SlideShare a Scribd company logo
S.JYOTHISH KUMAR
2
Definition:
Mobile app security is
the extent of protection
that mobile device applications
(apps) have from malware
and the activities of crackers
and other criminals.
With the explosive growth of smartphones,
tablets and mobile devices, companies must find
a means of providing access to their internal
systems and information to their mobile
workforce securely and seamlessly.
3
 Microsoft Exchange
2003
 Blackberry Enterprise
Server 4.1 SP7
◦ 10,000 email boxes
 2,000 using mobile devices
 Only company provided
Blackberry devices are
supported
4
 Confidentiality
◦ Commercial Data
 Ex: Financial, IP, etc.
◦ Personal Data
 Ex: Customer, Employee records,
PCI, etc.
 User Personal Data
◦ Diplomatic cables
 Accessibility
◦ Resource uptime
◦ High Availability / Recoverability
◦ Archive
5
Maintain device flexibility
while protecting against
security risks
• Business users today are more
mobile than ever before and are
looking to access the enterprise
from multiple devices:
– Apple iOS
– Android
– Blackberry
– Windows Mobile
• Users today are more
technically skilled than before
and are unfortunately able to
develop “Business Managed
Solutions” which may not meet
the security requirements of the
enterprise
– Must securely support
users on the 4
identified leading
mobile platforms
– Must leverage the
significant existing
Exchange and
Blackberry investment
High Level Requirements
&
Solution Approach
The answer – A Mobile Device Management (MDM)
Solution
7
 MS Exchange
◦ Exchange 2003 or Exchange 2007 SP2
◦ ActiveSync (EAS) enabled
◦ Enterprise Certificate services / certificate based
authentication
 Mobile Device support
◦ Support latest Mobile OS’s
◦ Employee-provided device
◦ Support for VPN, Wi-Fi, ActiveSync and encryption
◦ Centralized IT management & control
◦ Support for common file attachments
8
 Security
◦ All devices should be enrolled into corporate network
◦ Provisioning of mobile devices should be secure
◦ Security policies should be targeted to right
groups/employees
◦ Restriction of some/all mobile applications
◦ Complex/multi-character passwords required
◦ Updates of mobile OS required
◦ Encryption of all forms of corporate data
◦ Tracking and inventory of all devices
◦ Access control over corporate email system
◦ Sanction and disconnect modified devices or rouge
device
◦ Selective/full remote wipe of device
9
10
Good Technology
 Manage & Protect access to vital company
information
 Without imprisoning the user or their device
 With flexibility…
◦ Manage the entire device
OR
◦ Manage the Good application
 Plays nice in the mobile sandbox!
11
"Corporate policies should focus on regulating behavior, rather than
devices..."
— Gartner, May 2010
12
13
FIREWALLS
FIREWALLS
AD / LDAP Services Email Servers
Good Message Servers
Good Mobile Control
Good Mobile Access
SQL Database
Good NOC
SSL
14
Good Technology Solution
Capital Expense
Software (2000 licenses) $140,468 -
Hardware $178,801 $34,410
Maintenance - $57,775
Sub Total $319,269 $92,185
TOTAL 2 year capacity $411,454
15
Per Device Comparison
Blackberry
Enterprise
Server
Good
Technology
Annual data plan service $504 $0*
Annual Inclusive maintenance & support $4 $159
Total annual cost $508 $159
$0
$200,000
$400,000
$600,000
$800,000
$1,000,000
0
200
400
600
800
1000
1200
1400
1600
1800
2000
Annual Cost Comparison
of Mobility Run Rates
Good Technology
Blackberry ES
 Financial Liability
◦ May be required to pay stipend for device/usage
 Additionally corporate data plans apply in some
instances
◦ Employee may be taxed for fringe benefit
◦ Nonexempt employees create issues
 Legal Liability
◦ Evidence of illegal activity must not go unreported
◦ Archiving may be required
16
 While some employees will only need access
to PIM-data, many will need full device
management.
 In these cases, all data must be subject to
review and/or archive by the company
◦ Email, SMS/MMS, IM, music, etc.
 All activity (applications, browser, peripheral
control, etc.) must be subject to audit and
control at any time.
 How to handle all of this??
17
 Most people will agree to any ToS
without second thoughts.
 Acceptance of the restrictions rely
completely on employees’
understanding them
 Rewards are worth the
risks …
18
 Despite shared liability, employee-provided
cell phones for business purposes are
extremely popular.
◦ Conveniences for employee
◦ Savings for employer
 Trend will continue
19
 Employee-owned mobile phones provide
risks, challenges.
 However, benefits are great to both company
and employees.
 Our provided solution, leveraging Good
Technology, is the most efficient and feasible
way to implement a corporate private mobile
device policy.
20

