SlideShare a Scribd company logo
1 of 22
Download to read offline
1
Qualcomm Technologies, Inc.
March 2016
Increasing privacy and security concerns
3
Malware Attacks
• Proliferation of malware
• Challenging malicious attacks
• Timely detection of new and unknown malware attacks
Authentication Issues
• Passwords are not working
• Current biometric challenges,
e.g. spoofing and consistency
• Device credibility/reputation
Privacy Concerns
• User control of personal data
• Lack of transparency
• Stolen personal data
An unprecedented number of intelligent, connected things
A vision for seamless and preemptive security
Enhancing security and privacy, while providing convenient user experience
4
Preemptive protection
Early detection and isolation of
unknown malicious attacks
Seamless authentication
Continuous, multi-factor
authentication
Enhanced privacy
Advanced privacy that lets users
control their data
On-device Hardware-based Cognitive
On-device processing is key for security and privacy
User privacy
Ability to enjoy services without the need to
upload sensitive personal data to the cloud
Critical data protection
On-device storage of keys and
biometric data
Always-on protection
Ability to deal with zero-day malware and
phishing attacks
Personalized security
Adapting to device capabilities and
user preferences
On-device
Hardware-based security is the foundation
Security embedded into the silicon and firmware
* Malicious code that gains low level access and remains hidden from apps and OS
Enhanced security
Ensuring overall system
security and device health
Extensible platform
Providing security services
through open standards
Rich user experience
Providing unobtrusive,
efficient solutions
Secure execution environment
Robust storage of keys
HW firewall to isolate security
functions from HLOS
HW cryptography engines Detection of rootkits* and malware
Hardware-based security
Cognitive technologies support better Security
By applying behavioral analysis
Behavioral classification
ActuationBehavioral observation
Monitors device software activities, as well as
apps and user behaviors
Classifies device and user activity based on
pre-defined behavior models
Takes intuitive actions to enable robust and
convenient security
Learns and adapts
Mobile Security vision & Qualcomm Solution
Providing preemptive protection and seamless authentication,
while protecting user privacy
Qualcomm Haven Security Solution
Built on the foundation of SecureMSM Technology
Qualcomm Security Solutions and Qualcomm SecureMSM are products of Qualcomm Technologies, Inc.
Hardware-based
foundation
Content
Protection
Privacy
Protection &
Malware
Detection
Theft
Deterrence
Authentication
Other existing and
upcoming security features
Qualcomm®
Snapdragon
Sense™ ID
biometrics
Qualcomm
SafeSwitch™
technology
Qualcomm®
Snapdragon
StudioAccess™
content protection
Qualcomm®
Snapdragon™
Smart Protect
11
SecureMSM technology
Hardware-based foundation for all Qualcomm Haven technologies
Qualcomm Snapdragon and Qualcomm Secure Execution Environment are products of Qualcomm Technologies, Inc.
• Secure boot
• Secure debug
• Secure storage
• Secure key provisioning
• Hardware encryption & random
number generator
• Hardware firewall
• Qualcomm® Secure Execution
Environment
• The security foundation for devices powered by
Qualcomm® Snapdragon™ processors and
Snapdragon modems.
• Uniquely based on a powerful combination of
hardware and software
What it is
Benefits
• Designed to provide a high level of security and
robustness, while maintaining high performance
and power efficiency
12
Preemptive protection
Early detection and isolation of unknown
malicious attacks
Seamless authentication
Continuous, multi-factor
authentication
Enhanced privacy
Advanced privacy that lets users control
their data
On-device Hardware-based Cognitive
A vision for seamless and preemptive security
Enhancing security and privacy, while providing convenient user experience
13
Snapdragon Sense ID 3D fingerprint technology
An industry leader with new capabilities
Stronger Material
Penetration
Ultrasonic verify that an actual
finger is being used for
authentication
Even stronger ultrasonics penetrate
through thicker metal (up to 400 µm)
and cover glass (up to 400 µm),
allowing for more design options
Liveness
Detection
Authentication
on Wake-up
Placing the ultrasonic sensor
under the cover glass at the
home/wake-up touch point
allows for convenient, frequent
and secure authentication
Actual
finger
Difficult
to spoof
Snapdragon Sense ID 3D fingerprint technology
The mobile industry’s first end-to-end ultrasonic-based biometrics solution
Device Material
Platen
Sensor
Qualcomm® Biometric
Integrated Circuit
FIDO
Server
Qualcomm® Snapdragon™
Processor
SecureM
SM
Data stays on the device
Captures three-dimensional
acoustic detail within the outer
layers of skin
Superior imaging detail for
accurate detection of unique
fingerprint characteristics
