We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byGretchen Gorges
Modified over 2 years ago
Gabriel Dusil VP, Global Sales & Marketing www.facebook.com/gdusil cz.linkedin.com/in/gabrieldusil gdusil.wordpress.com email@example.com
Experts in Network Behavior Analysis Page 2, www.cognitive-security.com © 2012, gdusil.wordpress.com Permissions Limited access to approved data/systems Access Control Password & Idle screen locking Isolation Limits an apps ability to access data or other system resources Encryption Conceal data at rest on the device Provenance Apps are stamped to identity the author for tamper resistance Symantec - A Window Into Mobile Device Security (11.Jun)
Experts in Network Behavior Analysis Page 3, www.cognitive-security.com © 2012, gdusil.wordpress.com Mobile devices hold a rich set of personal information: Location details browsing & call history contact lists & phone #s SMS, email & Facebook Calendar details Passwords in clear text Premium-rate calling Internet Access remains a large vulnerability hole Up-In-Coming Threats Micro-payment vulnerabilities Access to corporate server LikeJacking LookOut - Mobile Threat Report (11.Aug) McAfee - Mobility and Security Dazzling Opportunities, Profound Challenges (11.May)
Experts in Network Behavior Analysis Page 4, www.cognitive-security.com © 2012, gdusil.wordpress.com Recent Issues… iPhone Root-kitting Bypassing device security Theft of smartphones, & tablets sensitive records compromised Spoofed ActiveSync policy apps Reporting higher security than what is actually available Co-mingling Mixing private & corporate data Malware Stealing data & bandwidth Uncertified apps with malware Capturing info & forwarding Device Management Checklist J. Gold - A Heuristic Approach to Mobile Security, 11 Description Cur- rent Next Gen Device Upgrade Flexibility Threat Analysis Location-Aware usage User Device Switching Device Policy Capabilities Network Security Dynamic Corporate Policies Scalability Expandability App & Data Security
Experts in Network Behavior Analysis Page 5, www.cognitive-security.com © 2012, gdusil.wordpress.com LookOut - Mobile Threat Report (11.Aug)
Experts in Network Behavior Analysis Page 6, www.cognitive-security.com © 2012, gdusil.wordpress.com Awareness of Company Security and Data Protection Policies for Mobile Devices: Greatest Security Concerns for Mobile Devices McAfee - Mobility and Security Dazzling Opportunities, Profound Challenges (11.May)
Experts in Network Behavior Analysis Page 7, www.cognitive-security.com © 2012, gdusil.wordpress.com Subscribers Mobile users are in early stages of facing significant mobile threats. Handsets hold sensitive data Access to sensitive data (online banking, micro payments) Subscriber are unaware of mobile security threats and mitigation is largely ignored. Operators Lacking visibility to subscriber network activity & threats mobile, land-line, & internet protection for subscribers Providing additional service value Preparing for future mobile threats
Experts in Network Behavior Analysis Page 8, www.cognitive-security.com © 2012, gdusil.wordpress.com Maintenance and Repair Managing signature updates Cost of paying to fix systems infected by malware Hardware Overhead Most anti-malware consume large amounts processing power, memory and storage space. Lost Productivity Lost Productivity per employee Differing mobile Operating Systems to manage infections Company Costs Due to stolen Mbytes of bandwidth from Malware http://www.networksecurityjournal.com/features/malware-burden-012208/ LookOut - Mobile Threat Report (11.Aug)
Experts in Network Behavior Analysis Page 9, www.cognitive-security.com © 2012, gdusil.wordpress.com Subscribers used 79 MB per month in 10, 125% from 09 Expect a 16-fold increase (1.3 GB per month) by 15 Average mobile speed in 10 was 215 kbps, 2.2Mbps by 15. Cisco - Visual Networking Index Global Mobile Data '11
Experts in Network Behavior Analysis Page 10, www.cognitive-security.com © 2012, gdusil.wordpress.com Evolving Usage by App – (Allot) Monthly Data Usage – (Nielson) http://www.wired.com/wiredscience/2011/06/how-much-does-your-data-cost/ Average U.S. Smartphone Data Usage Up 89% as Cost per MB Goes Down 46% http://blog.nielsen.com/nielsenwire/online_mobile/ Allot – Mobile Trends, Global Mobile Broadband Traffic Report 11.H1
Experts in Network Behavior Analysis Page 11, www.cognitive-security.com © 2012, gdusil.wordpress.com Panda Security - Malware Statics, 11.Mar.16 Allot – Mobile Trends, Global Mobile Broadband Traffic Report 11.H1
