® Privacy & Security Challenges In Mobile Communications 17 February 2015.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Stefan Geißler TEMIS Chief Innovation Officer, Managing Director TEMIS Deutschland The Luxid® Community – Collaboration in the Language Technology Industry.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
The Future is Global One World One World One Service One Service One Button.
Blueprint BoardPad is a registered trademark of ICSA Software International Limited. iPad is a trademark of Apple Inc., registered in the U.S. and other.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
Training solution for Mobile Workforce. People expect to consume content when and where they want to. Training for Mobile Workforce.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
PRODUCT FOCUS 4/14/14 – 4/25/14 INTRODUCTION Our Product Focus for the next two weeks is Microsoft Office 365. Office 365 is Microsoft’s most successful.
Steps to Compliance: Bring Your Own Device PRESENTED BY.
What Google Privacy issues?. Concerns with Google & Privacy Google Street View It turns out that Google was obtaining a large amount of data from Wi-Fi.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
Top 10 Strategic Technology Trends for 2013 A Channel Partners Slide Show … as highlighted at.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
L a r y s s a J a c k i e &. Founded in 2003, DocuSign is committed to transforming the way people like you work, live and connect by providing the freedom.
Mobile TripCase Overview
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
CHUCK YOUNG MANAGING DIRECTOR OFFICE OF PUBLIC AFFAIRS GOVERNMENT ACCOUNTABILITY OFFICE to AGA BOSTON CHAPTER PROFESSIONAL DEVELOPMENT CONFERENCE MARCH.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Confidential The Power to Connect. On-the-go presentations in client’s office and outside meeting locations are made professional and worry free. CircleMobile.
Security considerations for mobile devices in GoRTT
MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012.
WhatsApp and Line. Foundation Date – 2009 Headquarters – Mountain View, California, US. Founders – Jan Koum, Brian Acton. Employees - 55.
An agreement between two or more individuals or entities stating that the involved parties will act in a certain way in order to achieve a common goal.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Lior Rubin PTS. What is it ? o The Microsoft Enterprise Mobility Suite (EMS) helps give users a more secure and integrated productivity experience with.
FND2851. Mobile First | Cloud First Sixty-one percent of workers mix personal and work tasks on their devices* >Seventy-five percent of network intrusions.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
WIDESCREEN PRESENTATION Tips and tools for creating and presenting wide format slides.
2015 October 5 th - 6 th 3 Things You Need to Know to Capitalise on Enterprise Mobility Suite How to Unlock EMS.
 Smartphones – iPhone, Android, Blackberries, etc  Tablets – iPad, Android, Windows, Google, etc.  Computers Basically anything that can connect to.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
Password Management Market Analysis, Market Size, Analysis 2014 To 2020 Grand View Research has announced the addition of " Global Password Management.
Building a Better Connected World
Secure your complete data lifecycle using Azure Information Protection
The time to address enterprise mobility is now
DATA SECURITY FOR MEDICAL RESEARCH
StreetSmart Mobile Workforce App Incorporates Microsoft Office 365 Outlook Add-In for Improved Field Worker Scheduling and Streamlined Invoicing OFFICE.
Top 10 Strategic Technology Trends for 2013
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
Secure your complete data lifecycle using Azure Information Protection
Smart Org Charts in Microsoft Office 365: Securely Create, Collaborate, Edit, and Share Org Charts in PowerPoint and Online with OrgWeaver Software OFFICE.
Global Mobile Value Added Services Market Research Report by Forecast to 2023 Industry Survey, Growth, Competitive Landscape and Forecasts to 2023 PREPARED.
Welcome! Microsoft Tech Talks - Charlotte, NC
CYBER SECURITY MARKET Global Cyber Security Market, Size, Share, Market Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Graduate Development Program Engineering
ForceManager Integrates with Office 365 Outlook Mail, Calendar, Contacts, Word, and Excel for a Smart, Fast, Intuitive Mobile CRM Sales Solution OFFICE.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Top 10 Strategic Technology Trends for 2013
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
TeamViewer Blizz A Secure Tool for Online Collaboration VisiOneClick.
Microsoft Data Insights Summit
Microsoft Data Insights Summit
Personal Mobile Device Acceptable Use Policy Training Slideshow
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

