Device Security                                                              - Industrial Automation
Software and Services   Business Benefit                  Customers                - Medical
                        Mocana instills confidence                                 - Mobile
Awards                  and trust for OEMs, service       200+ customers           - Smart Grid / AMI
                        providers, consumers and
- World Economic
  Forum 2012
                        enterprises by securing smart     Multiple Patents          Solid Investors
                        devices and the applications
  Tech Pioneer          and services they carry.          Filed and Granted         -   Trident Capital
- RedHerring Global                                                                 -   Intel
  Top 100 Private Co.                                                               -   Symantec
- Plus others                                                                       -   Shasta Ventures




August 13, 2012                    For Internal Use Only – Mocana Confidential
Organizational Mobility Priorities

▶    Onboard mobile assets fluidly

▶    Give app / data access to the right users

▶    Prevent data loss or leakage (DLP)

▶    Separate or distinguish between corp and personal data

▶    Make it easy / seamless for the user

▶    Understand who is using what / when




August 13, 2012           For Internal Use Only – Mocana Confidential
Mocana Mobile App Protection™ (MAP)
Protecting Corp Data Thru Self-Defending Mobile Applications


                                    ▶     Integrates seamlessly into Apperian
                                          EASE
                                    ▶     High confidence mobile data protection
                                          based on the creation of “self-defending
                                          applications”
                                    ▶     Patent-pending wrapping method adds
                                          key security in seconds
                                    ▶     Flexibility to vary security on each app
                                          as necessary
                                    ▶     Support across iOS and Android


August 13, 2012           For Internal Use Only – Mocana Confidential
Seamless Integration Into Apperian EASE




August 13, 2012   For Internal Use Only – Mocana Confidential
Mocana Mobile App Protection™
Key Security Policies

                  Security and Usage Policies*         Benefit
                                                       Per-Application DLP

                                                       Encrypt data stored by a specific app, without having to encrypt the entire
                  Data-at-Rest Encryption              device.
                                                       Prevent malware and rogue apps from accessing data.

                                                       Prevent sensitive enterprise data leakage by prohibiting unauthorized
                  Secure Copy-Paste                    copying and pasting from specific apps.

                                                       Per-Application VPN

                                                       A VPN specific to the app prevents rogue apps and malware from accessing
                  Data-in-Motion Encryption            or performing reconnaissance on enterprise networks.

                                                       Per-Application ACCESS


                  User Authentication                  Authenticate user prior to granting access to a specific app.



                  Jail-break/Rooted                    Disable a specific app when the device is compromised by jailbreaking
                  Detection                            or rooting.




August 13, 2012                            For Internal Use Only – Mocana Confidential
Illustrative Federal Case Study

The Goal:

•    Want to embrace BYOD as an agency standard platform for field work and
     communications

•    Looking to embrace a MLS strategy

Challenges:

•    iOS not open enough for their needs

•    Android fragmentation makes security standardization at a device-level difficult

•    Different users have different security clearances and access to less or more
     sensitive mobile applications

•    Data needs to be encrypted at a FIPS 140-2 level and using the latest
     cryptographic standards such as Suite B



August 13, 2012               For Internal Use Only – Mocana Confidential
Federal Case Study Cont’d

How MAP Technology Fit In
• User access: 6-digit Alphanumeric passphrases rotating every 6
  weeks on applications touching classified documents
• User agreement feature used to prominently display warning/alert
  for sensitive applications on initial access
• Using a secure VOIP app wrapped with Mocana for person-to-
  person communications
• Use of only wrapped applications for key functions
     •    Third-party camera app can be used which allows photos to be encrypted
          and stored on network share via per-app VPN

• Ability to disable access to some applications (and their data) but
  not to all communication channels


August 13, 2012               For Internal Use Only – Mocana Confidential
Mocana Mobile App Protection™
Summary


                           ▶    A new way to embrace BYOD
                                securely

                           ▶    The “application becomes the
                                endpoint”

                           ▶    Best of both worlds: great user
                                experience, no compromise in
                                security

