SlideShare a Scribd company logo
The Evolution of
Mobile Security
Fifteen years of learning from mobile mistakes
The first
smartphones
start to appear
Palm added email, basic
web access and a phone to
a personal organizerwith
the Treo 650. There was
almost no security.
2004
2006
Nokia’s N95 made
camera, music and
GPS a priority.
Name: Software 2.0
Publisher: ABD Software Inc.
From: http//: ABDsoftware2.com
CERTIFICATE
Symbian and
Nokia take viruses
seriously
Symbian 9 required most
apps to be signed to
protect against viruses.
2007
Early iPhones used ASLR, code signing,
sandboxing and hardware encryption,
setting new expectations forphones.
Hash
Function
Code Hashed Code Signed Code
SignatureEncrypt Hash Using
a Private Key
Attached
to Code
Encrypted Hash &
Time Stamp
Apple reinvents the phone with
open software, closed hardware
Read on formore Mobile Security historical facts
Protect Your Enterprise With
Samsung Knox Security
Discoverwhy Samsung phones are the most secure
and manageable mobile devices available.
2008
Policies
Manage
Devices
InfoSec and
ITManagers
Exchange Server
With ActiveSync
Microsoft Exchange
ActiveSync (EAS)
builds in MDM
Microsoft built basic MDM
feature into EAS, bolstering
admin security. BlackBerry
broadened MDM beyond
Exchange in 2009.
Mobile Devices
2010
Android v2.2 makes
EAS management easy
with built-in support
Security policy controls like remote
wipe became part of mainstream
Android, shifting it toward
enterprise environments.
REMOTE
WIPE
2012
Samsung Knox identifies
key enterprise security
requirements
Samsung began investing in
securityto make Android
enterprise-safe, pushing
features like SE Linux into
the mainstream.
2013
TrustZone, a secure
mode supported by
ARM processors,
protects information
against compromise.
Normal
Apps
Nonsecure World
Client TEE API
Rich OS
Trusted
Apps
Secure World
Secure TEE API
Trusted OS
Monitor
ARM Security Extensions
TrustZone protects
encryption keys and
identity information
2014 2017
READ
ONLY
RKP
SECURE WORLD NORMALWORLD
KERNEL
Control instructions and page table
update functions are replaced by
traps to the Secure World
Page tables are mapped
read-only so they cannot be
directly modified by the kernel
Galaxy Note4
(2014)
Galaxy Note Edge
(2014)
Galaxy Note5
(2015)
Galaxy S7
(2016)
Galaxy Note8
(2017)
Galaxy S8
(2017)
Samsung
Knox innovations
continue to add
security to Android
Knox brought critical features to
Android, like biometrics, real-time
kernel protection and separate
work/home profiles.
2018
Samsung Knox continues
to blaze the trail in mobile
security, as olderfeatures
are reimagined by Google
forAndroid.
Knox 3.0 joins Google’s
Android Enterprise with
Samsung security
©2019 Samsung Electronics America, Inc. Samsung is a registered mark of Samsung Electronics Corp., Ltd. All brand, product,
service names and logos are trademarks and/or registered trademarks of their respective manufacturers and companies.
Samsung Knox security empowers
enterprises to go mobile-first confidently.

More Related Content

What's hot

Cyber security in smart cities
Cyber security in smart cities  Cyber security in smart cities
Cyber security in smart cities
Aboul Ella Hassanien
 
Mobile computing
Mobile computingMobile computing
Mobile computing
kalyani reddy
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
Lai Yoong Seng
 
build small WLAN.pptx
build small WLAN.pptxbuild small WLAN.pptx
build small WLAN.pptx
Jaleto Sunkemo
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspective
Raj Pratim Bhattacharya
 
The history of mobile phones
The history of mobile phonesThe history of mobile phones
The history of mobile phones
Slides4Victor
 
bluejacking
bluejackingbluejacking
bluejacking
Jyoti Chintadi
 
Understanding Android Security
Understanding Android SecurityUnderstanding Android Security
Understanding Android Security
Asanka Dilruk
 
Android Security
Android SecurityAndroid Security
Android Security
Suminda Gunawardhana
 
