SlideShare a Scribd company logo
1 of 18
Enterprise Security and
Android Platform




                            Presented by
             Technology Consulting Group
         Endeavour Software Technologies
                                       1
Session Contents

• Overview of Mobility and Mobile Security
   – Introduction to Mobility
   – Mobile Security


• Best Practices for Secure Software Development

• Android OS
   – Security Architecture and deployment
   – Android Attack Surfaces
   – Enterprise features, What can we leverage?


• Questions?

                                                   2
What is Mobility


                                                Enterprise Mobility
• A Capability
• Communicate and         The ability of an enterprise to connect to
  Access                  people and control assets from any location.

• On the Move             Technologies that support enterprise mobility
                          include wireless networks, mobile applications,
• Anytime                 middleware, devices, and security and
• From Anywhere           management software.

• Voice, Messages, Data   Forrester Research Definition




                                                                            3
What is happening in the Corporate World?




                                            4
Mobile Security – Everywhere!




      Application     Device
        Level          Level




            Network Level




                                5
Security Considerations for Enterprise Mobility


                     • Mobility Infrastructure
                        –   Security is a key focus area.
    Infrastructure      –   Ensuring existing policies is implemented
                        –   Integration with existing tools, systems
                        –   Keep devices light, manageable
                     • Mobile Middleware Platform
Middleware              –   Composite Applications Landscape and devices
                        –   Mobile Device Management
                        –   Mobile Data Synchronization
                        –   Phased approach for Common Services and
    Distribution            Mobile Applications
                     • Mobile Applications Distribution
                        – Enterprise distribution through OTA to specific
                          devices

                                                                            6
Application Security – Must Include



           User          Data Security
       Authentication     on Device




                            Device
                         Management
       Data in Transit       and
                          Application
                         Provisioning




                                         7
Enterprise Mobile Security – Do’s




                                    8
Enterprise Mobile Security – Best Practices


1. Protect the Brand Your Customers Trust

2. Know Your Business and Support it with Secure
   Solutions

3. Understand the Technology of the Software

4. Ensure Compliance to Governance, Regulations, and
   Privacy

5. Design, Develop and Deploy Software with Secure
   Features
                                                       9
Android Security Architecture



           Permission
          Based Model




                  Remote App
    Sandbox
                  Management




                                10
Android Security – Permission based model
  • Permission-based Model
      – Linux + Android’s Permission

      – Well defined at system level

      – Approved by user at install

      – High-level permissions restricted by Android runtime
         framework

      – For example, an application that needs to monitor incoming
         SMS messages would specify
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
  package="com.android.app.myapp" >
 <uses-permission android:name="android.permission.RECEIVE_SMS" />
  ...</manifest>                                                       11
Android Security – Remote App Management

• Remote Install/removal
  – Google can remove or install apps remotely

  – Users can install apps remotely from online Android
    Market

  http://market.android.com




                                                          12
Android Security - Sandbox




                             13
Android’s Attack Surfaces

• Isolated applications is like having multi-user system

• Single UI/ Device  Secure sharing of UI and IO

• Appeals to user for all security decisions

• Phishing style attach risks

• Its not Java sandbox, its Linux sandbox. Native code not a
   barrier

• Any java App can execute shell, load JNI libraries, write and
   exec programs

Reference – iSEC PARTNERS                                         14
Enterprise features (Froyo/ GingerBread)

• Remote wipe
   – Remotely reset the device to factory defaults

• Improved security
   – Addition of numeric pin, alphanumeric passwords to
     unlock the device

• Exchange calendars

• Auto-discovery

• Global Address List look-up
                                                          15
Enterprise features (Honeycomb)

• New device administration policies
   – Encrypted storage

   – Password expiration

   – Password history

   – Complex characters in password

• Configure HTTP proxy for each connected WiFi access
  point (AOS 3.1 only)

• Encrypted storage cards
                                                        16
Questions ?




