By 2018, 25% of corporate data traffic will flow directly from mobile devices to the cloud bypassing enterprise security controls.
By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk.
Gartner, Special Report: Cybersecurity at the Speed of Digital Business, Paul E. Proctor, Ray Wagner, August 30, 2016
Mobility: what is the threat?
Enterprise Mobility: Device OS attacks
2007 2008 2009 2010 2011 2012 2013 2014 2015 20160
50
100
150
200
250
300
350
400
AndroidiOS
950+M Devices affected
850M Still Vulnerable
Monthly Security Updates
iOS 7 – Sept, 2013
< iOS 9.3.5
System TamperingElevation of Privilege
MOBILE PROTECT ProMobile working, worldwide – without risk
always online Wi-Fi at hotel, airport, cafe, fare access to company data, server, backbone charging devices and stations
MOBILE PROTECT Proapp-based protection for mobile devices
5 reasons For Mobile PROTECT PRO For MOBILE devices
future proof through detection of known and unknown threats3
360° protection for your smartphone2
protects enterprise data, Android- and iOS-devices1
particularly value in combination with mobile device management4
Scaleable: from single user to enterprise5
MOBILE PROTECT Proapp-based Protection for Mobile devices
zCONSOLE zIPS App IT-Integrations-Service Optional
Function: Monitoring overaall
company threats Management security
profile
Function: Protect individual
devices Information for
countermeasures
Function: Connection to
MDM/EMM Definition specific
security profiles
Network Attack Detection
Root-/Jailbreak-Detection
zConsole Policies
Anomaly Detection
with MDM/EMM
App Scanning
powered byMobile Protect PROprotects your Smartphone 360°
e.g. OS / Kernel Exploitation,
Profile/Configuration Modification
MobileIron, AirWatchReporting and forensics
powered byzConsole: reporting and policies
central management platform provides policy and risk manage- ment combination with SIEM possible comprehensive reporting and compliance analysis basis for forensic threat prevention and analysis configurable data privacy
Mobile Protect Pro
15
Drivers & Libraries
Systems Services
Apps
KernelJailbreak & Rooting Detection
Network Attacks (Recon, MITM, SSL Strip Rogue AP, Rogue Cell Tower), Physical Attacks (USB, Bluetooth, NFC), Stagefright
Email and Content Security (MCM), Application Delivery, Security & Policy, Containers (MAM)
OS Management and Control (MDM)
Browser, Email, Attachments, SMS
Malware, Adware, mRAT
Exploits, Privilege Elevation, Chained
Attacks
Network Scan
example: Arp Scan WIFImessage for the user
powered by
powered byMobile Protect Pro: Trial Conditions
usable for Android 4.0 and iOS 8.0 or higher, worldwide usage support through DTAG verified criteria for success factors, possibly workshop trial start now
Global Threat Analysis Report Over 3800 Critical* threats in 7 days
• 63% of threats were network based
• 36% were App based
• >1000 devices involved across 86 unique networks
Top 4 Threats• Suspicious Apps (36%)• Fake SSLs (35%)• SSL Strip (23%)• ARP/ICMP MITM (4%)
ARP MITMFake SSL certificate MITM
ICMP Redirect MITMRogue Access Point
SSL StripSuspicious Android App
System TamperingTraffic Tampering
Grand Total
24362
186
114514
1315
1066
# of Devices
2%36%
2%0%
23%
36%
1%1%
# of Threats
ARP MITM Fake SSL certificate MITM
ICMP Redirect MITM
Rogue Access Point
SSL Strip Suspicious Android App
System Tampering Traffic Tampering
App Based36%
Device Based
1%
Network Based63%
Threat Distribution
App BasedDevice BasedNetwork Based