More Related Content

What's hot

IOS security
IOS securityIOS security
IOS security
bakhti rahman
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration Testing
Subho Halder
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
Abdelhamid Limami
 
Android Pentesting
Android PentestingAndroid Pentesting
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysis
Carlo Dapino
 
iOS Application Pentesting
iOS Application PentestingiOS Application Pentesting
iOS Application Pentesting
n|u - The Open Security Community
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
Lisa Herrera
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
Chaitanya Dhareshwar
 
Security operation center.pdf
Security operation center.pdfSecurity operation center.pdf
Security operation center.pdf
Skillmine Technology Consulting
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
Santhosh Kumar
 
Mobile security
Mobile securityMobile security
Mobile security
CyberoamAcademy
 
malware analysis
malware  analysismalware  analysis
malware analysis
20CS201AkashR
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
Nemwos
 
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Ajin Abraham
 
iOS Application Penetration Testing
iOS Application Penetration TestingiOS Application Penetration Testing
iOS Application Penetration Testing
n|u - The Open Security Community
 
CHFI v10
CHFI v10CHFI v10
CHFI v10
SagarNegi10
 
The state of the art in iOS Forensics
The state of the art in iOS ForensicsThe state of the art in iOS Forensics
The state of the art in iOS Forensics
Reality Net System Solutions
 
Malware forensic
Malware forensicMalware forensic
Malware forensic
SumeraHangi
 
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineeringMalware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
bartblaze
 

What's hot (20)

IOS security
IOS securityIOS security
IOS security
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration Testing
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysis
 
iOS Application Pentesting
iOS Application PentestingiOS Application Pentesting
iOS Application Pentesting
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
Security operation center.pdf
Security operation center.pdfSecurity operation center.pdf
Security operation center.pdf
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
 
Mobile security
Mobile securityMobile security
Mobile security
 
malware analysis
malware  analysismalware  analysis
malware analysis
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
 
iOS Application Penetration Testing
iOS Application Penetration TestingiOS Application Penetration Testing
iOS Application Penetration Testing
 
CHFI v10
CHFI v10CHFI v10
CHFI v10
 
The state of the art in iOS Forensics
The state of the art in iOS ForensicsThe state of the art in iOS Forensics
The state of the art in iOS Forensics
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Malware forensic
Malware forensicMalware forensic
Malware forensic
 
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineeringMalware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
 

Viewers also liked

13 Administración Android - Seguridad
13 Administración Android  -  Seguridad13 Administración Android  -  Seguridad
13 Administración Android - Seguridad
guidotic
 
Javier Moreno & Eloi Sanfélix - Seguridad y explotación nativa en Android [Ro...
Javier Moreno & Eloi Sanfélix - Seguridad y explotación nativa en Android [Ro...Javier Moreno & Eloi Sanfélix - Seguridad y explotación nativa en Android [Ro...
Javier Moreno & Eloi Sanfélix - Seguridad y explotación nativa en Android [Ro...
RootedCON
 
Android manifest
Android manifestAndroid manifest
Seguridad en android.ppt
Seguridad en android.pptSeguridad en android.ppt
Seguridad en android.pptfabibmx7
 
54. OWASP Mobile Top Ten
54. OWASP Mobile Top Ten54. OWASP Mobile Top Ten
54. OWASP Mobile Top Ten
GeneXus
 
Arquitectura Android
Arquitectura AndroidArquitectura Android
Arquitectura Android
advillacorta
 