Experts in Network Behavior Analysis Page 12, www.cognitive-security.com © 2012, gdusil.wordpress.com Malware bandwidth stolen From 15 to 60 per year 0 Accelerators Roaming will accelerate malware cost by over 30x 1 Multiple Malware instances Power Users are 25x more exposed to malware costs 2 A Provider with 1m subscribers - Vampire Costs would exceed 30m per year 3 0 Based on 500 bytes/min typical = 21.6 MB per month @ 0.06 per MB, & up to 4 Malware per handset 1 Based on Roaming costs in Europe between 1.2 and 12 Euros per MB, 2 Based on 2GB monthly usage 3 Average two malware instances across the subscriber base - http://ec.europa.eu/information_society/activities/roaming/data/index_en.htm - Average U.S. Smartphone Data Usage Up 89% as Cost per MB Goes Down 46% http://blog.nielsen.com/nielsenwire/online_mobile/ Smartphones Data Cost
Experts in Network Behavior Analysis Page 13, www.cognitive-security.com © 2012, gdusil.wordpress.com Malware acting as a botnet will exploit many vulnerabilities Abuse of premium- rate text messages Attacks gather sensitive data for commercial or political purposes Financial fraud as more mobile finance and payment apps emerge Cisco - Visual Networking Index Global Mobile Data '11 LookOut - Mobile Threat Report (11.Aug)
Experts in Network Behavior Analysis Page 14, www.cognitive-security.com © 2012, gdusil.wordpress.com End-point protection achieved by app suites Firewalls & VPN Disk Encryption Remote wiping Location-based services Anti-Malware Infrastructure Security utilizes Managed Security Flow statistics Policy compliance Intrusion detection Network Behavior Analysis Separating normal behavior from anomalous behavior
Experts in Network Behavior Analysis Page 15, www.cognitive-security.com © 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis Page 16, www.cognitive-security.com © 2012, gdusil.wordpress.com Infrastructure Security using Network Behavior Analysis observe mobile data to identify irregularities which may be due to the malware activity The anomalies detected by NBA will be correlated (cross- referenced) with data from the handsets where the mobile anti- malware solutions are deployed. Identification of deployed malware will help single- out the malicious software & implement mitigating steps to protect subscribers Mobile analyst services calls subscriber to confirm, identify & eliminate malicious behavior. Suspected (malicious) traffic is blocked, filtered, or diverted from the infected device. Network traffic can be optimized & modeled in order to improve reliability.
Experts in Network Behavior Analysis Page 17, www.cognitive-security.com © 2012, gdusil.wordpress.com Endpoint Security via security suites for mobile handsets Via periodic signature updates sent to the handset But Endpoint Security is reliant on subscribers to install SW Infrastructure Security is necessary to protect mobile subscribers Via Network Behavior Analysis, core traffic patterns are analyzed and normal behavior is separated from abnormal behavior to detect malware For 2 per month we will protect you against malware- stealing-bandwidth & lost productivity
Experts in Network Behavior Analysis Page 18, www.cognitive-security.com © 2012, gdusil.wordpress.com Increased Revenue - ARPU Value-added security services Core Infrastructure Cost Saving Reduce stolen BW by malware Increased security & network visibility - leads to efficient infrastructure spending Increased Client Satisfaction Client trust in mobile carrier through safer mobile surfing Protect transactions for online banking, & confidentiality Competitive Differentiation Through enhanced security services for corporate clients Legal Conformity Protection of minors, dangerous, & illegal content Increased Network Reliability From reduced malware instability Data traffic prediction becomes more precise, through modeling of legitimate applications ARPU – Average Revenue Per User BW - Bandwidth
Experts in Network Behavior Analysis Page 19, www.cognitive-security.com © 2012, gdusil.wordpress.com Security Innovation Delivering Next Generations Security Solutions Research & Development Expertise Continual & Rapid development Quick development turn-around Cost Effective R&D Resources Integration with OEMs, MSSPs, & Device manufacturers Addressing Privacy Concerns Data anonymity is maintained Product Stability 5th Generation Network Behavior Analysis platform Intuitive Management Interface Easy-to-Use Dashboard Granular attack detection analysis
Experts in Network Behavior Analysis Page 20, www.cognitive-security.com © 2012, gdusil.wordpress.com The number of times an uninteresting thing happens is an interesting thing. Marcus Ranum laws of intrusion detection. Cybercriminals are investing more toward R&D to find ways to use mobile devices and penetrate the cloud to seize the data they need to make a profit or undermine a companys success. … mobile operators will try to prevent threats at the network level… If the mobile operators pushed out antivirus to their customers devices, it would scare users … So operators are keen to solve security issues themselves at the network level. Gareth Machlachlan Chief Operating Officer Cisco - Annual Security Report '11 TechTarget - Security Tech Guide Mobile '11, Mobile Phone Security Threats, Blended Attacks Increasing
Experts in Network Behavior Analysis Page 21, www.cognitive-security.com © 2012, gdusil.wordpress.com http://gdusil.wordpress.com/2013/03/08/telco-and-mobile-security-12/
Experts in Network Behavior Analysis Page 22, www.cognitive-security.com © 2012, gdusil.wordpress.com
Experts in Network Behavior Analysis Page 23, www.cognitive-security.com © 2012, gdusil.wordpress.com As mobile data is expected to grow 16 fold over the next four years*, mobile providers are facing new challenges in balancing subscriber ease-of-use, with cyber-security protection. This explosion in cellular usage and mobile commerce will require advanced levels of protection for mobile users, as hackers continue to find vulnerabilities to exploit. A dual strategy which includes end-point and infrastructure security will provide robust and cost effective levels of protection, which will also expand provider revenue streams to enhanced services, and increase ARPU through value added security solutions. Network Behavior Analysis is a viable building block to infrastructure security, and helps to protects a collective subscriber base against sophisticated mobile cyber-attacks. *Cisco - Visual Networking Index Global Mobile Data '11 ARPU – Average Revenue Per User
Experts in Network Behavior Analysis Page 24, www.cognitive-security.com © 2012, gdusil.wordpress.com Network Behavior Analysis, NBA, Cyber Attacks, Forensics Analysis, Normal vs. Abnormal Behavior, Anomaly Detection, NetFlow, Incident Response, Security as a Service, SaaS, Managed Security Services, MSS, Monitoring & Management, Advanced Persistent Threats, APT, Zero-Day attacks, Zero Day attacks, polymorphic malware, Modern Sophisticated Attacks, MSA, Non-Signature Detection, Artificial Intelligence, A.I., AI, Security Innovation, Mobile security, Cognitive Security, Cognitive Analyst, Forensics analysis, Gabriel Dusil
Gabriel Dusil VP, Global Sales & Marketing cz.linkedin.com/in/gabrieldusil gdusil.wordpress.com
2 Industry trends and challenges Windows Server 2012: Modern workstyle, enabled Access from virtually anywhere, any device Full Windows experience.
Whats New in Microsoft Office 365 Module 01 | Daniel Sierra | Account Technology Strategist Microsoft Education México.
Norman SecureSurf Protect your users when surfing the Internet.
Network security Product Group 2 McAfee Network Security Platform.
Chapter 9 E-Security. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security Designing for Security.
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
BYOD in practice KPMG case study 13 March © 2013KPMG Romania, a Romanian limited liability company and a member firm of the KPMG network of independent.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Office 365 for Enterprises ITExpo February 2, 2012.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Dell Connected Security Solutions Simplify & unify.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Duncan Fraiser, Adam Gambrell, Lisa Schalk, Emily Williams.
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
Grow your business with your head in the cloud. What is Cloud Computing ? Internet-based computing, whereby shared resources, software and information.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
Kaspersky Small Office Security INTRODUCING New for 2014!
Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
What’s New in WatchGuard Dimension v1.2 WatchGuard Training.
Services Course Windows Live SkyDrive Participant Guide.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
[Name / Title] [Date] Effective Threat Protection Strategies.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
1 IT Analytics for Symantec Endpoint Protection Presenter’s Name Here Presenter’s Title Here.
Automatic Detection of Emerging Threats to Computer Networks Andre McDonald.
Banking Services AVAILABLE FOR A SMALL BUSINESS. BANKING SERVICES 2 Welcome 1. Agenda 2. Ground Rules 3. Introductions.
MAXIMIZE WEBFOCUS GO MOBILE! Copyright 2010, Information Builders. Slide 1 Brian Carter 3/21/12.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2012 Gigamon. All rights reserved. The Dynamic World of Threat Detection, Containment & Response 1.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
Hosted Exchange 2007 Enterprise Grade and Collaboration Solutions for Small and Medium Businesses.
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
Network Systems Sales LLC Value-Added Reseller Started in 2006 Focus: Offer deliverable, supported software and hardware-based technologies to solve business.
© 2017 SlidePlayer.com Inc. All rights reserved.