              17
Thank You
+91 80 4288 5500 (IND)
+44 20 7193 0986 (UK)
+1 214 306 6848 (US)

info@techendeavour.com
www.techendeavour.com




                         18

More Related Content

What's hot

SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)IAMCP Canada
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD SuccessSierraware
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and FinanceSierraware
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101Sierraware
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMISierraware
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile SecuritySantosh Satam
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...ashoksankar
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung Biz Mobile
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your FirewallSophos
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012dvanwyk30
 

What's hot (20)

SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD Success
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
IBM MaaS360 with Watson
IBM MaaS360 with WatsonIBM MaaS360 with Watson
IBM MaaS360 with Watson
 
Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Laptop management
Laptop managementLaptop management
Laptop management
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your Firewall
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 

Viewers also liked

Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAvinash Birnale
 
Android secure offline storage - CC Mobile
Android secure offline storage - CC MobileAndroid secure offline storage - CC Mobile
Android secure offline storage - CC MobileJWORKS powered by Ordina
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on androidRavishankar Kumar
 
Clean architecture on Android
Clean architecture on AndroidClean architecture on Android
Clean architecture on AndroidGDG Odessa
 
Permission in Android Security: Threats and solution
Permission in Android Security: Threats and solutionPermission in Android Security: Threats and solution
Permission in Android Security: Threats and solutionTandhy Simanjuntak
 
Clean architecture: Android
Clean architecture: AndroidClean architecture: Android
Clean architecture: Androidintive
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android SecurityMarakana Inc.
 
Testing Android Security Codemotion Amsterdam edition
Testing Android Security Codemotion Amsterdam editionTesting Android Security Codemotion Amsterdam edition
Testing Android Security Codemotion Amsterdam editionJose Manuel Ortega Candel
 
Android Security
Android SecurityAndroid Security
Android SecurityLars Jacobs
 
Scheduling in Android
Scheduling in AndroidScheduling in Android
Scheduling in AndroidOpersys inc.
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security modelPragati Rai
 
Embedded Android Workshop with Nougat
Embedded Android Workshop with NougatEmbedded Android Workshop with Nougat
Embedded Android Workshop with NougatOpersys inc.
 

Viewers also liked (15)

Securing Android
Securing AndroidSecuring Android
Securing Android
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
 
Android secure offline storage - CC Mobile
Android secure offline storage - CC MobileAndroid secure offline storage - CC Mobile
Android secure offline storage - CC Mobile
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
 
Clean architecture on Android
Clean architecture on AndroidClean architecture on Android
Clean architecture on Android
 
Permission in Android Security: Threats and solution
Permission in Android Security: Threats and solutionPermission in Android Security: Threats and solution
Permission in Android Security: Threats and solution
 
Clean architecture: Android
Clean architecture: AndroidClean architecture: Android
Clean architecture: Android
 
Android sandbox
Android sandboxAndroid sandbox
Android sandbox
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android Security
 
Testing Android Security Codemotion Amsterdam edition
Testing Android Security Codemotion Amsterdam editionTesting Android Security Codemotion Amsterdam edition
Testing Android Security Codemotion Amsterdam edition
 
Android Security
Android SecurityAndroid Security
Android Security
 
Scheduling in Android
Scheduling in AndroidScheduling in Android
Scheduling in Android
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security model
 
Embedded Android Workshop with Nougat
Embedded Android Workshop with NougatEmbedded Android Workshop with Nougat
Embedded Android Workshop with Nougat
 
Android ppt
Android ppt Android ppt
Android ppt
 

Similar to Webinar on Enterprise Security & android

Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile ApplicationsDenim Group
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsurancePriyanka Aash
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementIntergen
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Javier Gonzalez
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applicationsGTestClub
 

Similar to Webinar on Enterprise Security & android (20)

Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Ascure session
Ascure sessionAscure session
Ascure session
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 

More from Endeavour Software Technologies

State-of-the-art Personalized Shopper Engagement Platform For a Technology Co...
State-of-the-art Personalized Shopper Engagement Platform For a Technology Co...State-of-the-art Personalized Shopper Engagement Platform For a Technology Co...
State-of-the-art Personalized Shopper Engagement Platform For a Technology Co...Endeavour Software Technologies
 
Developed a State-of-the-art Personalized Shopper Engagement Platform For a T...
Developed a State-of-the-art Personalized Shopper Engagement Platform For a T...Developed a State-of-the-art Personalized Shopper Engagement Platform For a T...
Developed a State-of-the-art Personalized Shopper Engagement Platform For a T...Endeavour Software Technologies
 