Te pique lo que te pique, analiza un SQLite
Te pique lo que te pique, analiza un SQLiteTe pique lo que te pique, analiza un SQLite
Te pique lo que te pique, analiza un SQLite
Alejandro Ramos
 
Testing Android Security
Testing Android SecurityTesting Android Security
Testing Android Security
Jose Manuel Ortega Candel
 
Golosarioooo
GolosariooooGolosarioooo
Golosarioooo
daniguijarro
 
Ingeniería Inversa en Android. Rooted Labs. Rooted CON 2012.
Ingeniería Inversa en Android.  Rooted Labs. Rooted CON 2012.Ingeniería Inversa en Android.  Rooted Labs. Rooted CON 2012.
Ingeniería Inversa en Android. Rooted Labs. Rooted CON 2012.
Internet Security Auditors
 
Manual moviles.
Manual moviles.Manual moviles.
Manual moviles.
Vanne Villeda
 
Fo 5.desarrollo android-almacenamientodedatos
Fo 5.desarrollo android-almacenamientodedatosFo 5.desarrollo android-almacenamientodedatos
Fo 5.desarrollo android-almacenamientodedatos
Nathii Oh
 
Presentacion segi seminario_yisell
Presentacion segi seminario_yisellPresentacion segi seminario_yisell
Presentacion segi seminario_yisell
Yiz Puentes Cubides
 
Empresa de seguridad rootnit android malware
Empresa de seguridad rootnit android malwareEmpresa de seguridad rootnit android malware
Empresa de seguridad rootnit android malware
David Thomas
 
Análisis forense de dispositivos android 01
Análisis forense de dispositivos android 01Análisis forense de dispositivos android 01
Análisis forense de dispositivos android 01
Eventos Creativos
 
Android in practice
Android in practiceAndroid in practice
Android in practice
Jose Manuel Ortega Candel
 
Testing Android Security
Testing Android SecurityTesting Android Security
Testing Android Security
Jose Manuel Ortega Candel
 

Viewers also liked (20)

13 Administración Android - Seguridad
13 Administración Android  -  Seguridad13 Administración Android  -  Seguridad
13 Administración Android - Seguridad
 
Javier Moreno & Eloi Sanfélix - Seguridad y explotación nativa en Android [Ro...
Javier Moreno & Eloi Sanfélix - Seguridad y explotación nativa en Android [Ro...Javier Moreno & Eloi Sanfélix - Seguridad y explotación nativa en Android [Ro...
Javier Moreno & Eloi Sanfélix - Seguridad y explotación nativa en Android [Ro...
 
Android manifest
Android manifestAndroid manifest
Android manifest
 
Seguridad en android.ppt
Seguridad en android.pptSeguridad en android.ppt
Seguridad en android.ppt
 
54. OWASP Mobile Top Ten
54. OWASP Mobile Top Ten54. OWASP Mobile Top Ten
54. OWASP Mobile Top Ten
 
Arquitectura Android
Arquitectura AndroidArquitectura Android
Arquitectura Android
 
SQLite UPCI 2013
SQLite UPCI 2013SQLite UPCI 2013
SQLite UPCI 2013
 
Te pique lo que te pique, analiza un SQLite
Te pique lo que te pique, analiza un SQLiteTe pique lo que te pique, analiza un SQLite
Te pique lo que te pique, analiza un SQLite
 
Testing Android Security
Testing Android SecurityTesting Android Security
Testing Android Security
 
Golosarioooo
GolosariooooGolosarioooo
Golosarioooo
 
Ingeniería Inversa en Android. Rooted Labs. Rooted CON 2012.
Ingeniería Inversa en Android.  Rooted Labs. Rooted CON 2012.Ingeniería Inversa en Android.  Rooted Labs. Rooted CON 2012.
Ingeniería Inversa en Android. Rooted Labs. Rooted CON 2012.
 
Manual moviles.
Manual moviles.Manual moviles.
Manual moviles.
 
