SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
Securing Mobile Apps: New
  Approaches for the BYOD World                                                                               !




  Presented by:

  Cimarron Buser!
  Apperian, Inc.





                                                                                                     	

	

                                                                                     	

The information and images contained in this document are of a proprietary and confidential nature.
The disclosure, duplication, use in whole, or use in part, of the document for any purposes other than
client evaluation without the written permission of Apperian, Inc. is strictly prohibited.




© Apperian, Inc. 2012. All Rights Reserved.!
Today’s Webinar
Twitter: #AppSecurity

Direct Messages: “Chat Box” in Webinar Session

Q&A At the End of the Presentation




                                                 Page! 2!
About Apperian

     Top tier investors                                        Award winning product




                                                                      2012 Product Finalist
                                                                                              Company to Watch




    Experienced team                                         Strong customer base




                          Copyright © 2012, Apperian, Inc.                                                   Page! 3!
Agenda!

              Mobile Device & App Security

        Challenges for Mobile Apps and Security
        Security in Context: Mobile Enterprise Strategy
        Many Options: MDM, MEAP, MAM, MSSS …
        Specific Approaches: Virtualization, Sandboxes,
         Wrappers, and SDKs
        Moving Forward: Balancing and Managing Mobile
         Risk




                          Copyright © 2012, Apperian, Inc.   Page! 4!
Challenges for Mobile Security


         Users
I want quick and                                  IT
   easy access to
                                     How do I
    business apps
                                     securely                                      Dev
        and data!
                                   deploy and                                   How do
                                      manage                                 I make an
                                      devices                               enterprise-
                                    and apps?                               grade app?




    “BYOD”
    Consumerization of IT
                                         Need a solution now!
    Single personal/work device                                                Need App examples
                                         Security is still #1
    Increased mobility                                                         Lack of IT Apple or Android
                                         Have to mobilize workforce             experience
                                                                                Smartphone SDKs not built
                                                                                 for enterprise

                                         Copyright © 2012, Apperian, Inc.                              Page! 5!
Challenge: Where do users get the Apps?




iTunes App Store or Google Market
       Consumer app focus
       Apps and updates are “optional”
       Personal iTunes or Gmail account based

Private “App Catalog” approach
       Enterprise “in-house” app focus
       Apps and updates “mandatory”
       Corporate directory authenticated


                                  Copyright © 2012, Apperian, Inc.   Page! 6!
                                                                     Page!
Security in Context: Mobile Enterprise Strategy




                                                        Source: The Enterprise
                                                        Mobility Foundation


                     Copyright © 2012, Apperian, Inc.                     Page! 7!
Security in Context: How Big is the Threat?!

        Mobile is “attack surface” that can be exploited
              Unmanaged devices, networks, OS’s, apps
               data flows and storage
        Mobile Risk exists and past “events” sound scary
              Since 2001 $25B+ in loss (PC/Win based)
              Mobile anti-virus and anti-malware emerging
        But so far, no “major” similar events in mobile
              However – SMS fraud is still a problem…
                       Congratulations!!! You won R1,000,000.00 in the on-going
                       Chevron UK bonanza. Claim code: CHVUKB/SA/10. Call
                       Elizabeth on 0835161978 from 9am to 4pm for claim.



                                  Copyright © 2012, Apperian, Inc.                Page! 8!
Enterprise Mobile Apps


  R U Ready?	


                         Page!
Many Options: But it’s Alphabet Soup!

         Mobile Device & App Security Options

        The Acronyms:
              MDM: Mobile Device Management
              MEAP: Mobile Enterprise Application Platform
              MAM: Mobile Application Management
              MSSS: Mobile Security Software Suite
        The Approaches:
              Virtualization, Wrappers, SDKs, Sandboxes…



                            Copyright © 2012, Apperian, Inc.   Page! 10!
Many Security Touch Points


               Visibility            Policy                Monitoring   GRC

                   User              Auth-n/z              Education    Policies

                    App              SDK                    Wrapper     Middleware

               Partition             VM                    Container    Partition

                  Agent              AV                     Firewall    Blacklist

                 Device              VPN                   Location     Encryption

                      OS             Sandbox                Profiles    APIs

               Network               Carrier                 Wi-Fi      Bluetooth




                        Copyright © 2012, Apperian, Inc.                             Page! 11!
Anatomy of an iOS Device Security Posture

                                                                       Remotely wipe devices, track lost or
                                                                       stolen devices, ensure deletion of data.	