Developed a Modular Disease Management Self-help Platform For a Health Soluti...
Developed a Modular Disease Management Self-help Platform For a Health Soluti...Developed a Modular Disease Management Self-help Platform For a Health Soluti...
Developed a Modular Disease Management Self-help Platform For a Health Soluti...Endeavour Software Technologies
 
How Analytics is Driving the Next Big Leap in Financial Services
How Analytics is Driving the Next Big Leap in Financial ServicesHow Analytics is Driving the Next Big Leap in Financial Services
How Analytics is Driving the Next Big Leap in Financial ServicesEndeavour Software Technologies
 
Designed and Implemented a Sign Tracking System For a Large Realtor From The ...
Designed and Implemented a Sign Tracking System For a Large Realtor From The ...Designed and Implemented a Sign Tracking System For a Large Realtor From The ...
Designed and Implemented a Sign Tracking System For a Large Realtor From The ...Endeavour Software Technologies
 
Developed a Mobile Headhunting Solution For a Leading Executive Search Firm
Developed a Mobile Headhunting Solution For a Leading Executive Search FirmDeveloped a Mobile Headhunting Solution For a Leading Executive Search Firm
Developed a Mobile Headhunting Solution For a Leading Executive Search FirmEndeavour Software Technologies
 
Developed an Enterprise Database and Workflow Solution For a Leading Private ...
Developed an Enterprise Database and Workflow Solution For a Leading Private ...Developed an Enterprise Database and Workflow Solution For a Leading Private ...
Developed an Enterprise Database and Workflow Solution For a Leading Private ...Endeavour Software Technologies
 
Developed a Multi-lingual Inventory Management Platform For a Leading Health ...
Developed a Multi-lingual Inventory Management Platform For a Leading Health ...Developed a Multi-lingual Inventory Management Platform For a Leading Health ...
Developed a Multi-lingual Inventory Management Platform For a Leading Health ...Endeavour Software Technologies
 
mHealth:Transitioning Healthcare to a Technology Oriented Model
mHealth:Transitioning Healthcare to a Technology Oriented ModelmHealth:Transitioning Healthcare to a Technology Oriented Model
mHealth:Transitioning Healthcare to a Technology Oriented ModelEndeavour Software Technologies
 
Redefining the Digital Retail Space with NFC,Beacons and Apple pay
Redefining the Digital Retail Space with NFC,Beacons and Apple payRedefining the Digital Retail Space with NFC,Beacons and Apple pay
Redefining the Digital Retail Space with NFC,Beacons and Apple payEndeavour Software Technologies
 
Accelerate mobile application development by leveraging reusable component fr...
Accelerate mobile application development by leveraging reusable component fr...Accelerate mobile application development by leveraging reusable component fr...
Accelerate mobile application development by leveraging reusable component fr...Endeavour Software Technologies
 

More from Endeavour Software Technologies (20)

State-of-the-art Personalized Shopper Engagement Platform For a Technology Co...
State-of-the-art Personalized Shopper Engagement Platform For a Technology Co...State-of-the-art Personalized Shopper Engagement Platform For a Technology Co...
State-of-the-art Personalized Shopper Engagement Platform For a Technology Co...
 
Visual transaction signing solution
Visual transaction signing solutionVisual transaction signing solution
Visual transaction signing solution
 
Check cashing mobile solution
Check cashing mobile solutionCheck cashing mobile solution
Check cashing mobile solution
 
Endeavour Leadership Advices
Endeavour Leadership AdvicesEndeavour Leadership Advices
Endeavour Leadership Advices
 
IoT Infusion into Businesses: Sooner than Expected
IoT Infusion into Businesses: Sooner than ExpectedIoT Infusion into Businesses: Sooner than Expected
IoT Infusion into Businesses: Sooner than Expected
 
Cloud Driving Strategic Growth For Businesses
Cloud Driving Strategic Growth For BusinessesCloud Driving Strategic Growth For Businesses
Cloud Driving Strategic Growth For Businesses
 
Developed a State-of-the-art Personalized Shopper Engagement Platform For a T...
Developed a State-of-the-art Personalized Shopper Engagement Platform For a T...Developed a State-of-the-art Personalized Shopper Engagement Platform For a T...
Developed a State-of-the-art Personalized Shopper Engagement Platform For a T...
 