Less likely to be spoofed than
capacitive-based sensors
Qualcomm Snapdragon and Qualcomm Biometric Integrated Circuit are products of Qualcomm Technologies, Inc.
15
Preemptive protection
Early detection and isolation of
unknown malicious attacks
Seamless authentication
Continuous, multi-factor
authentication
Enhanced privacy
Advanced privacy that lets users control
their data
On-device Hardware-based Cognitive
A vision for seamless and preemptive security
Enhancing security and privacy, while providing convenient user experience
Providing preemptive protection from zero-day malware
Protecting users before they see an issue
Detection Blocking Removal
Zero-day protection
• System-wide behavioral analysis
• Detection of rootkits
• Block malicious activities • Uninstall malware
Snapdragon Smart Protect - Behavioral analysis
complements signature-based detection
Transformed
Malware
Unknown
Malware
Malware attack
Known
Malware
Signature-based detection
Searches for a known
virus identity or signature
Behavioral-based detection
Searches for suspicious or
anomalous software activity
Unique signature
178e2481067b194e00187cfaadb12f4d
Abnormal behavior
Send SMS while screen locked
Abnormal behavior
Send SMS with no user interaction
Detects and blocks
known malware based on
their unique signatures
Always-on device
behavioral analysis
detects and blocks
malware
A vision for seamless and preemptive security
Enhancing security and privacy, while providing convenient user experience
18
Preemptive protection
Early detection and isolation of unknown
malicious attacks
Seamless authentication
Continuous, multi-factor
authentication
Enhanced privacy
Advanced privacy that lets users
control their data
On-device Hardware-based Cognitive
19
Snapdragon StudioAccess content protection
Comprehensive content security
* where such content is offered.
• Utilizes SecureMSM
foundation to support
comprehensive protection
of premium video content
• Supports popular industry
DRM (digital rights
management) solutions
• Recognized by major
Hollywood film studios
Movie
Distribution
Service
From
Device
Storage
Secure Execution
Environment
Snapdragon-powered mobile device
Snapdragon StudioAccess
GPU
HW
Video
codec
MDP
Snapdragon
Modem
WWAN
WLAN
HW
Crypto
Engine
Secure DRMs
Widevine PlayReady HDCP2.2
Content unencrypted and not accessible
outside of Snapdragon StudioAccess
Benefits
What it is
• Users of Snapdragon
powered devices can enjoy
the latest premium studio
content, at up to 4K Ultra
HD resolution*
20
Qualcomm SafeSwitch technology
Phone lost
/ stolen
Code
1 7 2 1
Phone
found
Unlock1 7 2 1
• Technology that helps enable users to remotely
disable their mobile devices if they’re lost or
stolen and re-enable them if they’re found
• Includes hardware SIM Lock to disable
connectivity if owner’s SIM is removed
What it is
Benefits
• Designed to help prevent device theft and
protect user data and privacy
• Built to confirm that device lock requests are
coming from a trustworthy source, decreasing
the likelihood of malicious device lock attacks
Conclusion
Qualcomm Technologies security leadership
By building on its hardware-based foundation, Qualcomm has been
offering proven security solutions for billions of devices since 2008
Qualcomm Technologies security leadership
Uniquely positioned to address security issues
Industry traction
• Qualcomm security powers
billions of devices
• Qualcomm® Snapdragon
SecureMSM™ technology first
introduced 2008
• 1st to receive Common Criteria’s
Mobile Device Fundamentals
Protection Profile
(MDFPP) certification
History of success
• End-to-end solutions
• Hardware-based security
foundation
• Custom hardware engines and
integrated software
Holistic system approach
• Active participants in many
open standards
• Working with leading security
application providers
Ecosystem support
Qualcomm to offer broad ecosystem support
Driving end-to-end security solutions through collaboration and support
Industry
organizations
• FIDO
• SCSA
• GlobalPlatform
• Trusted Computing
Group
• W3C
Public
policies
• Certification (e.g.
Common Criteria, FIPS
140-2)
• Data protection and
privacy regulations (e.g.
HIPPA)
• Phone theft, fraud (e.g.
Kill Switch)
• Cybersecurity
Software and
services
• Open standards
• Provisioningand signing
services
• Software development
kits
• Trusted execution
environment porting
kits
OEM and operator
support
• Manage unique keys
per device
• Key provisioning and
services
• Sensor porting kits
Ecosystem
partners
• Studios
• Financial institutions
• Enterprise services
• Public sector (e.g.
healthcare)
• Distributors
For more information on Qualcomm, visit us at:
www.qualcomm.com & www.qualcomm.com/blog
Qualcomm is a trademark of Qualcomm Incorporated, registered in the United States and other countries.
Other products and brand names may be trademarks or registered trademarks of their respective owners
Thank you
Follow us on:
24