                           ▶    Available today for both iOS and
                                Android

August 13, 2012   For Internal Use Only – Mocana Confidential

More Related Content

What's hot

SAP mobile platform & mobile apps
SAP mobile platform & mobile appsSAP mobile platform & mobile apps
SAP mobile platform & mobile apps
Capgemini
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
Luca Rossetti
 
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelMobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
CA Technologies
 
Mobile architecture overview
Mobile architecture overviewMobile architecture overview
Mobile architecture overviewDavid Scruggs
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
CA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
CA API Management
 
5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps
CA API Management
 
B3 mobile development and deployment platform enabled by oracle fusion midd...
B3   mobile development and deployment platform enabled by oracle fusion midd...B3   mobile development and deployment platform enabled by oracle fusion midd...
B3 mobile development and deployment platform enabled by oracle fusion midd...Dr. Wilfred Lin (Ph.D.)
 
SAP Mobile Platform - Product and Roadmap
SAP Mobile Platform - Product and RoadmapSAP Mobile Platform - Product and Roadmap
SAP Mobile Platform - Product and Roadmap
SAP PartnerEdge program for Application Development
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
CA API Management
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Indus Khaitan
 
Mobile Application Architecture Strategy
Mobile Application Architecture StrategyMobile Application Architecture Strategy
Mobile Application Architecture Strategy
Gary Wong
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
CA API Management
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
CA Technologies
 
Ca mdm marketing presentation
Ca mdm marketing presentationCa mdm marketing presentation
Ca mdm marketing presentation
CA Technologies
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefingNitin Gaur
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation
MATT ALEXANDER
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
Yuvaraj Ilangovan
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
AnyPresence
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
CA API Management
 

What's hot (20)

SAP mobile platform & mobile apps
SAP mobile platform & mobile appsSAP mobile platform & mobile apps
SAP mobile platform & mobile apps
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
 
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelMobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
 
Mobile architecture overview
Mobile architecture overviewMobile architecture overview
Mobile architecture overview
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps
 
B3 mobile development and deployment platform enabled by oracle fusion midd...
B3   mobile development and deployment platform enabled by oracle fusion midd...B3   mobile development and deployment platform enabled by oracle fusion midd...
B3 mobile development and deployment platform enabled by oracle fusion midd...
 
SAP Mobile Platform - Product and Roadmap
SAP Mobile Platform - Product and RoadmapSAP Mobile Platform - Product and Roadmap
SAP Mobile Platform - Product and Roadmap
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
Mobile Application Architecture Strategy
Mobile Application Architecture StrategyMobile Application Architecture Strategy
Mobile Application Architecture Strategy
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Ca mdm marketing presentation
Ca mdm marketing presentationCa mdm marketing presentation
Ca mdm marketing presentation
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefing
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
 

Viewers also liked

3.1.1 fedualisme dan kapitalisme di jerman dan perancis
3.1.1 fedualisme dan kapitalisme di jerman dan perancis3.1.1 fedualisme dan kapitalisme di jerman dan perancis
3.1.1 fedualisme dan kapitalisme di jerman dan perancis
Karsodikromo Yatiman
 
Revista
RevistaRevista
Chick N. Head
Chick N. HeadChick N. Head
Chick N. Head
Salamanca Hiddle
 
Жанна Прашкевич. Необходимая документация в SMM
Жанна Прашкевич. Необходимая документация в SMMЖанна Прашкевич. Необходимая документация в SMM
Жанна Прашкевич. Необходимая документация в SMMSocialMediaClubCA
 
Dich de hoc v1.1 public
Dich de hoc v1.1 publicDich de hoc v1.1 public
Dich de hoc v1.1 publicBui Hang
 
Ab undergraduate thesis_final
Ab undergraduate thesis_finalAb undergraduate thesis_final
Ab undergraduate thesis_finalAmber Brant
 
Capitulo1 Mecanica dos fluidos
Capitulo1 Mecanica dos fluidosCapitulo1 Mecanica dos fluidos
Capitulo1 Mecanica dos fluidos
adalberto miran
 