VoiceXML
VoiceXMLVoiceXML
VoiceXML
Abbas Hashmi
 
Tetra\Tetra
Tetra\TetraTetra\Tetra
Tetra\Tetra
Deepak Sharma
 
Design history of the mobile phone
Design history of the mobile phoneDesign history of the mobile phone
Design history of the mobile phone
KillianStone
 
Bluetooth PPT Report
Bluetooth PPT ReportBluetooth PPT Report
Bluetooth PPT Report
Bilal Maqbool ツ
 
Huaweinetworkicondatabasev2 130509181727-phpapp02
Huaweinetworkicondatabasev2 130509181727-phpapp02Huaweinetworkicondatabasev2 130509181727-phpapp02
Huaweinetworkicondatabasev2 130509181727-phpapp02
taipm1986
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security model
Pragati Rai
 
5G report
5G report5G report
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
pariluv
 
Mobile technology presentation
Mobile technology presentation Mobile technology presentation
Mobile technology presentation
Clair Waterbury
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
Rajeev N
 

What's hot (20)

Cyber security in smart cities
Cyber security in smart cities  Cyber security in smart cities
Cyber security in smart cities
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
build small WLAN.pptx
build small WLAN.pptxbuild small WLAN.pptx
build small WLAN.pptx
 
Android vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspectiveAndroid vs ios System Architecture in OS perspective
Android vs ios System Architecture in OS perspective
 
The history of mobile phones
The history of mobile phonesThe history of mobile phones
The history of mobile phones
 
bluejacking
bluejackingbluejacking
bluejacking
 
Understanding Android Security
Understanding Android SecurityUnderstanding Android Security
Understanding Android Security
 
Android Security
Android SecurityAndroid Security
Android Security
 
VoiceXML
VoiceXMLVoiceXML
VoiceXML
 
Tetra\Tetra
Tetra\TetraTetra\Tetra
Tetra\Tetra
 
Design history of the mobile phone
Design history of the mobile phoneDesign history of the mobile phone
Design history of the mobile phone
 
Bluetooth PPT Report
Bluetooth PPT ReportBluetooth PPT Report
Bluetooth PPT Report
 
Huaweinetworkicondatabasev2 130509181727-phpapp02
Huaweinetworkicondatabasev2 130509181727-phpapp02Huaweinetworkicondatabasev2 130509181727-phpapp02
Huaweinetworkicondatabasev2 130509181727-phpapp02
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security model
 
5G report
5G report5G report
5G report
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
 
Mobile technology presentation
Mobile technology presentation Mobile technology presentation
Mobile technology presentation
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
 

Similar to The Evolution of Mobile Security

Samsung and Android Security brochure
Samsung and Android Security brochureSamsung and Android Security brochure
Samsung and Android Security brochure
Sherief Razzaque
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
Samsung Biz Mobile
 
Samsung knox the most secure android solution
Samsung knox   the most secure android solutionSamsung knox   the most secure android solution
Samsung knox the most secure android solution
Javier Gonzalez
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
IAEME Publication
 
smart phone
smart phonesmart phone
smart phone
Sri Rakesh
 
FIDO Present and Future from the mobile Perspective
FIDO Present and Future from the  mobile PerspectiveFIDO Present and Future from the  mobile Perspective
FIDO Present and Future from the mobile Perspective
FIDO Alliance
 
Smartphone 110810195522-phpapp02
Smartphone 110810195522-phpapp02Smartphone 110810195522-phpapp02
Smartphone 110810195522-phpapp02
Ramya Shet J
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
Kim Jensen
 
What Android for Work Means for the Enterprise
What Android for Work Means for the EnterpriseWhat Android for Work Means for the Enterprise
What Android for Work Means for the Enterprise
Alexander Romero
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business.
Samsung Biz Mobile
 
a study of evolutionary mobile operating system
a study of evolutionary mobile operating system a study of evolutionary mobile operating system
a study of evolutionary mobile operating system
aravindhawan
 
Android
AndroidAndroid
Android
9994426949
 
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORMPERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
IJNSA Journal
 
Workshop on Android App Development
Workshop on Android App DevelopmentWorkshop on Android App Development
Workshop on Android App Development
Entwicklers
 
Android os(comparison all other mobile os)
Android os(comparison all other mobile os)Android os(comparison all other mobile os)
Android os(comparison all other mobile os)
DivyaKS12
 