More Related Content

What's hot

KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh OjhaKazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh OjhaYogesh Ojha
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Dejan Pogačnik
 
End Point Security - K7
End Point Security - K7End Point Security - K7
End Point Security - K7Prime Infoserv
 
The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0Javier Gonzalez
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...Seungjoo Kim
 
ios device protection review
ios device protection reviewios device protection review
ios device protection reviewnlog2n
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael FirstenbergTI Safe
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Javier Gonzalez
 
Venkasure Total Security + Presentation
Venkasure Total Security + PresentationVenkasure Total Security + Presentation
Venkasure Total Security + Presentationvenkasureantivirus
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityIntel IT Center
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefLancope, Inc.
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System SecurityAdel Barkam
 

What's hot (20)

CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh OjhaKazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015
 
End Point Security - K7
End Point Security - K7End Point Security - K7
End Point Security - K7
 
The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
 
ios device protection review
ios device protection reviewios device protection review
ios device protection review
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Venkasure Total Security + Presentation
Venkasure Total Security + PresentationVenkasure Total Security + Presentation
Venkasure Total Security + Presentation
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System Security
 
IoT Security
IoT SecurityIoT Security
IoT Security
 

Viewers also liked

Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technologyshams tabrez
 
Face Recognition
Face RecognitionFace Recognition
Face Recognitionlaknatha
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5GBharathi Ravi
 
Network Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile TecnologyNetwork Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile Tecnologyvineetkathan
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless TechnologyNiki Upadhyay
 

Viewers also liked (16)

The dildo diary's
The dildo diary'sThe dildo diary's
The dildo diary's
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Demystifying Apple 'Pie' & TouchID
Demystifying Apple 'Pie' & TouchIDDemystifying Apple 'Pie' & TouchID
Demystifying Apple 'Pie' & TouchID
 
Lifi ppt
Lifi pptLifi ppt
Lifi ppt
 
face recognition
face recognitionface recognition
face recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Snapdragon
SnapdragonSnapdragon
Snapdragon
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
5G tecnology
5G tecnology5G tecnology
5G tecnology
 
Lifi ppt
Lifi pptLifi ppt
Lifi ppt
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G1G vs 2G vs 3G vs 4G vs 5G
1G vs 2G vs 3G vs 4G vs 5G
 
Network Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile TecnologyNetwork Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile Tecnology
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 