Developed a Modular Disease Management Self-help Platform For a Health Soluti...
Developed a Modular Disease Management Self-help Platform For a Health Soluti...Developed a Modular Disease Management Self-help Platform For a Health Soluti...
Developed a Modular Disease Management Self-help Platform For a Health Soluti...
 
How Analytics is Driving the Next Big Leap in Financial Services
How Analytics is Driving the Next Big Leap in Financial ServicesHow Analytics is Driving the Next Big Leap in Financial Services
How Analytics is Driving the Next Big Leap in Financial Services
 
Designed and Implemented a Sign Tracking System For a Large Realtor From The ...
Designed and Implemented a Sign Tracking System For a Large Realtor From The ...Designed and Implemented a Sign Tracking System For a Large Realtor From The ...
Designed and Implemented a Sign Tracking System For a Large Realtor From The ...
 
Developed a Mobile Headhunting Solution For a Leading Executive Search Firm
Developed a Mobile Headhunting Solution For a Leading Executive Search FirmDeveloped a Mobile Headhunting Solution For a Leading Executive Search Firm
Developed a Mobile Headhunting Solution For a Leading Executive Search Firm
 
Developed an Enterprise Database and Workflow Solution For a Leading Private ...
Developed an Enterprise Database and Workflow Solution For a Leading Private ...Developed an Enterprise Database and Workflow Solution For a Leading Private ...
Developed an Enterprise Database and Workflow Solution For a Leading Private ...
 
Developed a Multi-lingual Inventory Management Platform For a Leading Health ...
Developed a Multi-lingual Inventory Management Platform For a Leading Health ...Developed a Multi-lingual Inventory Management Platform For a Leading Health ...
Developed a Multi-lingual Inventory Management Platform For a Leading Health ...
 
mHealth:Transitioning Healthcare to a Technology Oriented Model
mHealth:Transitioning Healthcare to a Technology Oriented ModelmHealth:Transitioning Healthcare to a Technology Oriented Model
mHealth:Transitioning Healthcare to a Technology Oriented Model
 
How Glass will Shape the Future of Enterprises
How Glass will Shape the Future of EnterprisesHow Glass will Shape the Future of Enterprises
How Glass will Shape the Future of Enterprises
 
Android Wear Virtual Digital Assistant on your wrist
Android Wear Virtual Digital Assistant on your wristAndroid Wear Virtual Digital Assistant on your wrist
Android Wear Virtual Digital Assistant on your wrist
 
Redefining the Digital Retail Space with NFC,Beacons and Apple pay
Redefining the Digital Retail Space with NFC,Beacons and Apple payRedefining the Digital Retail Space with NFC,Beacons and Apple pay
Redefining the Digital Retail Space with NFC,Beacons and Apple pay
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
iOS7 : Looking beyond parallax
iOS7 : Looking beyond parallaxiOS7 : Looking beyond parallax
iOS7 : Looking beyond parallax
 
Accelerate mobile application development by leveraging reusable component fr...
Accelerate mobile application development by leveraging reusable component fr...Accelerate mobile application development by leveraging reusable component fr...
Accelerate mobile application development by leveraging reusable component fr...
 

