SlideShare a Scribd company logo
1 of 37
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 1
Brian Katz, Director of Mobile Strategy, VMware
Varun Kohli, Vice President, Skycure
October, 2015
Predict, Detect and Protect Against Mobile
Cyber Attacks
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 2
Meet Your Speakers
Brian Katz
Director of Mobile Strategy
VMware
Varun Kohli
Vice President
Skycure
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 3
Quick Housekeeping
• Q&A panel is available if you have any questions
• There will be time for Q&A at the end
• We are recording this webinar for future viewing
• All attendees will receive a copy of slides/recording
Join the discussion using
#MobileThreatDefense hashtag on
Twitter
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 4
Agenda
1. Introductions
2. Mobile Threat Landscape
3. The role of EMM
4. Risk-based security
5. How to predict, detect and prevent attacks
6. Demo
7. Q & A
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Your Mobile Environment is Becoming Complex
5
Smartphones
DifferentDevices&Platforms
Email
Management
Device
Management
AccessandControl
Network
& Security
Cloud
On Premise
SQL
DNS
DHCP
Servers
Corporate
Resources
Email
Email
Infrastructure
Directory
Services
Corporate-owned
Tablets
Application
Management
Apps
Certificates
& PKI
SDK
Malware
Anti-Virus
Wi-Fi
Networks
BYOD Wi-Fi
Rugged Devices
Content
Management
Rugged
Management
Content
Content
Repositories
Content
Filtering
Shared
Desktops & Laptops
Peripherals
SIEM
Shared
Browsing
VPN
VPN
Connection
Laptop
Management
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 6
Old Endpoint Vs. New Endpoint
?
IP
S
IDS
Firewall
USB Security
DLP
Data Encryption
Wireless Security
Application Control AV
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 7
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 8
Mobile Threat Vectors
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 9
Physical Security
Loss
Theft
Unauthorized
Access
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 10
Network Security
Wi-Fi/
Cellular
Off-the-
shelf
hacking
gear
24x7
Exposure
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 11
Network Security
• 25% of the mobile devices will get exposed to a network attack in the first
month of security monitoring, growing to 40% over the next three months.
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 12
Malware
External
Android
Stores
Repackaged
Apps
New
infection
vectors
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 13
Malware
• Not just an Android problem
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 14
Vulnerabilities
OS & App
Level
Patching
Challenges
Never
Ending
Story
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 15
Vulnerabilities
0
20
40
60
80
100
120
140
160
180
2007 2008 2009 2010 2011 2012 2013 2014 2015
Number of CVEs Trajectory
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 16
What mobile security buyers are
doing
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
We don't do anything for data protection on smartphones and
tablets
We enforce a baseline of device security policies like password
entry, remote lock, and remote wipe, but we don't do anything…
Application container or wrapping technologies
Device virtualization or dual persona technologies
Virtual desktop infrastructure for user access to corporate data
from smartphones and tablets
General mobile application management infrastructure
Mobile device management system to enforce device security
policies
Enterprise (1000+
Employees)
SMB (20-999) Employees
AirWatch Simplifies Enterprise Mobility
Management
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
What Does Security Mean to AirWatch?
Protecting sensitive information
Compliance monitoring
Multi-factor authentication Secure access to corporate resources
Device restrictions
Remote commands
Device and app-level policies
App whitelists/blacklists
Compromised device detection
Built-in security features
FIPS-140 compliance
Data loss prevention
256-bit SSL encryption
Certificate-based access
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
True Mobile Security
Mobile security is
securing your
enterprise at all
end points
19
Networks need to
know what user,
on what device, on
what app before
granting access
AirWatch offers a
comprehensive, end-to-
end security through
our architecture,
solutions and
admin console
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Enterprise Mobility Management Platform
Every Endpoint
Mobile
Devices
Laptops
Rugged
Devices
Printers &
Peripherals
Every Use Case
Corporate BYOD
Line of
Business
Shared
Every OS
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Single Pane of Glass
Manage any
device, anywhere
