Assurance for the Mobile User: Mobile Device Security.

Slides:



Advertisements
Similar presentations
Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning.
Advertisements

User Authentication on Mobile Devices Google Two Factor Authentication OTP (One Time Password)
1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
Copyright Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion.
Office 365 for Enterprises ITExpo February 2, 2012.
and o REMOTE SUPPORT o ON-SITE SUPPORT o ONE-TIME TUNE-UP BASIC SERVICES.
WHICH TO CHOOSE RIGHT SERVER FOR THE RIGHT JOB. Today’s business environment demands that small and midsize businesses do more with less. The large majority.
EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Security for Today’s Threat Landscape Kat Pelak 1.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Barracuda Networks Steve Scheidegger Commercial Account Manager
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
Embracing IP Multimedia Services for Strategic Business Advantage Rick Seeto VP & GM Enterprise Networks, Asia Pacific.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Brad Allen Windows Client Technical Specialist Microsoft Corporation.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Dell Connected Security Solutions Simplify & unify.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Security considerations for mobile devices in GoRTT
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Webroot Web Security SaaS A Better Approach to Web Security
Protecting Your Business Against the Unthinkable SBA Houston, August 2, 2006 Mark Piening Sr. Director Worldwide SMB Marketing.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Computer Security By Duncan Hall.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Database Encryption Market to Global Analysis and Forecasts by Types, End User and Deployment Type No of Pages: 150 Publishing Date: Jan 2017 Single.
Database Encryption Market to Global Analysis and Forecasts by Types, End User and Deployment Type No of Pages: 150 Publishing Date: Feb 2017 Single.
Database Encryption Market to Global Analysis and Forecasts by Types, End User and Deployment Type No of Pages: 150 Publishing Date: Apr 2017 Single.
Database Encryption Market to Global Analysis and Forecasts by Types, End User and Deployment Type No of Pages: 150 Publishing Date: May 2017 Single.
OFFICE 365 APP BUILDER PROFILE: Druva
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Cloud Security Market Share
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Securing the Threats of Tomorrow, Today.
In the attack index…what number is your Company?
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

Assurance for the Mobile User: Mobile Device Security

Symantec Mobile Enterprise Security2 Agenda Who are we? Evolving Device Security Market Call To Action 1 2 3

Market for Device Security

Symantec Mobile Enterprise Security4 Consumers Grow Sophisticated as the World Converges.. Mobile Content, Services, Providers all Converging … Emergence of the Prosumer Mobile Content, Services, Providers all Converging … Emergence of the Prosumer Better Devices –100 Million Symbian Smart Phones shipped to-date –High penetration in matured markets & youth segments in emerging markets –IMS Services Enabled Devices Richer Content –Open Standards Push –38.2% CAGR grow in Mobile –Richer Content on Devices –Better cameras, more storage Richer Services –M-Commerce Resurgence –Content to Blog sites

Symantec Mobile Enterprise Security5 The Smart Phone Security Perfect Storm Outdated Thinking: 75% of companies have not addressed smart phone security* (60% cite security as biggest mobility obstacle*) IT is Organizing: Ad hoc deployment giving way to centralized policies that include all endpoints (Server, PC, Laptop and Mobile) Mobile/wireless IT spending likely to exceed IT budget growth in many organizations: 12.5% avg. growth rate (Source: Gartner) Increasing Mobile Device Threats: Mobile virus variants have doubled every 6 months since 2004 (235 mobile virus variants in H106) (Source: Symantec Security Response) Enterprise Faith: 80% of companies are allowing corporate data on devices, yet continue to not secure the data* Fastest Growing Device Segment: Smart phone growth = 77% Other mobiles = 27% Mobiles out ship PCs 5:1 in 2006 (Source: Canalys for H105 to H106, IDC & Gartner) * Q Symantec survey conducted by Economist Intelligence Unit

Symantec Mobile Enterprise Security6 Global Survey on Enterprise Attitudes Toward Mobile Device Security OBJECTIVES –To explore corporate attitudes regarding enterprise mobile device security –Survey done against 248 companies headquartered in North America, Western Europe, and Asia Pacific RESULTS –60% said security biggest obstacle –Only 9% addressed security issues –88% of companies deals with security on an ad-hoc basis or do not address it at all –25% of senior management fully understands the risks of mobile computing in North America, compared with 30% in Western Europe and 37% in Asia Pacific. –4 out of 5 companies surveyed view the risk of mobile data services the same or greater than wired data risks. Source : Economist Intelligence Unit