Similar to Increasing privacy and security concerns addressed by Qualcomm's mobile security vision

Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Emrah Alpa, CISSP CEH CCSK
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Kjetil Lund-Paulsen
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
PRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataPRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataBlackBerry
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesInductive Automation
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliJürgen Ambrosi
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesInductive Automation
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
 

Similar to Increasing privacy and security concerns addressed by Qualcomm's mobile security vision (20)

Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
 
Symantec Endpoint Suite
Symantec Endpoint SuiteSymantec Endpoint Suite
Symantec Endpoint Suite
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
PRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataPRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your Data
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 

More from Tien Hoang

Quy hoạch CNTT thành phố Hà Nôi mr. dang vu tuan - Phó Giám đốc so tttt hn
Quy hoạch CNTT thành phố Hà Nôi   mr. dang vu tuan - Phó Giám đốc so tttt hnQuy hoạch CNTT thành phố Hà Nôi   mr. dang vu tuan - Phó Giám đốc so tttt hn
Quy hoạch CNTT thành phố Hà Nôi mr. dang vu tuan - Phó Giám đốc so tttt hnTien Hoang
 
Tôi đã-kiếm-tiền-với-youtube-như-thế-nào
Tôi đã-kiếm-tiền-với-youtube-như-thế-nàoTôi đã-kiếm-tiền-với-youtube-như-thế-nào
Tôi đã-kiếm-tiền-với-youtube-như-thế-nàoTien Hoang
 
youtube-content ideas tien hoang
youtube-content ideas tien hoang youtube-content ideas tien hoang
youtube-content ideas tien hoang Tien Hoang
 
Fiber gen adsgoogle-final
Fiber gen adsgoogle-finalFiber gen adsgoogle-final
Fiber gen adsgoogle-finalTien Hoang
 
FPT - Áp dụng luật viễn thông ra sao ?
FPT - Áp dụng luật viễn thông ra sao ? FPT - Áp dụng luật viễn thông ra sao ?
FPT - Áp dụng luật viễn thông ra sao ? Tien Hoang
 
VNPT và Luật Viễn thông
VNPT và Luật Viễn thông VNPT và Luật Viễn thông
VNPT và Luật Viễn thông Tien Hoang
 
báo cáo cục tần số vtđ
báo cáo cục tần số vtđbáo cáo cục tần số vtđ
báo cáo cục tần số vtđTien Hoang
 
Báo cáo cục trưởng cục viễn thông -Luật mới được áp dụng
Báo cáo cục trưởng cục viễn thông -Luật mới được áp dụng Báo cáo cục trưởng cục viễn thông -Luật mới được áp dụng
Báo cáo cục trưởng cục viễn thông -Luật mới được áp dụng Tien Hoang
 
Survey Smarphone In Viet Nam
Survey Smarphone In Viet Nam Survey Smarphone In Viet Nam
Survey Smarphone In Viet Nam Tien Hoang
 
World Development Report 2016: Digital Dividends
World Development Report 2016: Digital DividendsWorld Development Report 2016: Digital Dividends
World Development Report 2016: Digital DividendsTien Hoang
 
Global internet-data2011-microadvert
Global internet-data2011-microadvertGlobal internet-data2011-microadvert
Global internet-data2011-microadvertTien Hoang
 
Microadvert e-commerce
Microadvert e-commerceMicroadvert e-commerce
Microadvert e-commerceTien Hoang
 
Ung dung ms_excel_trong_kinh_te
Ung dung ms_excel_trong_kinh_teUng dung ms_excel_trong_kinh_te
Ung dung ms_excel_trong_kinh_teTien Hoang
 
Muc sinh loi rui ro dtck
Muc sinh loi rui ro dtckMuc sinh loi rui ro dtck
Muc sinh loi rui ro dtckTien Hoang
 

More from Tien Hoang (14)

