NADAV PELEG
HEAD OF MOBILE
SECURITY
MOBILE
SECURITY
Petr Kadrmas
SE Eastern Europe
YOU DON’T NEED TO
BREAK A WINDOW TO
BREAK INTO A HOUSE
YOU JUST NEED
SOMEONE TO
LET YOU IN
MOBILE USERS ARE
3 VECTORS OF
Network Attacks OS ExploitsInfected Apps
DAMAGES
Tracking
Location
Stealing
Emails
Stealing
Contacts list
Microphone
Recordings
Taking
Photos
Stealing
Passwords
Hijacking
Messages
MAJOR ATTACKS
MISCONCEPTIONS
ABOUT MOBILE
SECURITY
#1
"EMM/MDM
can protect me."
#2
"Secure Container
can protect me."
#4
"iPhone is immune
against threats."
#5
"Mobile AV can
protect me."
#3
"It’s not a top
priority."
Container
EMM
1,200
Devices
BYOD
400
INFECTED
DEVICES
Credential
Stealers
Unauthorized
Root Kits
mRATs
Keyloggers
IT IS
A BIG DEAL
#1 #2 #3
#4 #5
"EMM/MDM
can protect me"
"Secure Container
can protect me"
"iPhone is immune
against threats"
"Mobile AV can
protect me"
MISCONCEPTIONS
ABOUT MOBILE
SECURITY
"It’s not a top
priority."
WHAT ABOUT
is iPhone immune
to threats?
iOS?
CAN YOU TRUST
3rd PARTY APP STORES?
25PP.com vShare.com
150M users, 25% iOS.
15,000 iOS apps
more than 40M users,
8M downloads a day
XcodeGhost
Collects user
and device data
and sends to
C&C server
Over 4,000
malicious apps in
Apple App Store
Source: blog.checkpoint.com
Side Stepper
BUT STILL…
ANDROID IS 17 TIMES MORE
PRONE TO THREATS THAN iOS*
Time gap from
vulnerability to fix
Only 20%
update Android OS
Google Play is less
secured than Apple
App Store
*Source: Check Point Mobile Threat Prevention Intelligence
WHAT ABOUT
Can mobile anti-virus
really protect me?
ANTI-VIRUS?
HOW MOBILE
ANTI-VIRUS
WORKS?
SIGNATURES
can be easily bypassed
by obfuscation
Bypassing AV Detection of Mobile Spyware
Malware
detected by
Anti Virus
Obfuscation
tool for
Android
apps Obfuscated version of
Phonetail app created
Malware
bypassed AV
inspection
UNKNOWN
MALWARE
AV CANNOT
PROTECT
AGAINST
#1 #2 #3
#4 #5
"EMM/MDM
can protect me"
"Secure Container
can protect me"
"iPhone is immune
against threats"
"Mobile AV can
protect me"
MISCONCEPTIONS
ABOUT MOBILE
SECURITY
"It’s not a top
priority."
MOBILE
SECURITY
BUILDING
BLOCKS
Mobile Device
Management
Policy Enforcement
Secure
Containers
Data Leakage
Prevention
Anti-Virus,
App Reputation
Known Threats
Mobile Threat Prevention
Unknown Threats and Zero Day
MOBILE THREAT PREVENTION
Advanced Threat
Detection and Mitigation
Best Mobile Threat
Catch Rate
Full Visibility
Simple Deployment
MDM
EMM
©2015 Check Point Software Technologies Ltd. 28
Threat Technologies
Advanced App
Analysis
Sandboxing (Emulation)
Advanced Static Code
Analysis
Uncovers new malware
and targeted exploits
Network Anomaly
Detection
Wi-Fi Man-in-the-Middle
(MitM) attacks
Evasive botnets and
time bomb malware
Host Threat
Analysis
Malicious
Configurations
Exploits and file system
manipulation
Threat Framework
Multi-dimensional
Risk/Trust assessments
Accurate risk
classifications to
effectively mitigate risk
[Protected] Non-confidential content
MAXIMUM
LEVEL OF
SECURITY
WITHOUT
IMPACTING
USABILITY
It’s All About the End
User Experience
©2015 Check Point Software Technologies Ltd. 31
Taking Mobile Security Beyond
Mobile Threat Prevention
[Restricted] ONLY for designated groups and individuals​
Mobile Threat
Prevention
Threat Prevention for
mobile devices
Capsule
Cloud
Protect laptops
when off the
business network
Capsule
Workspace & Docs
Protect business data
on mobile devices
Target solutions for mobile use-cases
©2015 Check Point Software Technologies Ltd. 32
Capsule Workspace
Protect business data E V E RY W H E R E
*****
SECURELY log-in
EASILY ACCESS
business applications
PLACE ONLY business information under
IT’s control
©2015 Check Point Software Technologies Ltd. 33
SECURITY FOLLOWS THE DOCUMENT
Classify
Share
Encrypt
Capsule Docs
THANK YOU

Mobile Security