Network
Network Network
Network
AksharaaJha
 
Android123
Android123Android123
Android123
Mahesh Gurram
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
Javier Gonzalez
 
Android System Design And Power Management
Android System Design And Power ManagementAndroid System Design And Power Management
Android System Design And Power Management
Nilay Mishra
 
Mobile Operating System
Mobile Operating SystemMobile Operating System
Mobile Operating System
Sonal Poddar
 

Similar to The Evolution of Mobile Security (20)

Samsung and Android Security brochure
Samsung and Android Security brochureSamsung and Android Security brochure
Samsung and Android Security brochure
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
Samsung knox the most secure android solution
Samsung knox   the most secure android solutionSamsung knox   the most secure android solution
Samsung knox the most secure android solution
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
smart phone
smart phonesmart phone
smart phone
 
FIDO Present and Future from the mobile Perspective
FIDO Present and Future from the  mobile PerspectiveFIDO Present and Future from the  mobile Perspective
FIDO Present and Future from the mobile Perspective
 
Smartphone 110810195522-phpapp02
Smartphone 110810195522-phpapp02Smartphone 110810195522-phpapp02
Smartphone 110810195522-phpapp02
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
What Android for Work Means for the Enterprise
What Android for Work Means for the EnterpriseWhat Android for Work Means for the Enterprise
What Android for Work Means for the Enterprise
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business.
 
a study of evolutionary mobile operating system
a study of evolutionary mobile operating system a study of evolutionary mobile operating system
a study of evolutionary mobile operating system
 
Android
AndroidAndroid
Android
 
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORMPERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
 
Workshop on Android App Development
Workshop on Android App DevelopmentWorkshop on Android App Development
Workshop on Android App Development
 
Android os(comparison all other mobile os)
Android os(comparison all other mobile os)Android os(comparison all other mobile os)
Android os(comparison all other mobile os)
 
Network
Network Network
Network
 
Android123
Android123Android123
Android123
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Android System Design And Power Management
Android System Design And Power ManagementAndroid System Design And Power Management
Android System Design And Power Management
 
Mobile Operating System
Mobile Operating SystemMobile Operating System
Mobile Operating System
 

More from Samsung Business USA

13 tricks to get the most out of the S Pen
13 tricks to get the most out of the S Pen13 tricks to get the most out of the S Pen
13 tricks to get the most out of the S Pen
Samsung Business USA
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
Samsung Business USA
 
10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the go10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the go
Samsung Business USA
 
10 reasons to upgrade to Samsung’s Galaxy S23
10 reasons to upgrade to Samsung’s Galaxy S2310 reasons to upgrade to Samsung’s Galaxy S23
10 reasons to upgrade to Samsung’s Galaxy S23
Samsung Business USA
 
13 things you didn’t know you could do with the S Pen
13 things you didn’t know you could do with the S Pen13 things you didn’t know you could do with the S Pen
13 things you didn’t know you could do with the S Pen
Samsung Business USA
 
10 ways to fuel productivity
10 ways to fuel productivity10 ways to fuel productivity
10 ways to fuel productivity
Samsung Business USA
 
8 ways ViewFinity monitors set the standard for professionals
8 ways ViewFinity monitors set the standard for professionals8 ways ViewFinity monitors set the standard for professionals
8 ways ViewFinity monitors set the standard for professionals
Samsung Business USA
 
10 field-ready features of Galaxy XCover6 Pro
10 field-ready features of Galaxy XCover6 Pro10 field-ready features of Galaxy XCover6 Pro
10 field-ready features of Galaxy XCover6 Pro
Samsung Business USA
 
5 Ways Smart Hospital Rooms Can Improve The Patient Experience
5 Ways Smart Hospital Rooms Can Improve The Patient Experience5 Ways Smart Hospital Rooms Can Improve The Patient Experience
5 Ways Smart Hospital Rooms Can Improve The Patient Experience
Samsung Business USA
 
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdfINFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
Samsung Business USA
 
10 ways to fuel productivity with Galaxy Book
10 ways to fuel productivity with Galaxy Book10 ways to fuel productivity with Galaxy Book
10 ways to fuel productivity with Galaxy Book
Samsung Business USA
 