in the world, from
a single console
21
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Intuitive Console Interface
22
Software that is
powerful, yet
easy to use
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Mobile Device Management
• Single management console
• Interactive dashboards for real-time device and
user information
• Support for all major platforms and device types
• Remote commands and over-the-air management
• Simple enrollment for users or IT
• Global and granular management
• Management based on ownership, group and role
• Role-based access for administrators
• Advanced logging and reporting capabilities
A simplified, efficient way to view
and manage all devices from the
central admin console
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Mobile Application Management
24
• Full application lifecycle management
• Intuitive, easy-to-navigate app catalog
• Flexible options for app containerization
• Advanced connectivity, authentication,
security and analytics features
• Comprehensive app ecosystem
Acquire, distribute, secure
and track mobile applications
with AirWatch® Mobile
Application Management
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Self-Service Portal to Empower End Users
Reduce IT burden by allowing users basic
administration over devices
Simplify enrollment, configuration and support
Enable users to drag-and-drop files into personal
folders in AirWatch Secure Content Locker
Share files with others and set different access and
editing privileges
25
Self-Service User Capabilities
Enroll additional devices
Perform remote commands
• Device query
• Send message
• Clear passcode
• Wipe device
Download optional profiles
View device information
• Compliance audit
• Installed profiles and apps
• GPS location
Request applications and technical support
Add personal content to SCL
Enable secure collaboration on content
Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential.
Automated Compliance Engine
26
Build Policies
Application list
Compromised status
Encryption
Model, OS version
Passcode
Roaming
Define Escalation
Time based:
• Minutes
• Hours
• Days
Tiered actions
Repeat actions
Specify Actions
Notify admin when non-compliant
Send SMS, email, push notification
Request device check-in
Remove or block specific profiles
Install compliance profile
Remove all profiles
Remove or block apps
Enterprise wipe
1 2 3
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 27
How To
Predict
See high-risk situations
in advance using
crowd wisdom
Detect
Find mobile threats
before they reach
your network
Prevent
Stop threats
automatically using
existing policies
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 28
You need “Waze”
Predict
• Protect against known, unknown and
ZERO-day attacks
Malware: How do you predict next-gen malware attacks?
Exploit: How do you know if the exploit was not tailor-made for your organization?
Network: How do you know if the network you connect to is real or fake?
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 29
Predict
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 30
Detect
Analyze
Applications
• Policy Violations
• Malware
Operating System
• Vulnerabilities
• Configurations
Device
• Lost
• Stole
Networks
• Suspicious
• Malicious
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 31
Prevent
Automated Remediation
Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 32
Skycure Mobile Threat Defense
• Seamless experience
• 24x7 detection and protection
• Device, app, and network analysis
• Multi platform – Android and iOS
Employee
• Flexible deployment
• Policy creation and enforcement
• Reporting and compliance
• Enterprise integrations
IT Team
Mobile Threat Intelligence
• Millions of tests per month
• 500K+ networks and apps analyzed
• Zero-day threat protection
• Predictive Security
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 33
Mobile Threat Intelligence
https://maps.skycure.com
Predict
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 34
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 35
Promotional Offer
50 FREE
Licenses
Send an email to :
sales@skycure.com
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 36
Summary
• The problem of mobile security is real and is already
here
• An ideal solution should offer layered security:
- Physical compromise
- Network attacks
- Malware infections
- Vulnerability exploitation
• Enterprises are moving towards risk-based mobility
• Skycure + AirWatch is leading the charter
Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 37
Next Steps
Request a FREE 30 Day Trial!
sales@skycure.com, Phone: 1-800-650-4821
https://www.skycure.com/trial
https://blog.skycure.com
@SkycureSecurity, @vk_is
https://www.linkedin.com/company/skycure