Lesson 11. школьный портфель. цирковая школа
Lesson 11. школьный портфель. цирковая школаLesson 11. школьный портфель. цирковая школа
Lesson 11. школьный портфель. цирковая школа
shpinat
 
12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...
12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...
12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...
Moscow State University
 
Biblioteca pessoal
Biblioteca pessoalBiblioteca pessoal
Biblioteca pessoalRick Rios
 
Раим Дадыбаев. "Победный и Добрый кейсы"
Раим Дадыбаев. "Победный и Добрый кейсы"Раим Дадыбаев. "Победный и Добрый кейсы"
Раим Дадыбаев. "Победный и Добрый кейсы"SocialMediaClubCA
 
E2D3 ver. 0.2 API説明書
E2D3 ver. 0.2 API説明書E2D3 ver. 0.2 API説明書
E2D3 ver. 0.2 API説明書
E2D3.org
 
Bansi
BansiBansi
презентация солинг
презентация солингпрезентация солинг
презентация солингAndreykireenkov
 
University of the fraser valley
University of the fraser valleyUniversity of the fraser valley
University of the fraser valleyDhrron Consultancy
 
Themindmapingroad 121126144454-phpapp02
Themindmapingroad 121126144454-phpapp02Themindmapingroad 121126144454-phpapp02
Themindmapingroad 121126144454-phpapp02Thomas Nuth
 
Penetapan kkm
Penetapan kkmPenetapan kkm
Penetapan kkm
Eva Zen
 

Viewers also liked (20)

3.1.1 fedualisme dan kapitalisme di jerman dan perancis
3.1.1 fedualisme dan kapitalisme di jerman dan perancis3.1.1 fedualisme dan kapitalisme di jerman dan perancis
3.1.1 fedualisme dan kapitalisme di jerman dan perancis
 
Revista
RevistaRevista
Revista
 
Chick N. Head
Chick N. HeadChick N. Head
Chick N. Head
 
Жанна Прашкевич. Необходимая документация в SMM
Жанна Прашкевич. Необходимая документация в SMMЖанна Прашкевич. Необходимая документация в SMM
Жанна Прашкевич. Необходимая документация в SMM
 
Babyzine IPR
Babyzine IPRBabyzine IPR
Babyzine IPR
 
Dich de hoc v1.1 public
Dich de hoc v1.1 publicDich de hoc v1.1 public
Dich de hoc v1.1 public
 
Ab undergraduate thesis_final
Ab undergraduate thesis_finalAb undergraduate thesis_final
Ab undergraduate thesis_final
 
Capitulo1 Mecanica dos fluidos
Capitulo1 Mecanica dos fluidosCapitulo1 Mecanica dos fluidos
Capitulo1 Mecanica dos fluidos
 
Lesson 11. школьный портфель. цирковая школа
Lesson 11. школьный портфель. цирковая школаLesson 11. школьный портфель. цирковая школа
Lesson 11. школьный портфель. цирковая школа
 
Impresion
ImpresionImpresion
Impresion
 
12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...
12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...
12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...
 
Biblioteca pessoal
Biblioteca pessoalBiblioteca pessoal
Biblioteca pessoal
 
Раим Дадыбаев. "Победный и Добрый кейсы"
Раим Дадыбаев. "Победный и Добрый кейсы"Раим Дадыбаев. "Победный и Добрый кейсы"
Раим Дадыбаев. "Победный и Добрый кейсы"
 
E2D3 ver. 0.2 API説明書
E2D3 ver. 0.2 API説明書E2D3 ver. 0.2 API説明書
E2D3 ver. 0.2 API説明書
 
Bansi
BansiBansi
Bansi
 
The town
The townThe town
The town
 
презентация солинг
презентация солингпрезентация солинг
презентация солинг
 
University of the fraser valley
University of the fraser valleyUniversity of the fraser valley
University of the fraser valley
 