Quy hoạch CNTT thành phố Hà Nôi mr. dang vu tuan - Phó Giám đốc so tttt hn
Quy hoạch CNTT thành phố Hà Nôi   mr. dang vu tuan - Phó Giám đốc so tttt hnQuy hoạch CNTT thành phố Hà Nôi   mr. dang vu tuan - Phó Giám đốc so tttt hn
Quy hoạch CNTT thành phố Hà Nôi mr. dang vu tuan - Phó Giám đốc so tttt hn
 
Tôi đã-kiếm-tiền-với-youtube-như-thế-nào
Tôi đã-kiếm-tiền-với-youtube-như-thế-nàoTôi đã-kiếm-tiền-với-youtube-như-thế-nào
Tôi đã-kiếm-tiền-với-youtube-như-thế-nào
 
youtube-content ideas tien hoang
youtube-content ideas tien hoang youtube-content ideas tien hoang
youtube-content ideas tien hoang
 
Fiber gen adsgoogle-final
Fiber gen adsgoogle-finalFiber gen adsgoogle-final
Fiber gen adsgoogle-final
 
FPT - Áp dụng luật viễn thông ra sao ?
FPT - Áp dụng luật viễn thông ra sao ? FPT - Áp dụng luật viễn thông ra sao ?
FPT - Áp dụng luật viễn thông ra sao ?
 
VNPT và Luật Viễn thông
VNPT và Luật Viễn thông VNPT và Luật Viễn thông
VNPT và Luật Viễn thông
 
báo cáo cục tần số vtđ
báo cáo cục tần số vtđbáo cáo cục tần số vtđ
báo cáo cục tần số vtđ
 
Báo cáo cục trưởng cục viễn thông -Luật mới được áp dụng
Báo cáo cục trưởng cục viễn thông -Luật mới được áp dụng Báo cáo cục trưởng cục viễn thông -Luật mới được áp dụng
Báo cáo cục trưởng cục viễn thông -Luật mới được áp dụng
 
Survey Smarphone In Viet Nam
Survey Smarphone In Viet Nam Survey Smarphone In Viet Nam
Survey Smarphone In Viet Nam
 
World Development Report 2016: Digital Dividends
World Development Report 2016: Digital DividendsWorld Development Report 2016: Digital Dividends
World Development Report 2016: Digital Dividends
 
Global internet-data2011-microadvert
Global internet-data2011-microadvertGlobal internet-data2011-microadvert
Global internet-data2011-microadvert
 
Microadvert e-commerce
Microadvert e-commerceMicroadvert e-commerce
Microadvert e-commerce
 
Ung dung ms_excel_trong_kinh_te
Ung dung ms_excel_trong_kinh_teUng dung ms_excel_trong_kinh_te
Ung dung ms_excel_trong_kinh_te
 
Muc sinh loi rui ro dtck
Muc sinh loi rui ro dtckMuc sinh loi rui ro dtck
Muc sinh loi rui ro dtck
 

Recently uploaded

Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFOrient Homes
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherPerry Belcher
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...lizamodels9
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCRsoniya singh
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCRsoniya singh
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 

Recently uploaded (20)

Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 

Increasing privacy and security concerns addressed by Qualcomm's mobile security vision