                         Remediation	

                                Manage access and authorize users based
                                                                       on enterprise credentials.	


                           Auth-n/z	

                                                                       Secure container with App content based
                                                                       on user role, SDK extends to Apps. 	

                       App Container	

                                                                       Manage settings, ensure compliance
                                                                       policies, remotely wipe and delete.	

                            MDM	


Same capabilities      Device Profiles	

                               Control security settings for VPN, Wi-Fi,
available to all	

                                                    email and authentication.	

                      Device Encryption	

                                                                       Apps & Data at rest and in use protected
                        App Sandbox	

                                 via HW encryption.	



                                                                       Limited access to files, preferences,
                                                                       network, hardware and other Apps.	



                                    Copyright © 2012, Apperian, Inc.                                                 Page! 12!
MDM - Mobile Device Management!
   MDM focuses on device-based security, provisioning and
 control of mobile devices. Additional features may provide
    TEMS, Device Inventory, and app lists (part of MAM)

•     MDM is useful for organizations requiring a high level of control over
      Corporate Liable devices due to regulatory requirements, or where
      the risk of users accessing “non approved” information is high.

•     Microsoft Exchange Server provides security with device
      management features via ActiveSync, including security profile
      (e.g., user must have PIN code or specific type and length), and
      device “wipe” and “lock”

•     Apple IOS supports a protocol called “MDM” that allows IOS devices
      to register with a central server, and thereafter receive specific
      commands to perform tasks, e.g., “device wipe”, install security
      profiles, or send back device status without user intervention.


                                  Copyright © 2012, Apperian, Inc.         Page! 13!
MDM – Device Management Examples!




Microsoft Exchange 2007 Server - Device                       Google Apps Device Management Console
Management feature




                                          Copyright © 2012, Apperian, Inc.                            Page! 14!
MEAP - Mobile Enterprise Application Platform!

     MEAPs provide “tools and client/server middleware for
      mobile (targeting any sort of mobile application) and
     multichannel (highly device/OS- and network-adaptive)
      thick (offline) enterprise application development”*

•     MEAPs are used by some organizations that require an integrated
      development environment.

•     MEAPs are attractive to companies that want to deploy an
      enterprise-wide solution across many different device types, using
      central logic for large, complex apps

•     MEAP Sandboxes enable multiple applications within a single
      “native app” sandbox, thereby providing control over the
      application from a single dashboard
                                                                    * Source: Gartner Group


                                 Copyright © 2012, Apperian, Inc.                     Page! 15!
MEAP - Example!




    Source: Antenna Software: AMP Platform



                                      Copyright © 2012, Apperian, Inc.   Page! 16!
MAM - Mobile Application Management!
MAM focuses on the role-based security, provisioning and control
 of mobile apps in an organization with capabilities that may
    include device inventory, reporting/tracking, and user
                         compliance.

•     MAMs are useful for organizations providing “in-house” apps to users
      on either CL or IL devices. For example, if a user leaves an
      organization or group, apps and data belonging to the organization
      can be de-provisioned, without resorting to a full “device wipe”

•     MAM solutions are typically used in mixed (CL/IL) environments or
      where BYOD policies are implemented.

•     Apple and Android supports over-the-air delivery of apps than
      enable apps and profiles to be delivered from a server


                                 Copyright © 2012, Apperian, Inc.         Page! 17!
MAM - Example!




    Source: Apperian, Inc. – EASE App Catalog



                                        Copyright © 2012, Apperian, Inc.   Page! 18!
MSSS - Mobile Security Software Suite!
     MSSS focuses on providing a complete “suite” of solutions that
     may include antivirus, personal firewall, VPN, encryption, anti-
           spam, and remote monitoring and control services.