The best monitors for teachers: 5 features every educator needs
The best monitors for teachers: 5 features every educator needsThe best monitors for teachers: 5 features every educator needs
The best monitors for teachers: 5 features every educator needs
Samsung Business USA
 
To BYOD or not to BYOD?
To BYOD or not to BYOD?To BYOD or not to BYOD?
To BYOD or not to BYOD?
Samsung Business USA
 
6 smart ways Samsung's 85-inch Interactive Display changes the classroom
6 smart ways Samsung's 85-inch Interactive Display changes the classroom6 smart ways Samsung's 85-inch Interactive Display changes the classroom
6 smart ways Samsung's 85-inch Interactive Display changes the classroom
Samsung Business USA
 
13 things you didn't know you could do with the S Pen
13 things you didn't know you could do with the S Pen13 things you didn't know you could do with the S Pen
13 things you didn't know you could do with the S Pen
Samsung Business USA
 
10 reasons to choose Galaxy Tab S8 for work on the go
10 reasons to choose Galaxy Tab S8 for work on the go10 reasons to choose Galaxy Tab S8 for work on the go
10 reasons to choose Galaxy Tab S8 for work on the go
Samsung Business USA
 
10 reasons to upgrade to Galaxy S22 Ultra
10 reasons to upgrade to Galaxy S22 Ultra10 reasons to upgrade to Galaxy S22 Ultra
10 reasons to upgrade to Galaxy S22 Ultra
Samsung Business USA
 
9 benefits of mobilizing patient care with hospital technology
9 benefits of mobilizing patient care with hospital technology9 benefits of mobilizing patient care with hospital technology
9 benefits of mobilizing patient care with hospital technology
Samsung Business USA
 
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
Samsung Business USA
 
7 ways displays create a connected campus
7 ways displays create a connected campus7 ways displays create a connected campus
7 ways displays create a connected campus
Samsung Business USA
 

More from Samsung Business USA (20)

13 tricks to get the most out of the S Pen
13 tricks to get the most out of the S Pen13 tricks to get the most out of the S Pen
13 tricks to get the most out of the S Pen
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the go10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the go
 
10 reasons to upgrade to Samsung’s Galaxy S23
10 reasons to upgrade to Samsung’s Galaxy S2310 reasons to upgrade to Samsung’s Galaxy S23
10 reasons to upgrade to Samsung’s Galaxy S23
 
13 things you didn’t know you could do with the S Pen
13 things you didn’t know you could do with the S Pen13 things you didn’t know you could do with the S Pen
13 things you didn’t know you could do with the S Pen
 
10 ways to fuel productivity
10 ways to fuel productivity10 ways to fuel productivity
10 ways to fuel productivity
 
8 ways ViewFinity monitors set the standard for professionals
8 ways ViewFinity monitors set the standard for professionals8 ways ViewFinity monitors set the standard for professionals
8 ways ViewFinity monitors set the standard for professionals
 
10 field-ready features of Galaxy XCover6 Pro
10 field-ready features of Galaxy XCover6 Pro10 field-ready features of Galaxy XCover6 Pro
10 field-ready features of Galaxy XCover6 Pro
 
5 Ways Smart Hospital Rooms Can Improve The Patient Experience
5 Ways Smart Hospital Rooms Can Improve The Patient Experience5 Ways Smart Hospital Rooms Can Improve The Patient Experience
5 Ways Smart Hospital Rooms Can Improve The Patient Experience
 
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdfINFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
 
10 ways to fuel productivity with Galaxy Book
10 ways to fuel productivity with Galaxy Book10 ways to fuel productivity with Galaxy Book
10 ways to fuel productivity with Galaxy Book
 
The best monitors for teachers: 5 features every educator needs
The best monitors for teachers: 5 features every educator needsThe best monitors for teachers: 5 features every educator needs
The best monitors for teachers: 5 features every educator needs
 
To BYOD or not to BYOD?
To BYOD or not to BYOD?To BYOD or not to BYOD?
To BYOD or not to BYOD?
 