More Related Content

What's hot

The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecuritySkycure
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Mobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn'tMobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn'tSkycure
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesKaspersky
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíMarketingArrowECS_CZ
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíMarketingArrowECS_CZ
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecuritySymantec
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersIBM Security
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Kyle Lai
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHKirill Kertsenbaum
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Mykhailo Antonishyn
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecurePouria Ghatrenabi
 

What's hot (20)

The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Mobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn'tMobile Security & Analytics: What Works and What Doesn't
Mobile Security & Analytics: What Works and What Doesn't
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-Secure
 

Viewers also liked

Zimperium - Technology Briefing
Zimperium - Technology BriefingZimperium - Technology Briefing
Zimperium - Technology BriefingJake Leonard
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumZimperium
 
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APTBYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APTJimmy Shah
 
DIY Cybersecurity for your Phone
DIY Cybersecurity for your PhoneDIY Cybersecurity for your Phone
DIY Cybersecurity for your PhoneChika Wonah
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (7)

Zimperium - Technology Briefing
Zimperium - Technology BriefingZimperium - Technology Briefing
Zimperium - Technology Briefing
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
 
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APTBYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
 
DIY Cybersecurity for your Phone
DIY Cybersecurity for your PhoneDIY Cybersecurity for your Phone
DIY Cybersecurity for your Phone
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to How to Predict, Detect and Protect Against Mobile Cyber Attacks

Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsSkycure
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsUL Transaction Security
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Indus Khaitan
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microTheInevitableCloud
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...CA API Management
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation Delivery Centric
 
PRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataPRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataBlackBerry
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Technologies
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Symantec Brasil
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 

Similar to How to Predict, Detect and Protect Against Mobile Cyber Attacks (20)

Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
PRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataPRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your Data
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 

Recently uploaded

Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...
Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...
Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...Call girls in Ahmedabad High profile
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 

Recently uploaded (9)

Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 
Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...
Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...
Night 7k to 12k Top Call Girls Ahmedabad 👉 BOOK NOW 8617697112 👈 ♀️ night gir...
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 