Symantec Mobile Enterprise Security7 Global Survey on Enterprise Attitudes Toward Mobile Device Security NOTABLE DATA –Reasons for companies permitting mobile access Improve employee productivity - 73%, to enable increased business flexibility - 46%, and increase responsiveness to customers - 33%. POLICIES ON STORAGE OF CORPORATE DATA –While 21% of North American companies allow storage of corporate data on employee-owned mobile devices and leave security to employees, only 13% of companies in other global regions do the same. –Only 53% of North American companies limit storage of corporate data to company-owned mobile devices; 64% of companies outside North America allow storage of corporate data only on company- owned devices. Source : Economist Intelligence Unit

Symantec Mobile Enterprise Security8 Cabir released Skulls[A-B] released Cabir.B Released Cabir Source Code released 18 Variants in 1 Month Commwarrior[A-B], Dampig, Drever[A-C], Skulls[E-H] released Doomboot[A-C], Skulls[K-L], Cabir.U released First Symbian Spyware Released. Threat Landscape: Wireless Threats Continue to Proliferate Symantec Response has already identified over 30 vulnerabilities on the Windows Mobile 5 OS. Threats for Windows Mobile are likely to follow a similar evolution pattern as Symbian and PC threats.

Symantec Mobile Enterprise Security9 Increasing amount of personal content on mobiles –Highly personal pictures, videos e.g. lost mobile content in HK sold for profit Attacks now for Financial Gain… not Notoriety –30 of the top 50 threats exposed user confidential data (source Symantec ISTR X ) Premium SMS attacks can drain user accounts –RedBrowser.A and Webser released in February 2006 –No predictive fraud detection methods in many mobile payment mechanism similar ass offered by Visa and MasterCard Devices increasingly becoming payment instruments –Pay-with-a-wave in Japan, UK… add financial risk to mobile New Platform, New Risks: Pranking4Profit Mobiles are becoming digital wallets and identities but Mobile payment fraud methods are comparatively immature Mobiles are becoming digital wallets and identities but Mobile payment fraud methods are comparatively immature

Symantec Mobile Enterprise Security10 People are the Perimeter: Mobile blurs the distinction between Employee and Consumer, between user and network –If a mobile phone is always with you… it is always a risk 70% use their mobile phones as alarm clocks (source ICM Research) –Snoopware: Mobile spyware exploits the telephony apps… not Consult the calendar to determine the best times to snoop Remotely activate the microphone to eavesdrop on conversations or spy via pictures and video Examples: FlexiSpy and iCam (available April 2006) New Platform, New Risks: Snoopware… an Invasion of Privacy Snoopware puts a Stranger in your Bedroom and a Competitor in your Boardroom

Symantec Mobile Enterprise Security11 Loss/Theft/Damage of a mobile device far more likely than PCs –Phones lost 15X more frequently than PCs by some estimates –In the UK, 20,000 devices are lost or stolen in the UK each month and one third of all robberies now solely involve mobile phones (Sources: ARC & UK Govt Stats) Loss Mitigation: Flexible defense to match the risk –Anti-Virus, Remote wipe and kill, Data Encryption, File Activity Log AV prevents undetected loss of data Activity Log = peace-of-mind & a regulatory compliance option without the overhead of encryption –Future of Loss Mitigation: Data Backup and Recovery Data tagged as personal or business, encrypted on the phone, sent over-the-air and targeted at either the work or home PC for back-up New platform, New risks: Mobile Loss Mitigation Lost phones hurt everyone: Users, Employers and Operators

Symantec Mobile Enterprise Security12 Call to Action Managed Anti-Virus Prevent virus & malware outbreaks Anti-SPAM SPAM prevention Secure User Identities Prevention of identity theft IM Threat Protection SPAM prevention on IM Managed Apps Back Up & Storage Protecting business critical information Managed Web Content Prevent attacks on corporate web sites Mobile Device Protection Anti-Virus & Firewall Managed Anti-Virus Prevent virus & malware outbreaks Anti-SPAM SPAM prevention

Q&A