mobile protect pro - powered by zimperium

Post on 14-Apr-2017

93 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

By 2018, 25% of corporate data traffic will flow directly from mobile devices to the cloud bypassing enterprise security controls.

By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk.

Gartner, Special Report: Cybersecurity at the Speed of Digital Business, Paul E. Proctor,  Ray Wagner, August 30, 2016

Mobility: what is the threat?

Enterprise Mobility: Device OS attacks

2007 2008 2009 2010 2011 2012 2013 2014 2015 20160

50

100

150

200

250

300

350

400

AndroidiOS

950+M Devices affected

850M Still Vulnerable

Monthly Security Updates

iOS 7 – Sept, 2013

< iOS 9.3.5

System TamperingElevation of Privilege

MOBILE PROTECT ProMobile working, worldwide – without risk

always online Wi-Fi at hotel, airport, cafe, fare access to company data, server, backbone charging devices and stations

MOBILE PROTECT Proapp-based protection for mobile devices

5 reasons For Mobile PROTECT PRO For MOBILE devices

future proof through detection of known and unknown threats3

360° protection for your smartphone2

protects enterprise data, Android- and iOS-devices1

particularly value in combination with mobile device management4

Scaleable: from single user to enterprise5

MOBILE PROTECT Proapp-based Protection for Mobile devices

zCONSOLE zIPS App IT-Integrations-Service Optional

Function: Monitoring overaall

company threats Management security

profile

Function: Protect individual

devices Information for

countermeasures

Function: Connection to

MDM/EMM Definition specific

security profiles

Network Attack Detection

Root-/Jailbreak-Detection

zConsole Policies

Anomaly Detection

with MDM/EMM

App Scanning

powered byMobile Protect PROprotects your Smartphone 360°

e.g. OS / Kernel Exploitation,

Profile/Configuration Modification

MobileIron, AirWatchReporting and forensics

powered byzConsole: reporting and policies

central management platform provides policy and risk manage- ment combination with SIEM possible comprehensive reporting and compliance analysis basis for forensic threat prevention and analysis configurable data privacy

Mobile Protect Pro

15

Drivers & Libraries

Systems Services

Apps

KernelJailbreak & Rooting Detection

Network Attacks (Recon, MITM, SSL Strip Rogue AP, Rogue Cell Tower), Physical Attacks (USB, Bluetooth, NFC), Stagefright

Email and Content Security (MCM), Application Delivery, Security & Policy, Containers (MAM)

OS Management and Control (MDM)

Browser, Email, Attachments, SMS

Malware, Adware, mRAT

Exploits, Privilege Elevation, Chained

Attacks

Network Scan

example: Arp Scan WIFImessage for the user

powered by

powered byMobile Protect Pro: Trial Conditions

usable for Android 4.0 and iOS 8.0 or higher, worldwide usage support through DTAG verified criteria for success factors, possibly workshop trial start now

Global Threat Analysis Report Over 3800 Critical* threats in 7 days

• 63% of threats were network based

• 36% were App based

• >1000 devices involved across 86 unique networks

Top 4 Threats• Suspicious Apps (36%)• Fake SSLs (35%)• SSL Strip (23%)• ARP/ICMP MITM (4%)

ARP MITMFake SSL certificate MITM

ICMP Redirect MITMRogue Access Point

SSL StripSuspicious Android App

System TamperingTraffic Tampering

Grand Total

24362

186

114514

1315

1066

# of Devices

2%36%

2%0%

23%

36%

1%1%

# of Threats

ARP MITM Fake SSL certificate MITM

ICMP Redirect MITM

Rogue Access Point

SSL Strip Suspicious Android App

System Tampering Traffic Tampering

App Based36%

Device Based

1%

Network Based63%

Threat Distribution

App BasedDevice BasedNetwork Based

top related