Fo 5.desarrollo android-almacenamientodedatos
Fo 5.desarrollo android-almacenamientodedatosFo 5.desarrollo android-almacenamientodedatos
Fo 5.desarrollo android-almacenamientodedatos
 
Android
AndroidAndroid
Android
 
Presentacion segi seminario_yisell
Presentacion segi seminario_yisellPresentacion segi seminario_yisell
Presentacion segi seminario_yisell
 
Empresa de seguridad rootnit android malware
Empresa de seguridad rootnit android malwareEmpresa de seguridad rootnit android malware
Empresa de seguridad rootnit android malware
 
Análisis forense de dispositivos android 01
Análisis forense de dispositivos android 01Análisis forense de dispositivos android 01
Análisis forense de dispositivos android 01
 
Android in practice
Android in practiceAndroid in practice
Android in practice
 
Testing Android Security
Testing Android SecurityTesting Android Security
Testing Android Security
 
Android Pres3
Android Pres3Android Pres3
Android Pres3
 

Similar to mobile application security

Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Information Security Awareness Group
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
North Texas Chapter of the ISSA
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Conference_by_EVRY
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
Robert Kleinschmidt
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
Chris Pepin
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityEnclaveSecurity
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
Cruatech
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
Meg Weber
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
EnclaveSecurity
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!
Mike Brannon
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
genasun
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your Data
InnoTech
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
Sreeni Pamidala
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CloudIDSummit
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
Will Adams
 

Similar to mobile application security (20)

Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device security
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your Data
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 

More from -jyothish kumar sirigidi

Pythonintroduction
PythonintroductionPythonintroduction
Pythonintroduction
-jyothish kumar sirigidi
 
Webtechnologies
Webtechnologies Webtechnologies
Webtechnologies
-jyothish kumar sirigidi
 
Open source software
Open source softwareOpen source software
Open source software
-jyothish kumar sirigidi
 
Html
HtmlHtml
Authenticating with our minds
Authenticating with our mindsAuthenticating with our minds
Authenticating with our minds
-jyothish kumar sirigidi
 
Google chrome OS
Google chrome OSGoogle chrome OS
Google chrome OS
-jyothish kumar sirigidi
 
Blue eye technology ppt
Blue eye technology pptBlue eye technology ppt
Blue eye technology ppt
-jyothish kumar sirigidi
 
Android
AndroidAndroid
Network security
Network securityNetwork security
Network security
-jyothish kumar sirigidi
 
Applications of computer graphics
Applications of computer graphicsApplications of computer graphics
Applications of computer graphics
-jyothish kumar sirigidi
 

More from -jyothish kumar sirigidi (11)

Pythonintroduction
PythonintroductionPythonintroduction
Pythonintroduction
 
Webtechnologies
Webtechnologies Webtechnologies
Webtechnologies
 
Open source software
Open source softwareOpen source software
Open source software
 
Html
HtmlHtml
Html
 
Authenticating with our minds
Authenticating with our mindsAuthenticating with our minds
Authenticating with our minds
 
Google chrome OS
Google chrome OSGoogle chrome OS
Google chrome OS
 
Blue eye technology ppt
Blue eye technology pptBlue eye technology ppt
Blue eye technology ppt
 
Android
AndroidAndroid
Android
 
Network security
Network securityNetwork security
Network security
 
CLOUD COMPUTING
CLOUD COMPUTINGCLOUD COMPUTING
CLOUD COMPUTING
 
Applications of computer graphics
Applications of computer graphicsApplications of computer graphics
Applications of computer graphics
 