•      MSSS solutions extend traditional “enterprise” protections for the
       PC environment to mobility. Services can include remote back up
       and restore, lost and stolen device location, as well as data wipe.

•      MSSS can also send an alert when “security” events occur, e.g.,
       when a SIM card has been removed or replaced.

•      MSSS capabilities are beginning to overlap or be subsumed by MDM
       or built-in OS solutions (e.g. iCloud) and certain features, such as
       anti-virus, are not necessarily viewed as critical… yet




                                   Copyright © 2012, Apperian, Inc.           Page! 19!
Approaches to Data/App Security!

•     Virtualization allows a device to having a different “partition” or
      “persona” that provides two or more virtual device modes; apps built
      for these modes may require an SDK or Wrapper
•     SDKs provide direct support to native app developers for
      authentication, authorization, reporting/tracking and other services
      to provide for app and data security enforcement
•     Wrappers offer the promise of “wrapping” an existing mobile app
      without the need to re-compile or change code; the resulting app can
      then be managed centrally
•     Sandboxes allow a single or multiple apps to live within a “sandbox”
      and be logically separated from other apps but managed centrally

      … Application Developers may use one or more of these approaches
      to address security issues, or use “do it yourself” methods	


                                                                    * Source: ISO


                                 Copyright © 2012, Apperian, Inc.                   Page! 20!
Mobile Security Solutions

                                                                                              “Holy Grail Solution”
                                MDM	


                             Mobile Iron
                             Air Watch	

                              BoxTone	

                                                Virtualization (OS)	

                                                                                                 MAM	

  Device Management	





                                                VMWare Horizon	

                                                 ATT Toggle	

                         Device Mgmt	

                                                        Apperian
                                                                                              AppCentral	

                         MS Exchange                                                      Partnerpedia	

                          Google DM	

                         Apple Profile
                             Mgr	

              MEAP	

                           MPSS	

                                              (Sandboxes)	

                                                                               Symantec	

                                               Antenna	

                       McAfee	

                                                Sybase	

                                            Wrappers	

                                                                                 RSA	

                                                 Pyxis	

                                                GOOD	

                                               Mocana	

                                                                                                      Arxan	





                                                    App and Data Management	



                                                         Copyright © 2012, Apperian, Inc.                                Page! 21!
Moving Forward: Balancing Risk and Objectives!

Security Objective	

                  Risk	

                                Low	

              Medium	

           High	


Confidentiality	

                      Unauthorized disclosure of             limited             serious             severe or
Preserving authorized restrictions     information … to                       adverse effect	

   adverse effect	

   catastrophic
on information access and              organizational operations,                                                     adverse effect	

disclosure, including means for        organizational assets, or
protecting personal privacy and        individuals	

proprietary information.	




Integrity	

                           Unauthorized modification or            limited             serious             severe or
Guarding against improper              destruction of information …           adverse effect	

   adverse effect	

   catastrophic
information modification or             to operations, organizational                                                  adverse effect	

destruction, and includes ensuring     assets, or individuals.	

information non- repudiation and
authenticity.	




Availability	

                        Disruption of access to or use         limited             serious             severe or
Ensuring timely and reliable           of information or an                   adverse effect	

   adverse effect	

   catastrophic
access to and use of information.	

   information system .. on                                                       adverse effect	

                                       organizational operations,
                                       organizational assets, or
                                       individuals	


                                                   Source: Adapted from “Standards for Security Categorization of Federal
                                                   Information and Information Systems” (FIPS PUB 199)

                                                        Copyright © 2012, Apperian, Inc.                                                  Page! 22!
Moving Forward: Making a Plan!



                                      Make Security part of overall Strategy
                                                 Focus on “high impact” areas
                                      Establish Basic Policies  User Agreement
                                                 “Best Practices” including encryption
                                                  for data in transit and data at rest
                                                 Basic security policy for PINs,
                                                  registration (“Find Me”) and enabling
                                                  wipe for company and user
                                      Have Plan in Place for Data Breach
                                                 Event reporting protocol
                                                 Specific steps and actions
                                      Measure and Monitor
                    Copyright © 2012, Apperian, Inc.                              Page! 23!
QA

      www.apperian.com


         Additional Questions?
         Contact Cimarron Buser



         cbuser@apperian.com

                                  Page! 24!