® Privacy & Security Challenges In Mobile Communications 17 February 2015

® FULBRIGHT - MCMC GRANT

® A Connected World

® Malaysia: WeChat growth with an active user base increase 1,187% (between Q – Q3 2014) Apple: Tracking about 1 billion App downloads a month (2012) Malaysia: Nine out of ten smartphones sold are Android-based (2014) Malaysia: Aggregated Internet Bandwidth Consumption Jan - June 2014: 306,970 Mbps Jan - Dec 2013: 349,277 Mbps Malaysia: Smartphone Sales Volume = 8.5 million (2014) Global: WeChat growth with an active user base increase 156% (between Q – Q3 2014) Malaysia: One of only five countries in the world where smartphone usage exceeds that of computers – 51% vs 29% (2014) Vietnam: 24% of users are accessing the Internet purely on smart devices ASEAN: Mobile Data Penetration: 28.4% Compound Annual Growth Rate of 12.5% next 5 years

® Apps: Growth & Downloads Total Apps AvailableTotal App Downloads Number of downloadsNumber of smartphone users

® Privacy & Security Breaches (1) Names..Addresses..Phone Numbers..Social Security Numbers.. s.. Passwords..Intellectual Properties…….

® Privacy & Security Breaches (2) Chinese spies read Australian MPs' s for a year: report Chinese spies read Australian MPs' s for a year: report 27th April 2014 Indonesia's ties with Australia turn to ice over phone tapping Indonesia's ties with Australia turn to ice over phone tapping 20th Nov 2013 Malaysia Summons Singapore Envoy as Spying Claims Widen 26th Nov 2013 United Kingdom: More than 40 per cent of UK businesses have suffered a security breach from work mobile phones in the past 12 months (2014) according to British Telecoms According to British telecom firm BT, 98 percent of U.S. firms allow employees to use personal mobile devices for work. However, organizations struggle to manage mobile devices, develop effective policies and controls, and create a secure environment that works for both the business and the employees.

®  Disruption in functioning of the system  Data/ Info Loss  Economic loss  Criminal & Destructive Elements  Diplomatic Tension Consequences

® Industry Direction… Apple & Google: Oct 2014 On Thursday, the FBI’s director, James Comey, decried the company’s decision to offer similar tools on mobile devices running iOS 8. “With Apple’s new operating system, the information stored on many iPhones and other Apple devices will be encrypted by default,” Comey told the Brookings Institute in Washington DC. “Shortly after Apple’s announcement, Google announced plans to follow suit with its Android operating system. This means the companies themselves won’t be able to unlock phones, laptops, and tablets to reveal photos, documents, , and recordings stored within.” WhatsApp: Nov 2014 MegaChat & Chadder: Jan 2015

® mTouche: An Overview

® mTouche: Overview Established in A MSC status company listed on the ACE Market Bursa Malaysia Focuses on the provision of mobile value-added services to more than 40 Mobile Network Operators reaching out to more than 600 million subscribers Operations in Malaysia, Singapore, Indonesia, Thailand, Vietnam, Cambodia dan Hong Kong Vietnam Hong Kong Singapore Indonesia Thailand Cambodia Mobile Content & Solution To provide services direct to end users, and solutions/ services to corporate clients or telcos Mobile Content & Solution To provide services direct to end users, and solutions/ services to corporate clients or telcos Data & Mobile Security To provide data and mobile security solutions Data & Mobile Security To provide data and mobile security solutions Strategic Business To explore opportunities in Internet of Things (IOT) Strategic Business To explore opportunities in Internet of Things (IOT) Key Business Areas