Themindmapingroad 121126144454-phpapp02
Themindmapingroad 121126144454-phpapp02Themindmapingroad 121126144454-phpapp02
Themindmapingroad 121126144454-phpapp02
 
Penetapan kkm
Penetapan kkmPenetapan kkm
Penetapan kkm
 

Similar to Federal Grade Security with Mocana

Chris D'Aguanno
Chris D'AguannoChris D'Aguanno
Chris D'Aguanno
scoopnewsgroup
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
SAP Solution Extensions
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
Symantec
 
Evaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityEvaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise Mobility
RapidSSLOnline.com
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
MobileIron
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
ashoksankar
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
Prolifics
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
Symantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
Symantec
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptx
Arrow ECS UK
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
Relayware
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
MarketingArrowECS_CZ
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
Zscaler
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
Courtland Smith
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile application
Vikrant Kansal
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Kenneth de Brucq
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
VictorOrtizMformation
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
Plain Concepts
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
arms8586
 

Similar to Federal Grade Security with Mocana (20)

Chris D'Aguanno
Chris D'AguannoChris D'Aguanno
Chris D'Aguanno
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Evaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityEvaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise Mobility
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptx
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile application
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
 

More from Apperian

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian Webinar
Apperian
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of Mobility
Apperian
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roi
Apperian
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
Apperian
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great Opportunity
Apperian
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldApperian
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19Apperian
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21Apperian
 
Applification of Business
Applification of BusinessApplification of Business
Applification of BusinessApperian
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Apperian
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE
Apperian
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apperian
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.
Apperian
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDMApperian
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile Devices
Apperian
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in Retail
Apperian
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
Apperian
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them OutApperian
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Apperian
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native Apps
Apperian
 

More from Apperian (20)

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian Webinar
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of Mobility
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roi
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great Opportunity
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM World
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21
 
Applification of Business
Applification of BusinessApplification of Business
Applification of Business
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile Devices
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in Retail
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native Apps
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Federal Grade Security with Mocana