Contenu connexe

Tendances

MYZEAL IT Solutions-Offshore Mobile Apps Development Company India
MYZEAL IT Solutions-Offshore Mobile Apps Development Company IndiaMYZEAL IT Solutions-Offshore Mobile Apps Development Company India
MYZEAL IT Solutions-Offshore Mobile Apps Development Company IndiaMYZEAL IT Solutions LLC
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiMasha Geller
 
Cygnet mobility solutions & case studies
Cygnet mobility solutions & case studiesCygnet mobility solutions & case studies
Cygnet mobility solutions & case studiesTarak Joshi
 
Kony Mobile Management
Kony Mobile ManagementKony Mobile Management
Kony Mobile ManagementDipesh Mukerji
 
Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012CorSource
 
Demystifying the Mobile Container - PART I
Demystifying the Mobile Container - PART IDemystifying the Mobile Container - PART I
Demystifying the Mobile Container - PART IRelayware
 
Kony-Cognizant Webinar: Finding the Silver Bullet in Retail Mobility
Kony-Cognizant Webinar: Finding the Silver Bullet in Retail MobilityKony-Cognizant Webinar: Finding the Silver Bullet in Retail Mobility
Kony-Cognizant Webinar: Finding the Silver Bullet in Retail MobilityKony, Inc.
 
BlackBerry 10 Implications for Enterprise Mobility
BlackBerry 10 Implications for Enterprise MobilityBlackBerry 10 Implications for Enterprise Mobility
BlackBerry 10 Implications for Enterprise MobilityRelayware
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
 
Single sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceSingle sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceCA API Management
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Relayware
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD OpportunityJuniper Networks
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
BYOD - it's an identity thing
BYOD - it's an identity thingBYOD - it's an identity thing
BYOD - it's an identity thingPaul Madsen
 
Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12Salesforce Partners
 
YUDU iPad and iPhone apps for the travel industry - Presentation
YUDU iPad and iPhone apps for the travel industry - PresentationYUDU iPad and iPhone apps for the travel industry - Presentation
YUDU iPad and iPhone apps for the travel industry - PresentationYUDU Media
 
Penrillian.com - Mobile Money
Penrillian.com - Mobile MoneyPenrillian.com - Mobile Money
Penrillian.com - Mobile MoneyMobileMoney
 
The Modern Web, Part 1: Mobility
The Modern Web, Part 1: MobilityThe Modern Web, Part 1: Mobility
The Modern Web, Part 1: MobilityDavid Pallmann
 

Tendances (20)

MYZEAL IT Solutions-Offshore Mobile Apps Development Company India
MYZEAL IT Solutions-Offshore Mobile Apps Development Company IndiaMYZEAL IT Solutions-Offshore Mobile Apps Development Company India
MYZEAL IT Solutions-Offshore Mobile Apps Development Company India
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
 
Cygnet mobility solutions & case studies
Cygnet mobility solutions & case studiesCygnet mobility solutions & case studies
Cygnet mobility solutions & case studies
 
Kony Mobile Management
Kony Mobile ManagementKony Mobile Management
Kony Mobile Management
 
Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012Extending softwareintomobile 11 28-2012
Extending softwareintomobile 11 28-2012
 
Demystifying the Mobile Container - PART I
Demystifying the Mobile Container - PART IDemystifying the Mobile Container - PART I
Demystifying the Mobile Container - PART I
 
Kony-Cognizant Webinar: Finding the Silver Bullet in Retail Mobility
Kony-Cognizant Webinar: Finding the Silver Bullet in Retail MobilityKony-Cognizant Webinar: Finding the Silver Bullet in Retail Mobility
Kony-Cognizant Webinar: Finding the Silver Bullet in Retail Mobility
 
BlackBerry 10 Implications for Enterprise Mobility
BlackBerry 10 Implications for Enterprise MobilityBlackBerry 10 Implications for Enterprise Mobility
BlackBerry 10 Implications for Enterprise Mobility
 
Mobilemonday b2b mobco
Mobilemonday b2b   mobcoMobilemonday b2b   mobco
Mobilemonday b2b mobco
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
Single sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceSingle sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConference
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
 
Ibeacons bible
Ibeacons bibleIbeacons bible
Ibeacons bible
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
BYOD - it's an identity thing
BYOD - it's an identity thingBYOD - it's an identity thing
BYOD - it's an identity thing
 
Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12
 
YUDU iPad and iPhone apps for the travel industry - Presentation
YUDU iPad and iPhone apps for the travel industry - PresentationYUDU iPad and iPhone apps for the travel industry - Presentation
YUDU iPad and iPhone apps for the travel industry - Presentation
 
Penrillian.com - Mobile Money
Penrillian.com - Mobile MoneyPenrillian.com - Mobile Money
Penrillian.com - Mobile Money
 
The Modern Web, Part 1: Mobility
The Modern Web, Part 1: MobilityThe Modern Web, Part 1: Mobility
The Modern Web, Part 1: Mobility
 

En vedette

9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...
9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...
9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...Moscow State University
 
Presentation1[2]
Presentation1[2]Presentation1[2]
Presentation1[2]georgb2789
 
Retailin france 2011_kh
Retailin france 2011_khRetailin france 2011_kh
Retailin france 2011_khAllystephen
 
David mahmood dallas business journal facetime profile
David mahmood   dallas business journal facetime profileDavid mahmood   dallas business journal facetime profile
David mahmood dallas business journal facetime profileBruce Condit
 
Ancillaries planning & Evolution
Ancillaries planning & EvolutionAncillaries planning & Evolution
Ancillaries planning & EvolutionGeeetarBen
 
2 класс. lesson 29. рождественская история
2 класс. lesson 29. рождественская история2 класс. lesson 29. рождественская история
2 класс. lesson 29. рождественская историяshpinat
 
University of the fraser valley
University of the fraser valleyUniversity of the fraser valley
University of the fraser valleyDhrron Consultancy
 
11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...
11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...
11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...Moscow State University
 
Photoshop assignment #1
Photoshop assignment #1Photoshop assignment #1
Photoshop assignment #1pranidhi
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now. Apperian
 

En vedette (20)

9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...
9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...
9. Общая экономика 2017: Процесс обращения капитала. Метаморфозы капитала и и...
 
Presentation1[2]
Presentation1[2]Presentation1[2]
Presentation1[2]
 
Retailin france 2011_kh
Retailin france 2011_khRetailin france 2011_kh
Retailin france 2011_kh
 
David mahmood dallas business journal facetime profile
David mahmood   dallas business journal facetime profileDavid mahmood   dallas business journal facetime profile
David mahmood dallas business journal facetime profile
 
Ancillaries planning & Evolution
Ancillaries planning & EvolutionAncillaries planning & Evolution
Ancillaries planning & Evolution
 
Trabajo del examen
Trabajo del examenTrabajo del examen
Trabajo del examen
 
Video games
Video gamesVideo games
Video games
 
Photo project
Photo projectPhoto project
Photo project
 
itcslive ppt
itcslive pptitcslive ppt
itcslive ppt
 
2 класс. lesson 29. рождественская история
2 класс. lesson 29. рождественская история2 класс. lesson 29. рождественская история
2 класс. lesson 29. рождественская история
 
Slide blog
Slide blogSlide blog
Slide blog
 
University of the fraser valley
University of the fraser valleyUniversity of the fraser valley
University of the fraser valley
 
11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...
11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...
11. Общая экономика 2017: Процесс капиталистического производства, взятый в ц...
 
Navegadores de internet
Navegadores de internetNavegadores de internet
Navegadores de internet
 
Photoshop assignment #1
Photoshop assignment #1Photoshop assignment #1
Photoshop assignment #1
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.
 
Slide blog
Slide blogSlide blog
Slide blog
 
"Going Mobile - Not the 'WHO', the How"
"Going Mobile - Not the 'WHO', the How""Going Mobile - Not the 'WHO', the How"
"Going Mobile - Not the 'WHO', the How"
 
Jodhpur media
Jodhpur mediaJodhpur media
Jodhpur media
 
Camosun college
Camosun collegeCamosun college
Camosun college
 

Similaire à Securing Mobile Apps: New Approaches for the BYOD World

Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them OutApperian
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end reviewLeigh Williamson
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightDirk Nicol
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidMobile March
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaLeigh Williamson
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMIBM Danmark
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseCA API Management
 
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...CA API Management
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel BilgilendirmeSybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel BilgilendirmeSybase Türkiye
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USIBM Danmark
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
Enterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, ImplementationEnterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, ImplementationYugan Sikri
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApperian
 
Debunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application DevelopmentDebunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application DevelopmentAntenna Software
 

Similaire à Securing Mobile Apps: New Approaches for the BYOD World (20)

Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out
 
Jerry Romanek series mobile development 2012 year end review
Jerry Romanek series   mobile development 2012 year end reviewJerry Romanek series   mobile development 2012 year end review
Jerry Romanek series mobile development 2012 year end review
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit India
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
 
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the EnterpriseBeyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
 
IBM Worklight-Overview
IBM Worklight-OverviewIBM Worklight-Overview
IBM Worklight-Overview
 
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel BilgilendirmeSybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
Enterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, ImplementationEnterprise Mobility Trends, Components, Implementation
Enterprise Mobility Trends, Components, Implementation
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
Debunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application DevelopmentDebunking Common Myths of Mobile Application Development
Debunking Common Myths of Mobile Application Development
 

Plus de Apperian

Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilityApperian
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with MocanaApperian
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityApperian
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityApperian
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldApperian
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19Apperian
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21Apperian
 
Applification of Business
Applification of BusinessApplification of Business
Applification of BusinessApperian
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Apperian
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE Apperian
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDMApperian
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesApperian
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in RetailApperian
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseApperian
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsApperian
 

Plus de Apperian (15)

Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of Mobility
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great Opportunity
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM World
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21
 
Applification of Business
Applification of BusinessApplification of Business
Applification of Business
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile Devices
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in Retail
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native Apps
 

Dernier

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Dernier (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Securing Mobile Apps: New Approaches for the BYOD World

  • 1. Securing Mobile Apps: New Approaches for the BYOD World ! Presented by:
 Cimarron Buser! Apperian, Inc.
 The information and images contained in this document are of a proprietary and confidential nature. The disclosure, duplication, use in whole, or use in part, of the document for any purposes other than client evaluation without the written permission of Apperian, Inc. is strictly prohibited. © Apperian, Inc. 2012. All Rights Reserved.!
  • 2. Today’s Webinar Twitter: #AppSecurity Direct Messages: “Chat Box” in Webinar Session Q&A At the End of the Presentation Page! 2!
  • 3. About Apperian Top tier investors Award winning product 2012 Product Finalist Company to Watch Experienced team Strong customer base Copyright © 2012, Apperian, Inc. Page! 3!
  • 4. Agenda! Mobile Device & App Security   Challenges for Mobile Apps and Security   Security in Context: Mobile Enterprise Strategy   Many Options: MDM, MEAP, MAM, MSSS …   Specific Approaches: Virtualization, Sandboxes, Wrappers, and SDKs   Moving Forward: Balancing and Managing Mobile Risk Copyright © 2012, Apperian, Inc. Page! 4!
  • 5. Challenges for Mobile Security Users I want quick and IT easy access to How do I business apps securely Dev and data! deploy and How do manage I make an devices enterprise- and apps? grade app?   “BYOD”   Consumerization of IT   Need a solution now!   Single personal/work device   Need App examples   Security is still #1   Increased mobility   Lack of IT Apple or Android   Have to mobilize workforce experience   Smartphone SDKs not built for enterprise Copyright © 2012, Apperian, Inc. Page! 5!
  • 6. Challenge: Where do users get the Apps? iTunes App Store or Google Market   Consumer app focus   Apps and updates are “optional”   Personal iTunes or Gmail account based Private “App Catalog” approach   Enterprise “in-house” app focus   Apps and updates “mandatory”   Corporate directory authenticated Copyright © 2012, Apperian, Inc. Page! 6! Page!
  • 7. Security in Context: Mobile Enterprise Strategy Source: The Enterprise Mobility Foundation Copyright © 2012, Apperian, Inc. Page! 7!
  • 8. Security in Context: How Big is the Threat?!   Mobile is “attack surface” that can be exploited   Unmanaged devices, networks, OS’s, apps data flows and storage   Mobile Risk exists and past “events” sound scary   Since 2001 $25B+ in loss (PC/Win based)   Mobile anti-virus and anti-malware emerging   But so far, no “major” similar events in mobile   However – SMS fraud is still a problem… Congratulations!!! You won R1,000,000.00 in the on-going Chevron UK bonanza. Claim code: CHVUKB/SA/10. Call Elizabeth on 0835161978 from 9am to 4pm for claim. Copyright © 2012, Apperian, Inc. Page! 8!
  • 9. Enterprise Mobile Apps R U Ready? Page!
  • 10. Many Options: But it’s Alphabet Soup! Mobile Device & App Security Options   The Acronyms:   MDM: Mobile Device Management   MEAP: Mobile Enterprise Application Platform   MAM: Mobile Application Management   MSSS: Mobile Security Software Suite   The Approaches:   Virtualization, Wrappers, SDKs, Sandboxes… Copyright © 2012, Apperian, Inc. Page! 10!
  • 11. Many Security Touch Points Visibility Policy Monitoring GRC User Auth-n/z Education Policies App SDK Wrapper Middleware Partition VM Container Partition Agent AV Firewall Blacklist Device VPN Location Encryption OS Sandbox Profiles APIs Network Carrier Wi-Fi Bluetooth Copyright © 2012, Apperian, Inc. Page! 11!
  • 12. Anatomy of an iOS Device Security Posture Remotely wipe devices, track lost or stolen devices, ensure deletion of data. Remediation Manage access and authorize users based on enterprise credentials. Auth-n/z Secure container with App content based on user role, SDK extends to Apps. App Container Manage settings, ensure compliance policies, remotely wipe and delete. MDM Same capabilities Device Profiles Control security settings for VPN, Wi-Fi, available to all email and authentication. Device Encryption Apps & Data at rest and in use protected App Sandbox via HW encryption. Limited access to files, preferences, network, hardware and other Apps. Copyright © 2012, Apperian, Inc. Page! 12!
  • 13. MDM - Mobile Device Management! MDM focuses on device-based security, provisioning and control of mobile devices. Additional features may provide TEMS, Device Inventory, and app lists (part of MAM) •  MDM is useful for organizations requiring a high level of control over Corporate Liable devices due to regulatory requirements, or where the risk of users accessing “non approved” information is high. •  Microsoft Exchange Server provides security with device management features via ActiveSync, including security profile (e.g., user must have PIN code or specific type and length), and device “wipe” and “lock” •  Apple IOS supports a protocol called “MDM” that allows IOS devices to register with a central server, and thereafter receive specific commands to perform tasks, e.g., “device wipe”, install security profiles, or send back device status without user intervention. Copyright © 2012, Apperian, Inc. Page! 13!
  • 14. MDM – Device Management Examples! Microsoft Exchange 2007 Server - Device Google Apps Device Management Console Management feature Copyright © 2012, Apperian, Inc. Page! 14!
  • 15. MEAP - Mobile Enterprise Application Platform! MEAPs provide “tools and client/server middleware for mobile (targeting any sort of mobile application) and multichannel (highly device/OS- and network-adaptive) thick (offline) enterprise application development”* •  MEAPs are used by some organizations that require an integrated development environment. •  MEAPs are attractive to companies that want to deploy an enterprise-wide solution across many different device types, using central logic for large, complex apps •  MEAP Sandboxes enable multiple applications within a single “native app” sandbox, thereby providing control over the application from a single dashboard * Source: Gartner Group Copyright © 2012, Apperian, Inc. Page! 15!
  • 16. MEAP - Example! Source: Antenna Software: AMP Platform Copyright © 2012, Apperian, Inc. Page! 16!
  • 17. MAM - Mobile Application Management! MAM focuses on the role-based security, provisioning and control of mobile apps in an organization with capabilities that may include device inventory, reporting/tracking, and user compliance. •  MAMs are useful for organizations providing “in-house” apps to users on either CL or IL devices. For example, if a user leaves an organization or group, apps and data belonging to the organization can be de-provisioned, without resorting to a full “device wipe” •  MAM solutions are typically used in mixed (CL/IL) environments or where BYOD policies are implemented. •  Apple and Android supports over-the-air delivery of apps than enable apps and profiles to be delivered from a server Copyright © 2012, Apperian, Inc. Page! 17!
  • 18. MAM - Example! Source: Apperian, Inc. – EASE App Catalog Copyright © 2012, Apperian, Inc. Page! 18!
  • 19. MSSS - Mobile Security Software Suite! MSSS focuses on providing a complete “suite” of solutions that may include antivirus, personal firewall, VPN, encryption, anti- spam, and remote monitoring and control services. •  MSSS solutions extend traditional “enterprise” protections for the PC environment to mobility. Services can include remote back up and restore, lost and stolen device location, as well as data wipe. •  MSSS can also send an alert when “security” events occur, e.g., when a SIM card has been removed or replaced. •  MSSS capabilities are beginning to overlap or be subsumed by MDM or built-in OS solutions (e.g. iCloud) and certain features, such as anti-virus, are not necessarily viewed as critical… yet Copyright © 2012, Apperian, Inc. Page! 19!
  • 20. Approaches to Data/App Security! •  Virtualization allows a device to having a different “partition” or “persona” that provides two or more virtual device modes; apps built for these modes may require an SDK or Wrapper •  SDKs provide direct support to native app developers for authentication, authorization, reporting/tracking and other services to provide for app and data security enforcement •  Wrappers offer the promise of “wrapping” an existing mobile app without the need to re-compile or change code; the resulting app can then be managed centrally •  Sandboxes allow a single or multiple apps to live within a “sandbox” and be logically separated from other apps but managed centrally … Application Developers may use one or more of these approaches to address security issues, or use “do it yourself” methods * Source: ISO Copyright © 2012, Apperian, Inc. Page! 20!
  • 21. Mobile Security Solutions “Holy Grail Solution” MDM Mobile Iron Air Watch BoxTone Virtualization (OS) MAM Device Management VMWare Horizon ATT Toggle Device Mgmt Apperian AppCentral MS Exchange Partnerpedia Google DM Apple Profile Mgr MEAP MPSS (Sandboxes) Symantec Antenna McAfee Sybase Wrappers RSA Pyxis GOOD Mocana Arxan App and Data Management Copyright © 2012, Apperian, Inc. Page! 21!
  • 22. Moving Forward: Balancing Risk and Objectives! Security Objective Risk Low Medium High Confidentiality Unauthorized disclosure of limited serious severe or Preserving authorized restrictions information … to adverse effect adverse effect catastrophic on information access and organizational operations, adverse effect disclosure, including means for organizational assets, or protecting personal privacy and individuals proprietary information. Integrity Unauthorized modification or limited serious severe or Guarding against improper destruction of information … adverse effect adverse effect catastrophic information modification or to operations, organizational adverse effect destruction, and includes ensuring assets, or individuals. information non- repudiation and authenticity. Availability Disruption of access to or use limited serious severe or Ensuring timely and reliable of information or an adverse effect adverse effect catastrophic access to and use of information. information system .. on adverse effect organizational operations, organizational assets, or individuals Source: Adapted from “Standards for Security Categorization of Federal Information and Information Systems” (FIPS PUB 199) Copyright © 2012, