Watch the slide show
The Cybersecurity Opportunity
Q: What does T.A.S.C mean?
A: The Art & Science of Cybersecurity
Q: What is TASC?
A: A cybersecurity dashboard that allows users to activate numerous
security apps that protect mobile devices
Q: What specific security solutions does TASC provide?
A: Anti theft. If a device is stolen, device owners can track it, control
it, wipe data from it. Whys is this important? BYOD – see the next slide
TASC also provides an app for secure communication that encrypts
voice and SMS communication. Other apps are in the pipeline.
Q: Why is mobile security important?
A: BYOD (Bring Your Own Device)
 84% use the same smartphone for work and for personal usage.
 81% of employed adults use at least one personally owned
electronic device for business
 59% use their mobile devices to run line-of-business applications
 74% of companies allow BYOD usage in some manner
 1/3 use mobile devices exclusively
Source: Experian Mobile Security Survey, November 2013 (Harris Interactive)
Q: What are CISO’s concerned with?
A: Mobile devices such as smart phones and tablets.
Source: EC-Council
Mobile security from a user perspective
 50% of companies have experienced a data breach due to inadequate device
security
 47% don’t have a password on their mobile phone.
 51% stated their companies couldn’t execute a remote wipe if lost or stolen.
 49% said mobile security has not been addressed with them by IT.
Source: EC-Council
Mobile Malware Trends
 98% of all mobile malware targets Android users
 Kaspersky: 3.4M malware detections on 1.1M devices
 60% of all attacks are capable of stealing users’ money
 Reported attacks have increased 6X! (from 35K in August 2013 to 242K as of
March 2014 Real-time Endpoint Threat Detection and Response 14
Source: EC-Council
Summary
 TASC allows enterprise customers (and or individuals) to control mobile devices
in order to minimize security threats from stolen or virus inflected devices.
 TASC focuses initially on Android due to high rate of security breaches.
 TASC provides a suite of solutions that work together so users don’t have to
hope that apps work together.
 Apps for antivirus, permanent data destruction and others are in the pipeline.

T.A.S.C - mobile device secuirty

  • 1.
  • 2.
  • 3.
    Q: What doesT.A.S.C mean? A: The Art & Science of Cybersecurity Q: What is TASC? A: A cybersecurity dashboard that allows users to activate numerous security apps that protect mobile devices Q: What specific security solutions does TASC provide? A: Anti theft. If a device is stolen, device owners can track it, control it, wipe data from it. Whys is this important? BYOD – see the next slide TASC also provides an app for secure communication that encrypts voice and SMS communication. Other apps are in the pipeline.
  • 4.
    Q: Why ismobile security important? A: BYOD (Bring Your Own Device)  84% use the same smartphone for work and for personal usage.  81% of employed adults use at least one personally owned electronic device for business  59% use their mobile devices to run line-of-business applications  74% of companies allow BYOD usage in some manner  1/3 use mobile devices exclusively Source: Experian Mobile Security Survey, November 2013 (Harris Interactive)
  • 5.
    Q: What areCISO’s concerned with? A: Mobile devices such as smart phones and tablets. Source: EC-Council
  • 6.
    Mobile security froma user perspective  50% of companies have experienced a data breach due to inadequate device security  47% don’t have a password on their mobile phone.  51% stated their companies couldn’t execute a remote wipe if lost or stolen.  49% said mobile security has not been addressed with them by IT. Source: EC-Council
  • 7.
    Mobile Malware Trends 98% of all mobile malware targets Android users  Kaspersky: 3.4M malware detections on 1.1M devices  60% of all attacks are capable of stealing users’ money  Reported attacks have increased 6X! (from 35K in August 2013 to 242K as of March 2014 Real-time Endpoint Threat Detection and Response 14 Source: EC-Council
  • 8.
    Summary  TASC allowsenterprise customers (and or individuals) to control mobile devices in order to minimize security threats from stolen or virus inflected devices.  TASC focuses initially on Android due to high rate of security breaches.  TASC provides a suite of solutions that work together so users don’t have to hope that apps work together.  Apps for antivirus, permanent data destruction and others are in the pipeline.