Webinar on Enterprise Security & android

  • 1. Enterprise Security and Android Platform Presented by Technology Consulting Group Endeavour Software Technologies 1
  • 2. Session Contents • Overview of Mobility and Mobile Security – Introduction to Mobility – Mobile Security • Best Practices for Secure Software Development • Android OS – Security Architecture and deployment – Android Attack Surfaces – Enterprise features, What can we leverage? • Questions? 2
  • 3. What is Mobility Enterprise Mobility • A Capability • Communicate and The ability of an enterprise to connect to Access people and control assets from any location. • On the Move Technologies that support enterprise mobility include wireless networks, mobile applications, • Anytime middleware, devices, and security and • From Anywhere management software. • Voice, Messages, Data Forrester Research Definition 3
  • 4. What is happening in the Corporate World? 4
  • 5. Mobile Security – Everywhere! Application Device Level Level Network Level 5
  • 6. Security Considerations for Enterprise Mobility • Mobility Infrastructure – Security is a key focus area. Infrastructure – Ensuring existing policies is implemented – Integration with existing tools, systems – Keep devices light, manageable • Mobile Middleware Platform Middleware – Composite Applications Landscape and devices – Mobile Device Management – Mobile Data Synchronization – Phased approach for Common Services and Distribution Mobile Applications • Mobile Applications Distribution – Enterprise distribution through OTA to specific devices 6
  • 7. Application Security – Must Include User Data Security Authentication on Device Device Management Data in Transit and Application Provisioning 7
  • 9. Enterprise Mobile Security – Best Practices 1. Protect the Brand Your Customers Trust 2. Know Your Business and Support it with Secure Solutions 3. Understand the Technology of the Software 4. Ensure Compliance to Governance, Regulations, and Privacy 5. Design, Develop and Deploy Software with Secure Features 9
  • 10. Android Security Architecture Permission Based Model Remote App Sandbox Management 10
  • 11. Android Security – Permission based model • Permission-based Model – Linux + Android’s Permission – Well defined at system level – Approved by user at install – High-level permissions restricted by Android runtime framework – For example, an application that needs to monitor incoming SMS messages would specify <manifest xmlns:android="http://schemas.android.com/apk/res/android" package="com.android.app.myapp" > <uses-permission android:name="android.permission.RECEIVE_SMS" /> ...</manifest> 11
  • 12. Android Security – Remote App Management • Remote Install/removal – Google can remove or install apps remotely – Users can install apps remotely from online Android Market http://market.android.com 12
  • 13. Android Security - Sandbox 13
  • 14. Android’s Attack Surfaces • Isolated applications is like having multi-user system • Single UI/ Device  Secure sharing of UI and IO • Appeals to user for all security decisions • Phishing style attach risks • Its not Java sandbox, its Linux sandbox. Native code not a barrier • Any java App can execute shell, load JNI libraries, write and exec programs Reference – iSEC PARTNERS 14
  • 15. Enterprise features (Froyo/ GingerBread) • Remote wipe – Remotely reset the device to factory defaults • Improved security – Addition of numeric pin, alphanumeric passwords to unlock the device • Exchange calendars • Auto-discovery • Global Address List look-up 15
  • 16. Enterprise features (Honeycomb) • New device administration policies – Encrypted storage – Password expiration – Password history – Complex characters in password • Configure HTTP proxy for each connected WiFi access point (AOS 3.1 only) • Encrypted storage cards 16
  • 18. Thank You +91 80 4288 5500 (IND) +44 20 7193 0986 (UK) +1 214 306 6848 (US) info@techendeavour.com www.techendeavour.com 18