  • 1. Mobile Data Security w/MAP The Power of Application Wrapping September 2012
  • 2. Introducing Mocana Offices Target Market Major Products Major Products Target Segments San Francisco, CA - Enterprises - Mobile App Protection™ - Automotive & Aviation Shipping Security Platform: 22 Modules Smart Device Headquarters - Device Manufacturers (MAP) - Banking & Finance - Service Providers spanning end-to-end device security - Smart Device Security - Consumer Electronics Industry Platform™ (SDSP): - Datacom Primary 24 Modules - Defense & Government Smart Device Security - Industrial Automation Software and Services Business Benefit Customers - Medical Mocana instills confidence - Mobile Awards and trust for OEMs, service 200+ customers - Smart Grid / AMI providers, consumers and - World Economic Forum 2012 enterprises by securing smart Multiple Patents Solid Investors devices and the applications Tech Pioneer and services they carry. Filed and Granted - Trident Capital - RedHerring Global - Intel Top 100 Private Co. - Symantec - Plus others - Shasta Ventures August 13, 2012 For Internal Use Only – Mocana Confidential
  • 3. Organizational Mobility Priorities ▶ Onboard mobile assets fluidly ▶ Give app / data access to the right users ▶ Prevent data loss or leakage (DLP) ▶ Separate or distinguish between corp and personal data ▶ Make it easy / seamless for the user ▶ Understand who is using what / when August 13, 2012 For Internal Use Only – Mocana Confidential
  • 4. Mocana Mobile App Protection™ (MAP) Protecting Corp Data Thru Self-Defending Mobile Applications ▶ Integrates seamlessly into Apperian EASE ▶ High confidence mobile data protection based on the creation of “self-defending applications” ▶ Patent-pending wrapping method adds key security in seconds ▶ Flexibility to vary security on each app as necessary ▶ Support across iOS and Android August 13, 2012 For Internal Use Only – Mocana Confidential
  • 5. Seamless Integration Into Apperian EASE August 13, 2012 For Internal Use Only – Mocana Confidential
  • 6. Mocana Mobile App Protection™ Key Security Policies Security and Usage Policies* Benefit Per-Application DLP Encrypt data stored by a specific app, without having to encrypt the entire Data-at-Rest Encryption device. Prevent malware and rogue apps from accessing data. Prevent sensitive enterprise data leakage by prohibiting unauthorized Secure Copy-Paste copying and pasting from specific apps. Per-Application VPN A VPN specific to the app prevents rogue apps and malware from accessing Data-in-Motion Encryption or performing reconnaissance on enterprise networks. Per-Application ACCESS User Authentication Authenticate user prior to granting access to a specific app. Jail-break/Rooted Disable a specific app when the device is compromised by jailbreaking Detection or rooting. August 13, 2012 For Internal Use Only – Mocana Confidential
  • 7. Illustrative Federal Case Study The Goal: • Want to embrace BYOD as an agency standard platform for field work and communications • Looking to embrace a MLS strategy Challenges: • iOS not open enough for their needs • Android fragmentation makes security standardization at a device-level difficult • Different users have different security clearances and access to less or more sensitive mobile applications • Data needs to be encrypted at a FIPS 140-2 level and using the latest cryptographic standards such as Suite B August 13, 2012 For Internal Use Only – Mocana Confidential
  • 8. Federal Case Study Cont’d How MAP Technology Fit In • User access: 6-digit Alphanumeric passphrases rotating every 6 weeks on applications touching classified documents • User agreement feature used to prominently display warning/alert for sensitive applications on initial access • Using a secure VOIP app wrapped with Mocana for person-to- person communications • Use of only wrapped applications for key functions • Third-party camera app can be used which allows photos to be encrypted and stored on network share via per-app VPN • Ability to disable access to some applications (and their data) but not to all communication channels August 13, 2012 For Internal Use Only – Mocana Confidential
  • 9. Mocana Mobile App Protection™ Summary ▶ A new way to embrace BYOD securely ▶ The “application becomes the endpoint” ▶ Best of both worlds: great user experience, no compromise in security ▶ Available today for both iOS and Android August 13, 2012 For Internal Use Only – Mocana Confidential

Editor's Notes

  1. Thank you. Good morning and good afternoon, I’m [name], [title] for MAP at Mocana Corporation. I’d like to take you through why Mocana and Apperian feel so passionately about an application centric approach to mobile security, including an example of how federal government customers could use the MAP technology to meet their organizational mobility needs.
  2. Mocana is a software security and services company. We are headquartered in San Francisco, CA and have rich IP in the area of smart device security. We currently have over 200 OEMs that are shipping products with Mocana security IP that span different markets from Medical, Federal, Military, Industrial, and Consumer segments. We have seen tremendous growth in the market over the past few years and expect this to continue. Lastly, we have Symantec, Intel (McAfee), and Shasta Ventures who have funded our company. This is great validation, as the worlds top 2 security companies see Mocana as their answer for smart device security.
  3. Now when we look at the market and what organizations are trying to solve today with their organizational mobility projects, including BYOD and corporate issued devices, here are some of the key requirements we see that are important to meet.It’s starts with onboarding their employees with their applications and in some cases devices. It includes things like making sure the right users are given access, data is not lost.
  4. Mocana’s Mobile App Protection (MAP) protects sensitive corporate data through the use of a unique and patent-pending technology called Appvelope™ that “envelopes” or “wraps” fine-grained data access, usage, and protection policies around individual apps.Enables enterprises to securely extend data access to a greater number of mobile devices, including employee, customer, & corporate-owned devices.Completely automated & seamlessly integrates with existing infrastructure for staging and deploying mobile apps, including 3rd party MDM systems & Corporate App Stores.Designed for enterprise IT to build and deploy secure internal facing & customer facing (B2C) apps—without needing access to the app source code or requiring an on-device client.Compliments MDM systems, but goes beyond sandbox or container solutions to bring security to individual apps.The result is a secure, self-defending App that does not impact user experience.