  • 2. Increasing privacy and security concerns 3 Malware Attacks • Proliferation of malware • Challenging malicious attacks • Timely detection of new and unknown malware attacks Authentication Issues • Passwords are not working • Current biometric challenges, e.g. spoofing and consistency • Device credibility/reputation Privacy Concerns • User control of personal data • Lack of transparency • Stolen personal data An unprecedented number of intelligent, connected things
  • 3. A vision for seamless and preemptive security Enhancing security and privacy, while providing convenient user experience 4 Preemptive protection Early detection and isolation of unknown malicious attacks Seamless authentication Continuous, multi-factor authentication Enhanced privacy Advanced privacy that lets users control their data On-device Hardware-based Cognitive
  • 4. On-device processing is key for security and privacy User privacy Ability to enjoy services without the need to upload sensitive personal data to the cloud Critical data protection On-device storage of keys and biometric data Always-on protection Ability to deal with zero-day malware and phishing attacks Personalized security Adapting to device capabilities and user preferences On-device
  • 5. Hardware-based security is the foundation Security embedded into the silicon and firmware * Malicious code that gains low level access and remains hidden from apps and OS Enhanced security Ensuring overall system security and device health Extensible platform Providing security services through open standards Rich user experience Providing unobtrusive, efficient solutions Secure execution environment Robust storage of keys HW firewall to isolate security functions from HLOS HW cryptography engines Detection of rootkits* and malware Hardware-based security
  • 6. Cognitive technologies support better Security By applying behavioral analysis Behavioral classification ActuationBehavioral observation Monitors device software activities, as well as apps and user behaviors Classifies device and user activity based on pre-defined behavior models Takes intuitive actions to enable robust and convenient security Learns and adapts
  • 7. Mobile Security vision & Qualcomm Solution Providing preemptive protection and seamless authentication, while protecting user privacy
  • 8. Qualcomm Haven Security Solution Built on the foundation of SecureMSM Technology Qualcomm Security Solutions and Qualcomm SecureMSM are products of Qualcomm Technologies, Inc. Hardware-based foundation Content Protection Privacy Protection & Malware Detection Theft Deterrence Authentication Other existing and upcoming security features Qualcomm® Snapdragon Sense™ ID biometrics Qualcomm SafeSwitch™ technology Qualcomm® Snapdragon StudioAccess™ content protection Qualcomm® Snapdragon™ Smart Protect
  • 9. 11 SecureMSM technology Hardware-based foundation for all Qualcomm Haven technologies Qualcomm Snapdragon and Qualcomm Secure Execution Environment are products of Qualcomm Technologies, Inc. • Secure boot • Secure debug • Secure storage • Secure key provisioning • Hardware encryption & random number generator • Hardware firewall • Qualcomm® Secure Execution Environment • The security foundation for devices powered by Qualcomm® Snapdragon™ processors and Snapdragon modems. • Uniquely based on a powerful combination of hardware and software What it is Benefits • Designed to provide a high level of security and robustness, while maintaining high performance and power efficiency
  • 10. 12 Preemptive protection Early detection and isolation of unknown malicious attacks Seamless authentication Continuous, multi-factor authentication Enhanced privacy Advanced privacy that lets users control their data On-device Hardware-based Cognitive A vision for seamless and preemptive security Enhancing security and privacy, while providing convenient user experience
  • 11. 13 Snapdragon Sense ID 3D fingerprint technology An industry leader with new capabilities Stronger Material Penetration Ultrasonic verify that an actual finger is being used for authentication Even stronger ultrasonics penetrate through thicker metal (up to 400 µm) and cover glass (up to 400 µm), allowing for more design options Liveness Detection Authentication on Wake-up Placing the ultrasonic sensor under the cover glass at the home/wake-up touch point allows for convenient, frequent and secure authentication Actual finger Difficult to spoof
  • 12. Snapdragon Sense ID 3D fingerprint technology The mobile industry’s first end-to-end ultrasonic-based biometrics solution Device Material Platen Sensor Qualcomm® Biometric Integrated Circuit FIDO Server Qualcomm® Snapdragon™ Processor SecureM SM Data stays on the device Captures three-dimensional acoustic detail within the outer layers of skin Superior imaging detail for accurate detection of unique fingerprint characteristics Less likely to be spoofed than capacitive-based sensors Qualcomm Snapdragon and Qualcomm Biometric Integrated Circuit are products of Qualcomm Technologies, Inc.