mobile application security

  • 2. 2 Definition: Mobile app security is the extent of protection that mobile device applications (apps) have from malware and the activities of crackers and other criminals.
  • 3. With the explosive growth of smartphones, tablets and mobile devices, companies must find a means of providing access to their internal systems and information to their mobile workforce securely and seamlessly. 3
  • 4.  Microsoft Exchange 2003  Blackberry Enterprise Server 4.1 SP7 ◦ 10,000 email boxes  2,000 using mobile devices  Only company provided Blackberry devices are supported 4
  • 5.  Confidentiality ◦ Commercial Data  Ex: Financial, IP, etc. ◦ Personal Data  Ex: Customer, Employee records, PCI, etc.  User Personal Data ◦ Diplomatic cables  Accessibility ◦ Resource uptime ◦ High Availability / Recoverability ◦ Archive 5 Maintain device flexibility while protecting against security risks
  • 6. • Business users today are more mobile than ever before and are looking to access the enterprise from multiple devices: – Apple iOS – Android – Blackberry – Windows Mobile • Users today are more technically skilled than before and are unfortunately able to develop “Business Managed Solutions” which may not meet the security requirements of the enterprise – Must securely support users on the 4 identified leading mobile platforms – Must leverage the significant existing Exchange and Blackberry investment High Level Requirements & Solution Approach The answer – A Mobile Device Management (MDM) Solution
  • 7. 7
  • 8.  MS Exchange ◦ Exchange 2003 or Exchange 2007 SP2 ◦ ActiveSync (EAS) enabled ◦ Enterprise Certificate services / certificate based authentication  Mobile Device support ◦ Support latest Mobile OS’s ◦ Employee-provided device ◦ Support for VPN, Wi-Fi, ActiveSync and encryption ◦ Centralized IT management & control ◦ Support for common file attachments 8
  • 9.  Security ◦ All devices should be enrolled into corporate network ◦ Provisioning of mobile devices should be secure ◦ Security policies should be targeted to right groups/employees ◦ Restriction of some/all mobile applications ◦ Complex/multi-character passwords required ◦ Updates of mobile OS required ◦ Encryption of all forms of corporate data ◦ Tracking and inventory of all devices ◦ Access control over corporate email system ◦ Sanction and disconnect modified devices or rouge device ◦ Selective/full remote wipe of device 9
  • 10. 10
  • 11. Good Technology  Manage & Protect access to vital company information  Without imprisoning the user or their device  With flexibility… ◦ Manage the entire device OR ◦ Manage the Good application  Plays nice in the mobile sandbox! 11 "Corporate policies should focus on regulating behavior, rather than devices..." — Gartner, May 2010
  • 12. 12
  • 13. 13
  • 14. FIREWALLS FIREWALLS AD / LDAP Services Email Servers Good Message Servers Good Mobile Control Good Mobile Access SQL Database Good NOC SSL 14
  • 15. Good Technology Solution Capital Expense Software (2000 licenses) $140,468 - Hardware $178,801 $34,410 Maintenance - $57,775 Sub Total $319,269 $92,185 TOTAL 2 year capacity $411,454 15 Per Device Comparison Blackberry Enterprise Server Good Technology Annual data plan service $504 $0* Annual Inclusive maintenance & support $4 $159 Total annual cost $508 $159 $0 $200,000 $400,000 $600,000 $800,000 $1,000,000 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Annual Cost Comparison of Mobility Run Rates Good Technology Blackberry ES
  • 16.  Financial Liability ◦ May be required to pay stipend for device/usage  Additionally corporate data plans apply in some instances ◦ Employee may be taxed for fringe benefit ◦ Nonexempt employees create issues  Legal Liability ◦ Evidence of illegal activity must not go unreported ◦ Archiving may be required 16
  • 17.  While some employees will only need access to PIM-data, many will need full device management.  In these cases, all data must be subject to review and/or archive by the company ◦ Email, SMS/MMS, IM, music, etc.  All activity (applications, browser, peripheral control, etc.) must be subject to audit and control at any time.  How to handle all of this?? 17
  • 18.  Most people will agree to any ToS without second thoughts.  Acceptance of the restrictions rely completely on employees’ understanding them  Rewards are worth the risks … 18
  • 19.  Despite shared liability, employee-provided cell phones for business purposes are extremely popular. ◦ Conveniences for employee ◦ Savings for employer  Trend will continue 19
  • 20.  Employee-owned mobile phones provide risks, challenges.  However, benefits are great to both company and employees.  Our provided solution, leveraging Good Technology, is the most efficient and feasible way to implement a corporate private mobile device policy. 20