Editor's Notes

  1. Definition of mobilityDefinition of enterprise mobility
  2. There is a realization that mobility goes beyond email. Isolated success in deployment of mobile solutions have reinforces this belief.The main application areas:Using mobility to extend the reach and availability of corporate data. Allowing for better informed decision makingEnabling corporate communicationsEmailInstant MessagingSocial Media Tools3. Using the mobile device as an application and service delivery platformContent: access and presentation of corporate content on a device, providing the right information at the right time and placeTransactions and Workflows: Enabling a mobile worker to work away from officeAnalytics and Reporting: Dashboards with intelligent reporting and analytic capabilities provide powerful business aides on the move.4. A derivative of mobile deployment: COST -&gt; From device procurement, software overheads, recurring telecom expenditure. Telecom expense management: Cost control and management5. Customer outreach: using the reach of mobile devices to reach, communicate with, track behavior, provide service, generate brand recall, and loyalty, using the power social media on mobile devices
  3. Device Level Security –Applies to device management security. Controls who can access to specific device settings. Controls the level of access to device settings.Even if sufficient security is implemented in wireless virtual private networks (VPNs), if a device is lost or stolen, the entire corporate intranet could be threatened if those devices aren&apos;t protected by password and other user-level security measuresNetwork level securityTwo basic security problems in wirelessConnecting to the network does not need physical access to the network-Just stand outside a building, you can get connected to AP that is inside the building2. The broadcast nature of radio communications-WiFi network normally operate at 150mW, upto 300M radius-Have you ever tried wireshark (or tcpdump)‏3. Other related security vulnerabilities -Anyone can generate transmissions, -which will be received by other devices in range-which will interfere with other nearby transmissions and may prevent their correct reception (jamming)‏-Injecting bogus messages into the network is easy-Replaying previously recorded messages is easy4. Illegitimate access to the network and its services is easy-Denial of service is easily achieved by jammingNetwork level security challenges1. Transmission Securityat physical, medium access and data link layers over wireless media.2. Communication Securitymessage confidentiality, integrity, and end-point authentication3.Authorization and Access Control4. Network Infrastructure Protection5. Robustness6. Efficiency
  4. Mobility InfrastructureSecurity is a key focus area. Ensuring existing policies is implemented for MobilityIntegrationExtend existing integration tools and rulesIntegration with the existing backend systemCan we “Build everything as an infrastructure component and keep devices light”? Definite need for Mobile Middleware PlatformComposite Applications Landscape, Composite Devices to be supportedMobile Device Management is an urgent Priority! Start managing your devices from Day 1!Common Services and Mobile Applications Layer can arrive in stagesMobile Applications DistributionEnterprise distribution through OTA to specific devices based on device ID or user IDhttp://www.cellcrypt.com/deployment
  5. 1. User Authentication: Due to the size limits of mobile devices, mobile applications tend to neglect password policies of enterprise. Thedesktop application may be following 8-10 character password policy but mobile application may be allowing 4 characters PIN. One shouldcarefully evaluate the effect of such diversions from norms and come up with a pragmatic approach keeping mobile device size andsecurity in perspective.2. Data Security on Device: Mobile applications tend to store data on local device for performance reasons. This can pose seriousrisks. One can think about encrypting the data for local storage but then encryption-decryption is a resource intensive function especiallyif you rely on asymmetric algorithms. One should take a balanced approach, for example one can use symmetric algorithms forencrypting data and use asymmetric key for encrypting symmetric key.3. Data in Transit : Data in transit (when data moves from one system to another system) is another critical aspect of datasecurity. In the case of mobile applications, there are so many intermediaries in-between. Ensuring the data confidentiality and dataintegrity in transit can pose serious challenges.4. Device Management and Application Provisioning: As one can imagine, people move to different departments within the samecompany. With the move, it is critical that their access to enterprise applications via mobile applications is provisioned and de-provisionedin a controlled manner. Managing the right level of mapping between mobile devices and mobile applications poses unauthorized accessrisk.5. Security Analysis and Monitoring: Monitoring security incidents such as password changes, failed logons, unauthorized accessrequests, non-repudiations is critical as they can help you identify risks in your mobile application environment. A carefully structuredapproach towards mobile applications security monitoring can help you to thwart these risks.
  6. 4. Healthcare apps should follow FDA guidelines.
  7. These are 3 security pillars of Android Security Architecture.
  8. A particular permission may be enforced at a number of places during your program&apos;s operation: At the time of a call into the system, to prevent an application from executing certain functions. When starting an activity, to prevent applications from launching activities of other applications. Both sending and receiving broadcasts, to control who can receive your broadcast or who can send a broadcast to you. When accessing and operating on a content provider. Binding to or starting a service.
  9. Recently Google has removed some of the malware applications remotely from users devices without any user intervention.Vodafone now has its own content channel in the Android Market app store to help its customers find its services and apps.Vodafone&apos;s move is also an acknowledgement of how important the Android Market can be as a distribution channel for an operator&apos;s own apps and services.
  10. Application Isolation – Note editor cannot read emailDistinct UIDs and GIDs for each install
  11. Remote wipe: Exchange administrators can remotely reset the device to factory defaults to secure data in case device is lost or stolen.Improved security with the addition of numeric pin or alpha-numeric password options to unlock device. Exchange administrators can enforce password policy across devicesExchange Calendars are now supported in the Calendar application.Auto-discovery: you just need to know your user-name and password to easily set up and sync an Exchange account (available for Exchange 2007 and higher).Global Address Lists look-up is now available in the Email application, enabling users to auto-complete recipient names from the directory.
  12. In Android 3.0, developers of device administration applications can support new types of policies, including policies for encrypted storage, password expiration, password history, and password complex characters required.Android 3.1Users can now configure an HTTP proxy for each connected Wi-Fi access point. This lets administrators work with users to set a proxy hostname, port, and any bypass sub-domains. This proxy configuration is automatically used by the Browser when the Wi-Fi access point is connected, and may optionally be used by other apps. The proxy and IP configuration is now backed up and restored across system updates and resets.To meet the needs of tablet users, the platform now allows a &quot;encrypted storage card&quot; device policy to be accepted on devices with emulated storage cards and encrypted primary storage.