We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byLindsey Watkins
Modified over 6 years ago
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies
Session Contents Overview of Mobility and Mobile Security – Introduction to Mobility – Mobile Security Best Practices for Secure Software Development Android OS – Security Architecture and deployment – Android Attack Surfaces – Enterprise features, What can we leverage? Questions? © 2011 Endeavour Software Technologies 2
A Capability Communicate and Access On the Move Anytime From Anywhere Voice, Messages, Data Enterprise Mobility The ability of an enterprise to connect to people and control assets from any location. Technologies that support enterprise mobility include wireless networks, mobile applications, middleware, devices, and security and management software. Forrester Research Definition Mobility © 2011 Endeavour Software Technologies 3
What is happening in the Corporate World? © 2011 Endeavour Software Technologies 4
Mobile Security – Everywhere! Device Level Network Level Application Level © 2011 Endeavour Software Technologies 5
Mobile Security Considerations Mobility Infrastructure – Security is a key focus area. – Ensuring existing policies is implemented – Integration with existing tools, systems – Keep devices light, manageable Mobile Middleware Platform – Composite Applications Landscape and devices – Mobile Device Management – Mobile Data Synchronization – Phased approach for Common Services and Mobile Applications Mobile Applications Distribution – Enterprise distribution through OTA to specific devices Infrastructure Middleware Application © 2011 Endeavour Software Technologies 6
Application Security – Must Include User Authentication Data Security on Device Data in Transit Issue Device Management and Application Provisioning © 2011 Endeavour Software Technologies 7
Mobile Security Considerations Credentials IMEI/ 2FA OTP, User – Agent Quick Access Code, Token Access Files Key Storage Resources Storage Session Protocols Connection Points Transportation © 2011 Endeavour Software Technologies 8
Enterprise Mobile Security – Do’s © 2011 Endeavour Software Technologies 9
Enterprise Mobile Security – Best Practices 1.Protect the Brand Your Customers Trust 2.Know Your Business and Support it with Secure Solutions 3.Understand the Technology of the Software 4.Ensure Compliance to Governance, Regulations, and Privacy 5.Know the Basic Tenets of Software Security 6.Ensure the Protection of Sensitive Information 7.Design, Develop and Deploy Software with Secure Features © 2011 Endeavour Software Technologies 10
Android Security Architecture Permission Based Model Remote App Management Sandbox © 2011 Endeavour Software Technologies 11
Android Security – Permission based model Permission-based Model – Linux + Android’s Permission – Well defined at system level – Approved by user at install – High-level permissions restricted by Android runtime framework – For example, an application that needs to monitor incoming SMS messages would specify... © 2011 Endeavour Software Technologies 12
Android Security – Remote App Management Remote Install/removal – Google can remove or install apps remotely – Users can install apps remotely from online Android Market http://market.android.com © 2011 Endeavour Software Technologies 13
Android Security - Sandbox © 2011 Endeavour Software Technologies 14
Android’s Attack Surfaces Isolated applications is like having multi-user system Single UI/ Device Secure sharing of UI and IO Principal maps to code, not user (like browsers) Appeals to user for all security decisions Phishing style attach risks Linux, not Java, Sandbox. Native code not a barrier Any java App can execute shell, load JNI libraries, write and exec programs Reference – iSEC PARTNERS © 2011 Endeavour Software Technologies 15
Enterprise features (Froyo/ GingerBread) Remote wipe – Remotely reset the device to factory defaults Improved security – Addition of numeric pin, alphanumeric passwords to unlock the device Exchange calendars Auto-discovery Global Address List C2DM* – Cloud to device messaging *Still it is part of Google Code Labs © 2011 Endeavour Software Technologies 16
Enterprise features (Honeycomb) New device administration policies – Encrypted storage – Password expiration – Password history – Complex characters in password Configure HTTP proxy for each connected WiFi access point (AOS 3.1 only) Encrypted storage cards © 2011 Endeavour Software Technologies 17
Thanks! You! – For patiently listening to us! Silicon India team Endeavour’s Android TCG team Happy to receive feedback and questions at email@example.com firstname.lastname@example.org 18
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
McAfee One Time Password
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Desktop Central Managing Desktops, Servers & Devices Romanus Prabhu R Technical Account Manager LinkedIn : romanus.prabhu.
Policy Weaving for Mobile Devices Drew Davidson. Smartphone security is critical – 1200 to 1400 US Army troops to be equipped with Android smartphones.
Meraki Mobile Device Management
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
Technical Brief v1.0. Communication tools that broadcast visual content directly onto the screens of computers, using multiple channels and formats Easy.
Data Devices People 6.5B Wireless connections today >42% of global population owns smartphone by end of 2015 >50% User will go to tablet or smartphone.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
© 2021 SlidePlayer.com Inc. All rights reserved.