  • 13. 15 Preemptive protection Early detection and isolation of unknown malicious attacks Seamless authentication Continuous, multi-factor authentication Enhanced privacy Advanced privacy that lets users control their data On-device Hardware-based Cognitive A vision for seamless and preemptive security Enhancing security and privacy, while providing convenient user experience
  • 14. Providing preemptive protection from zero-day malware Protecting users before they see an issue Detection Blocking Removal Zero-day protection • System-wide behavioral analysis • Detection of rootkits • Block malicious activities • Uninstall malware
  • 15. Snapdragon Smart Protect - Behavioral analysis complements signature-based detection Transformed Malware Unknown Malware Malware attack Known Malware Signature-based detection Searches for a known virus identity or signature Behavioral-based detection Searches for suspicious or anomalous software activity Unique signature 178e2481067b194e00187cfaadb12f4d Abnormal behavior Send SMS while screen locked Abnormal behavior Send SMS with no user interaction Detects and blocks known malware based on their unique signatures Always-on device behavioral analysis detects and blocks malware
  • 16. A vision for seamless and preemptive security Enhancing security and privacy, while providing convenient user experience 18 Preemptive protection Early detection and isolation of unknown malicious attacks Seamless authentication Continuous, multi-factor authentication Enhanced privacy Advanced privacy that lets users control their data On-device Hardware-based Cognitive
  • 17. 19 Snapdragon StudioAccess content protection Comprehensive content security * where such content is offered. • Utilizes SecureMSM foundation to support comprehensive protection of premium video content • Supports popular industry DRM (digital rights management) solutions • Recognized by major Hollywood film studios Movie Distribution Service From Device Storage Secure Execution Environment Snapdragon-powered mobile device Snapdragon StudioAccess GPU HW Video codec MDP Snapdragon Modem WWAN WLAN HW Crypto Engine Secure DRMs Widevine PlayReady HDCP2.2 Content unencrypted and not accessible outside of Snapdragon StudioAccess Benefits What it is • Users of Snapdragon powered devices can enjoy the latest premium studio content, at up to 4K Ultra HD resolution*
  • 18. 20 Qualcomm SafeSwitch technology Phone lost / stolen Code 1 7 2 1 Phone found Unlock1 7 2 1 • Technology that helps enable users to remotely disable their mobile devices if they’re lost or stolen and re-enable them if they’re found • Includes hardware SIM Lock to disable connectivity if owner’s SIM is removed What it is Benefits • Designed to help prevent device theft and protect user data and privacy • Built to confirm that device lock requests are coming from a trustworthy source, decreasing the likelihood of malicious device lock attacks
  • 19. Conclusion Qualcomm Technologies security leadership By building on its hardware-based foundation, Qualcomm has been offering proven security solutions for billions of devices since 2008
  • 20. Qualcomm Technologies security leadership Uniquely positioned to address security issues Industry traction • Qualcomm security powers billions of devices • Qualcomm® Snapdragon SecureMSM™ technology first introduced 2008 • 1st to receive Common Criteria’s Mobile Device Fundamentals Protection Profile (MDFPP) certification History of success • End-to-end solutions • Hardware-based security foundation • Custom hardware engines and integrated software Holistic system approach • Active participants in many open standards • Working with leading security application providers Ecosystem support
  • 21. Qualcomm to offer broad ecosystem support Driving end-to-end security solutions through collaboration and support Industry organizations • FIDO • SCSA • GlobalPlatform • Trusted Computing Group • W3C Public policies • Certification (e.g. Common Criteria, FIPS 140-2) • Data protection and privacy regulations (e.g. HIPPA) • Phone theft, fraud (e.g. Kill Switch) • Cybersecurity Software and services • Open standards • Provisioningand signing services • Software development kits • Trusted execution environment porting kits OEM and operator support • Manage unique keys per device • Key provisioning and services • Sensor porting kits Ecosystem partners • Studios • Financial institutions • Enterprise services • Public sector (e.g. healthcare) • Distributors
  • 22. For more information on Qualcomm, visit us at: www.qualcomm.com & www.qualcomm.com/blog Qualcomm is a trademark of Qualcomm Incorporated, registered in the United States and other countries. Other products and brand names may be trademarks or registered trademarks of their respective owners Thank you Follow us on: 24