mobile protect pro - powered by zimperium

23

Upload: zimperium

Post on 14-Apr-2017

93 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Mobile Protect Pro - Powered by Zimperium
Page 2: Mobile Protect Pro - Powered by Zimperium
Page 3: Mobile Protect Pro - Powered by Zimperium

By 2018, 25% of corporate data traffic will flow directly from mobile devices to the cloud bypassing enterprise security controls.

By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk.

Gartner, Special Report: Cybersecurity at the Speed of Digital Business, Paul E. Proctor,  Ray Wagner, August 30, 2016

Page 4: Mobile Protect Pro - Powered by Zimperium
Page 5: Mobile Protect Pro - Powered by Zimperium

Mobility: what is the threat?

Page 6: Mobile Protect Pro - Powered by Zimperium

Enterprise Mobility: Device OS attacks

Page 7: Mobile Protect Pro - Powered by Zimperium

2007 2008 2009 2010 2011 2012 2013 2014 2015 20160

50

100

150

200

250

300

350

400

AndroidiOS

Page 8: Mobile Protect Pro - Powered by Zimperium

950+M Devices affected

850M Still Vulnerable

Monthly Security Updates

Page 9: Mobile Protect Pro - Powered by Zimperium

iOS 7 – Sept, 2013

< iOS 9.3.5

System TamperingElevation of Privilege

Page 10: Mobile Protect Pro - Powered by Zimperium

MOBILE PROTECT ProMobile working, worldwide – without risk

always online Wi-Fi at hotel, airport, cafe, fare access to company data, server, backbone charging devices and stations

Page 11: Mobile Protect Pro - Powered by Zimperium

MOBILE PROTECT Proapp-based protection for mobile devices

5 reasons For Mobile PROTECT PRO For MOBILE devices

future proof through detection of known and unknown threats3

360° protection for your smartphone2

protects enterprise data, Android- and iOS-devices1

particularly value in combination with mobile device management4

Scaleable: from single user to enterprise5

Page 12: Mobile Protect Pro - Powered by Zimperium

MOBILE PROTECT Proapp-based Protection for Mobile devices

zCONSOLE zIPS App IT-Integrations-Service Optional

Function: Monitoring overaall

company threats Management security

profile

Function: Protect individual

devices Information for

countermeasures

Function: Connection to

MDM/EMM Definition specific

security profiles

Page 13: Mobile Protect Pro - Powered by Zimperium

Network Attack Detection

Root-/Jailbreak-Detection

zConsole Policies

Anomaly Detection

with MDM/EMM

App Scanning

powered byMobile Protect PROprotects your Smartphone 360°

e.g. OS / Kernel Exploitation,

Profile/Configuration Modification

MobileIron, AirWatchReporting and forensics

Page 14: Mobile Protect Pro - Powered by Zimperium

powered byzConsole: reporting and policies

central management platform provides policy and risk manage- ment combination with SIEM possible comprehensive reporting and compliance analysis basis for forensic threat prevention and analysis configurable data privacy

Page 15: Mobile Protect Pro - Powered by Zimperium

Mobile Protect Pro

15

Drivers & Libraries

Systems Services

Apps

KernelJailbreak & Rooting Detection

Network Attacks (Recon, MITM, SSL Strip Rogue AP, Rogue Cell Tower), Physical Attacks (USB, Bluetooth, NFC), Stagefright

Email and Content Security (MCM), Application Delivery, Security & Policy, Containers (MAM)

OS Management and Control (MDM)

Browser, Email, Attachments, SMS

Malware, Adware, mRAT

Exploits, Privilege Elevation, Chained

Attacks

Page 16: Mobile Protect Pro - Powered by Zimperium

Network Scan

example: Arp Scan WIFImessage for the user

powered by

Page 17: Mobile Protect Pro - Powered by Zimperium

powered byMobile Protect Pro: Trial Conditions

usable for Android 4.0 and iOS 8.0 or higher, worldwide usage support through DTAG verified criteria for success factors, possibly workshop trial start now

Page 18: Mobile Protect Pro - Powered by Zimperium
Page 19: Mobile Protect Pro - Powered by Zimperium
Page 20: Mobile Protect Pro - Powered by Zimperium
Page 21: Mobile Protect Pro - Powered by Zimperium

Global Threat Analysis Report Over 3800 Critical* threats in 7 days

• 63% of threats were network based

• 36% were App based

• >1000 devices involved across 86 unique networks

Top 4 Threats• Suspicious Apps (36%)• Fake SSLs (35%)• SSL Strip (23%)• ARP/ICMP MITM (4%)

ARP MITMFake SSL certificate MITM

ICMP Redirect MITMRogue Access Point

SSL StripSuspicious Android App

System TamperingTraffic Tampering

Grand Total

24362

186

114514

1315

1066

# of Devices

2%36%

2%0%

23%

36%

1%1%

# of Threats

ARP MITM Fake SSL certificate MITM

ICMP Redirect MITM

Rogue Access Point

SSL Strip Suspicious Android App

System Tampering Traffic Tampering

App Based36%

Device Based

1%

Network Based63%

Threat Distribution

App BasedDevice BasedNetwork Based

Page 22: Mobile Protect Pro - Powered by Zimperium
Page 23: Mobile Protect Pro - Powered by Zimperium