6 smart ways Samsung's 85-inch Interactive Display changes the classroom
6 smart ways Samsung's 85-inch Interactive Display changes the classroom6 smart ways Samsung's 85-inch Interactive Display changes the classroom
6 smart ways Samsung's 85-inch Interactive Display changes the classroom
 
13 things you didn't know you could do with the S Pen
13 things you didn't know you could do with the S Pen13 things you didn't know you could do with the S Pen
13 things you didn't know you could do with the S Pen
 
10 reasons to choose Galaxy Tab S8 for work on the go
10 reasons to choose Galaxy Tab S8 for work on the go10 reasons to choose Galaxy Tab S8 for work on the go
10 reasons to choose Galaxy Tab S8 for work on the go
 
10 reasons to upgrade to Galaxy S22 Ultra
10 reasons to upgrade to Galaxy S22 Ultra10 reasons to upgrade to Galaxy S22 Ultra
10 reasons to upgrade to Galaxy S22 Ultra
 
9 benefits of mobilizing patient care with hospital technology
9 benefits of mobilizing patient care with hospital technology9 benefits of mobilizing patient care with hospital technology
9 benefits of mobilizing patient care with hospital technology
 
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
 
7 ways displays create a connected campus
7 ways displays create a connected campus7 ways displays create a connected campus
7 ways displays create a connected campus
 

Recently uploaded

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 

Recently uploaded (20)

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 

The Evolution of Mobile Security

  • 1. The Evolution of Mobile Security Fifteen years of learning from mobile mistakes
  • 2. The first smartphones start to appear Palm added email, basic web access and a phone to a personal organizerwith the Treo 650. There was almost no security. 2004
  • 3. 2006 Nokia’s N95 made camera, music and GPS a priority. Name: Software 2.0 Publisher: ABD Software Inc. From: http//: ABDsoftware2.com CERTIFICATE Symbian and Nokia take viruses seriously Symbian 9 required most apps to be signed to protect against viruses.
  • 4. 2007 Early iPhones used ASLR, code signing, sandboxing and hardware encryption, setting new expectations forphones. Hash Function Code Hashed Code Signed Code SignatureEncrypt Hash Using a Private Key Attached to Code Encrypted Hash & Time Stamp Apple reinvents the phone with open software, closed hardware
  • 5. Read on formore Mobile Security historical facts Protect Your Enterprise With Samsung Knox Security Discoverwhy Samsung phones are the most secure and manageable mobile devices available.
  • 6. 2008 Policies Manage Devices InfoSec and ITManagers Exchange Server With ActiveSync Microsoft Exchange ActiveSync (EAS) builds in MDM Microsoft built basic MDM feature into EAS, bolstering admin security. BlackBerry broadened MDM beyond Exchange in 2009. Mobile Devices
  • 7. 2010 Android v2.2 makes EAS management easy with built-in support Security policy controls like remote wipe became part of mainstream Android, shifting it toward enterprise environments. REMOTE WIPE
  • 8. 2012 Samsung Knox identifies key enterprise security requirements Samsung began investing in securityto make Android enterprise-safe, pushing features like SE Linux into the mainstream.
  • 9. 2013 TrustZone, a secure mode supported by ARM processors, protects information against compromise. Normal Apps Nonsecure World Client TEE API Rich OS Trusted Apps Secure World Secure TEE API Trusted OS Monitor ARM Security Extensions TrustZone protects encryption keys and identity information
  • 10. 2014 2017 READ ONLY RKP SECURE WORLD NORMALWORLD KERNEL Control instructions and page table update functions are replaced by traps to the Secure World Page tables are mapped read-only so they cannot be directly modified by the kernel Galaxy Note4 (2014) Galaxy Note Edge (2014) Galaxy Note5 (2015) Galaxy S7 (2016) Galaxy Note8 (2017) Galaxy S8 (2017) Samsung Knox innovations continue to add security to Android Knox brought critical features to Android, like biometrics, real-time kernel protection and separate work/home profiles.
  • 11. 2018 Samsung Knox continues to blaze the trail in mobile security, as olderfeatures are reimagined by Google forAndroid. Knox 3.0 joins Google’s Android Enterprise with Samsung security
  • 12. ©2019 Samsung Electronics America, Inc. Samsung is a registered mark of Samsung Electronics Corp., Ltd. All brand, product, service names and logos are trademarks and/or registered trademarks of their respective manufacturers and companies. Samsung Knox security empowers enterprises to go mobile-first confidently.