How to Predict, Detect and Protect Against Mobile Cyber Attacks

  • 1. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 1 Brian Katz, Director of Mobile Strategy, VMware Varun Kohli, Vice President, Skycure October, 2015 Predict, Detect and Protect Against Mobile Cyber Attacks
  • 2. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 2 Meet Your Speakers Brian Katz Director of Mobile Strategy VMware Varun Kohli Vice President Skycure
  • 3. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 3 Quick Housekeeping • Q&A panel is available if you have any questions • There will be time for Q&A at the end • We are recording this webinar for future viewing • All attendees will receive a copy of slides/recording Join the discussion using #MobileThreatDefense hashtag on Twitter
  • 4. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 4 Agenda 1. Introductions 2. Mobile Threat Landscape 3. The role of EMM 4. Risk-based security 5. How to predict, detect and prevent attacks 6. Demo 7. Q & A
  • 5. Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Your Mobile Environment is Becoming Complex 5 Smartphones DifferentDevices&Platforms Email Management Device Management AccessandControl Network & Security Cloud On Premise SQL DNS DHCP Servers Corporate Resources Email Email Infrastructure Directory Services Corporate-owned Tablets Application Management Apps Certificates & PKI SDK Malware Anti-Virus Wi-Fi Networks BYOD Wi-Fi Rugged Devices Content Management Rugged Management Content Content Repositories Content Filtering Shared Desktops & Laptops Peripherals SIEM Shared Browsing VPN VPN Connection Laptop Management
  • 6. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 6 Old Endpoint Vs. New Endpoint ? IP S IDS Firewall USB Security DLP Data Encryption Wireless Security Application Control AV
  • 7. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 7
  • 8. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 8 Mobile Threat Vectors
  • 9. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 9 Physical Security Loss Theft Unauthorized Access
  • 10. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 10 Network Security Wi-Fi/ Cellular Off-the- shelf hacking gear 24x7 Exposure
  • 11. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 11 Network Security • 25% of the mobile devices will get exposed to a network attack in the first month of security monitoring, growing to 40% over the next three months.
  • 12. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 12 Malware External Android Stores Repackaged Apps New infection vectors
  • 13. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 13 Malware • Not just an Android problem
  • 14. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 14 Vulnerabilities OS & App Level Patching Challenges Never Ending Story
  • 15. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 15 Vulnerabilities 0 20 40 60 80 100 120 140 160 180 2007 2008 2009 2010 2011 2012 2013 2014 2015 Number of CVEs Trajectory
  • 16. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 16 What mobile security buyers are doing 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% We don't do anything for data protection on smartphones and tablets We enforce a baseline of device security policies like password entry, remote lock, and remote wipe, but we don't do anything… Application container or wrapping technologies Device virtualization or dual persona technologies Virtual desktop infrastructure for user access to corporate data from smartphones and tablets General mobile application management infrastructure Mobile device management system to enforce device security policies Enterprise (1000+ Employees) SMB (20-999) Employees
  • 17. AirWatch Simplifies Enterprise Mobility Management
  • 18. Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential. What Does Security Mean to AirWatch? Protecting sensitive information Compliance monitoring Multi-factor authentication Secure access to corporate resources Device restrictions Remote commands Device and app-level policies App whitelists/blacklists Compromised device detection Built-in security features FIPS-140 compliance Data loss prevention 256-bit SSL encryption Certificate-based access
  • 19. Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential. True Mobile Security Mobile security is securing your enterprise at all end points 19 Networks need to know what user, on what device, on what app before granting access AirWatch offers a comprehensive, end-to- end security through our architecture, solutions and admin console
  • 20. Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Enterprise Mobility Management Platform Every Endpoint Mobile Devices Laptops Rugged Devices Printers & Peripherals Every Use Case Corporate BYOD Line of Business Shared Every OS
  • 21. Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Single Pane of Glass Manage any device, anywhere in the world, from a single console 21
  • 22. Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Intuitive Console Interface 22 Software that is powerful, yet easy to use
  • 23. Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Device Management • Single management console • Interactive dashboards for real-time device and user information • Support for all major platforms and device types • Remote commands and over-the-air management • Simple enrollment for users or IT • Global and granular management • Management based on ownership, group and role • Role-based access for administrators • Advanced logging and reporting capabilities A simplified, efficient way to view and manage all devices from the central admin console
  • 24. Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Application Management 24 • Full application lifecycle management • Intuitive, easy-to-navigate app catalog • Flexible options for app containerization • Advanced connectivity, authentication, security and analytics features • Comprehensive app ecosystem Acquire, distribute, secure and track mobile applications with AirWatch® Mobile Application Management
  • 25. Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Self-Service Portal to Empower End Users Reduce IT burden by allowing users basic administration over devices Simplify enrollment, configuration and support Enable users to drag-and-drop files into personal folders in AirWatch Secure Content Locker Share files with others and set different access and editing privileges 25 Self-Service User Capabilities Enroll additional devices Perform remote commands • Device query • Send message • Clear passcode • Wipe device Download optional profiles View device information • Compliance audit • Installed profiles and apps • GPS location Request applications and technical support Add personal content to SCL Enable secure collaboration on content
  • 26. Copyright © 2015 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Automated Compliance Engine 26 Build Policies Application list Compromised status Encryption Model, OS version Passcode Roaming Define Escalation Time based: • Minutes • Hours • Days Tiered actions Repeat actions Specify Actions Notify admin when non-compliant Send SMS, email, push notification Request device check-in Remove or block specific profiles Install compliance profile Remove all profiles Remove or block apps Enterprise wipe 1 2 3
  • 27. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 27 How To Predict See high-risk situations in advance using crowd wisdom Detect Find mobile threats before they reach your network Prevent Stop threats automatically using existing policies
  • 28. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 28 You need “Waze” Predict • Protect against known, unknown and ZERO-day attacks Malware: How do you predict next-gen malware attacks? Exploit: How do you know if the exploit was not tailor-made for your organization? Network: How do you know if the network you connect to is real or fake?
  • 29. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 29 Predict
  • 30. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 30 Detect Analyze Applications • Policy Violations • Malware Operating System • Vulnerabilities • Configurations Device • Lost • Stole Networks • Suspicious • Malicious
  • 31. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 31 Prevent Automated Remediation
  • 32. Title of Presentation DD/MM/YYYY© 2015 Skycure Inc. - Confidential 32 Skycure Mobile Threat Defense • Seamless experience • 24x7 detection and protection • Device, app, and network analysis • Multi platform – Android and iOS Employee • Flexible deployment • Policy creation and enforcement • Reporting and compliance • Enterprise integrations IT Team Mobile Threat Intelligence • Millions of tests per month • 500K+ networks and apps analyzed • Zero-day threat protection • Predictive Security
  • 33. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 33 Mobile Threat Intelligence https://maps.skycure.com Predict
  • 34. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 34
  • 35. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 35 Promotional Offer 50 FREE Licenses Send an email to : sales@skycure.com
  • 36. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 36 Summary • The problem of mobile security is real and is already here • An ideal solution should offer layered security: - Physical compromise - Network attacks - Malware infections - Vulnerability exploitation • Enterprises are moving towards risk-based mobility • Skycure + AirWatch is leading the charter
  • 37. Title of Presentation DD/MM/YYYY© 2015 Skycure Ltd. 37 Next Steps Request a FREE 30 Day Trial! sales@skycure.com, Phone: 1-800-650-4821 https://www.skycure.com/trial https://blog.skycure.com @SkycureSecurity, @vk_is https://www.linkedin.com/company/skycure