We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAntony Whitley
Modified over 2 years ago
1 | © 2012 V-Key.com – Proprietary and Confidential Bugatti Veyron Super SportBugatti Veyron Super Sport: 267 mph (429 km/h), 0-60 in 2.4 secs
2 | © 2012 V-Key.com – Proprietary and Confidential History Lessons 1 st modern automobile invention 1866, Karl Benz Seat belt legislation introduced US legislation in 1961
3 | © 2012 V-Key.com – Proprietary and Confidential Mobile Application Security Exposed - What You Must Know! Benjamin MahCo-Founder and CEO
4 | © 2012 V-Key.com – Proprietary and Confidential Global Mobile Marketplace Opportunity 50 Billon Connected Devices by Billon Mobile App Downloads by 2014 More UsersMore Data and Transactions
5 | © 2012 V-Key.com – Proprietary and Confidential Global Mobile Threat Landscape
6 | © 2012 V-Key.com – Proprietary and Confidential Fundamental Mobile Application Weaknesses Application Phishing Insecure Mobile OS Insecure Mobile Apps Trojan Keylogging Display Recording Man-in-the-Middle Mobile Operating System Traditional Mobile Applications
7 | © 2012 V-Key.com – Proprietary and Confidential Phishing Attack
8 | © 2012 V-Key.com – Proprietary and Confidential Insecure Mobile OS Client-Side Attack Server-Side Attack
9 | © 2012 V-Key.com – Proprietary and Confidential Insecure Mobile OS Insecure Application Data Reverse Engineering
10 | © 2012 V-Key.com – Proprietary and Confidential Trojan Keylogging
11 | © 2012 V-Key.com – Proprietary and Confidential Display Recording
12 | © 2012 V-Key.com – Proprietary and Confidential Man-in-the-Middle
13 | © 2012 V-Key.com – Proprietary and Confidential Mobile Security Vs Traditional Security Lifestyle Vs Protection Unique Demands of Lifestyle Mobile Preserving Current User Behavior Convenience LightWeight Optimize of Battery Life Cycle Treat the end users as dummies Current Mobile Security Approach Hardware focus – additional Token OTP 3 rd Party Mobile Security s/w installation Heavy Policy Based Intensive Scanning till battery runs dry Complex to use
14 | © 2012 V-Key.com – Proprietary and Confidential V-Key: What We Do Mobile Threat Research. Protection. Intelligence Application Threat Research Focused (Trust Foundation) Mobile Application Detection & Protection (Enterprise App Focused) Mobile Threat Intelligence (Compliance & Reporting)
15 | © 2012 V-Key.com – Proprietary and Confidential Device Integrity Ensure security of host operating system Application Integrity Ensure security of mobile application Network Integrity Ensure security of SSL network connections V-KEYs Simplicity & Security
16 | © 2012 V-Key.com – Proprietary and Confidential V-Tap Advanced Protection Secure Mobile Token Step-Up User Authentication and Protection Verification Worlds 1 st secure mobile token Secures application access on the mobile device Integrates mobile device protection with the authentication process Provides advanced authentication features for third-party applications
17 | © 2012 V-Key.com – Proprietary and Confidential Industry Accolades and Security Assessment Recognized Leader in Mobile Application Security Finalist
18 | © 2012 V-Key.com – Proprietary and Confidential
Addition 1’s to
1 Confidential Lessons Learned from the First Generation of Mobile Apps Sean Ginevan, Product Management MobileIron - Confidential1.
Test B, 100 Subtraction Facts
Addition Facts = = =
Palo Alto Networks Jay Flanyak Channel Business Manager
WEEK 1 You have 10 seconds to name…
Past Tense Probe Past Tense Probe – Practice 1 Past Tense Probe – Practice 2.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Achieving online trust through Mutual Authentication.
B-CERB complete protection against phishing copyright 2008 by Wheel.
INTERNET SHIELD COURSE F-SECURE ® ANTI-VIRUS CLIENT SECURITY 6.
2 Industry trends and challenges Windows Server 2012: Modern workstyle, enabled Access from virtually anywhere, any device Full Windows experience.
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
SSL Trust Pitfalls Prof. Ravi Sandhu. 2 © Ravi Sandhu SERVER-SIDE SSL (OR 1-WAY) HANDSHAKE WITH RSA Record Protocol Handshake Protocol.
1 Unit 1 Kinematics Chapter 1 Day
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION 2. TAKE THE INVERSE OF THE SECOND NUMBER 3. FOLLOW THE RULES FOR ADDITION 4. ADD THE OPPOSITE.
Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
This paper states that one of the major problem to the adoption of cloud computing is that of security. Existing cloud computing problem or concerns.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
25 seconds left….. 24 seconds left….. 23 seconds left…..
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
O X Click on Number next to person for a question.
= This is the fact family. You say: 8+3=11 and 3+8= =8 and 11-8=3.
1 Computer Security CIS326 Dr Rachel Shipsey. 2 This course will cover the following topics: passwords access controls symmetric and asymmetric encryption.
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Take from Ten First Subtraction Strategy -9 Click on a number below to go directly to that type of subtraction problems
1 Directed Depth First Search Adjacency Lists A: F G B: A H C: A D D: C F E: C D G F: E: G: : H: B: I: H: F A B C G D E H I.
Bomgar Product Strategy SECURE REMOTE SUPPORT FOR THE MOBILE ENTERPRISE © 2011 Bomgar Corporation | CONFIDENTIAL BOMGAR Solution Overview Stuart McGregor.
1 CHALLENGES Users growing and becoming more demanding –E-learning, electronic registration and other services –Require 24x7 access to learning materials.
IT : More than Ready for the Future Jon Kissane Chief Strategy Officer and Cloud Business Group General Manager NetApp © 2014 NetApp, Inc. All rights.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Tsovinar Chugaszyan Presentation date LBS Technologies Main components Infrastructure Applications Privacy in LBS Threats and concerns Solutions.
©2014 Bit9. All Rights Reserved. Prevent Detect & Respond Prevention Visibility Detection Response Security Life Cycle for Advanced Threats EPP ETDR.
© S Haughton more than 3?
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
ICS 434 Advanced Database Systems Dr. Abdallah Al-Sukairi Second Semester (032) King Fahd University of Petroleum & Minerals.
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
MULTIPLICATION EQUATIONS 1. SOLVE FOR X 3. WHAT EVER YOU DO TO ONE SIDE YOU HAVE TO DO TO THE OTHER 2. DIVIDE BY THE NUMBER IN FRONT OF THE VARIABLE.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. AT&T Mobile Barcode Services.
Jeopardy Topic 1Topic Q 1Q 6Q 11Q 16Q 21 Q 2Q 7Q 12Q 17Q 22 Q 3Q 8Q 13Q 18Q 23 Q 4Q 9Q 14Q 19Q 24 Q 5Q 10Q 15Q 20Q 25 Final Jeopardy.
1 Confidential and proprietary material for authorized Verizon Foundation personnel only. Use, disclosure or distribution of this material is not permitted.
Linking Verb? Action Verb or. Question 1 Define the term: action verb.
© Siemens AG All Rights Reserved.siemens.com/comos COMOS Mobile Solutions 1.0 Simplified global collaboration Jan Rougoor, Head of Product Management.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Mobile Application Security.
© 2016 SlidePlayer.com Inc. All rights reserved.