® mTouche: Key Talent Kenneth Kong Chief Technology Officer Bachelor Degree (Computer Information System) & Master of Business Administration (Finance) from Hawaii Pacific University 2000 – 2013: Worked at the Microsoft Corporation’s HQ in Redmond, Washington Held several management positions in Windows, Microsoft Customer Support and Developer divisions Substantial experience and knowledge in software engineering and various technologies in operating system, web applications, Cloud applications and Business Intelligence Vast experience in the field of cyber security in communications David Hsu Chief Commercial Officer  Bachelor of Arts from the University of British Columbia, Canada & designation in Software Product Management from the University of Washington  15-year career at Microsoft Corporation in Redmond, Washington  Senior Program Manager in Microsoft Azure. Experience in identifying new business opportunities and turning them into products, market sizing, developing partnerships, marketing and communications, and launching products  Performed product planning in Microsoft Customer Service and Support. Part of the leadership team responsible for transforming support.microsoft.com  Managed the planning for Microsoft Developer Network (MSDN). Part of the team that launched Visual Studio 2012

® One Krypto: Overview Chat Voice (VoIP) Notes One Krypto: A secured mobile communication application with comprehensive encryption solution (AES-256 Military Grade Encryption Technology) Features Platform Operating System

® Privacy & Security

® One Krypto: Privacy & Security StealthPasswordEncryptionScreen Capture Password to access OK OK data encrypted OK screen capture disable Conceals OK icon No TracePhone BookAuto Expiry Manual Reset Hidden phone book to keep your private contact details Encryption key expires automatically and reset every 30 days Enable manual reset when key is compromised OK self-destruct

® One Krypto: Users Privacy concious public Professionals who deal in highly confidential and sensitive information, environment and clients eg: analysts, researchers, lawyers, doctors Organisations which communicate and handle confidential information eg: R&D, hospitals, law firms Government Officials & Agencies, Security, Enforcement & Military Personnel Hi Doc. Got the lab results. Great news! Mrs. B is pregnant. Doc X Hey Mr. Banker. Am thinking of merging our Vietnam & Thailand operations. Any thoughts? Mr. CEO

® One Krypto: Media Malaysian 15 Aug 2014 Utusan 15 Aug Feb 2015

® Data & Mobile Security Solutions Mobile Device Management A Mobile Device Management (MDM) solution for organisations to manage mobile devices within their premises: Mobile Device Management Mobile Application Management Mobile Content Management Mobile Data Security Management A Mobile Data Security Management solution allowing user organisation to protect data integrity and privacy: Data Protection: Protects all the files and data including photo, video, documents and contacts, on the mobile devices to enable access permission restriction and encryption to ensure data integrity and security Mobile Security: Password protected, intruder detection and device tampering prevention, remote reset or wipe data on devices Tracking and Monitoring: Tracks and log unauthorized activities KUALA LUMPUR – Persekutuan Majikan-Majikan Malaysia (MEF) mencadangkan supaya satu garis panduan baharu berhubung penggunaan telefon pintar dilaksanakan di tempat bekerja bagi mengelakkan produktiviti mereka terjejas. Pengarah Eksekutif MEF, Datuk Shamsuddin Bardan berkata, garis panduan itu penting kerana terdapat majikan yang terpaksa membayar gaji lebih masa pekerja kerana mereka lewat menyiapkan kerja di­sebabkan penggunaan telefon pintar semasa melakukan tugas- tugas di pejabat. “Ini menyebabkan ada syarikat tertentu yang terlalu ekstrem dengan melarang pekerja mereka menggunakan telefon pintar ketika waktu bekerja,” katanya ketika dihubungi ­ Kosmo! Ahad semalam.

® mTouche Technology Bhd Suite Menara Citibank 165 Jalan Ampang Kuala Lumpur Malaysia Tel: +603 – Fax: THANK YOU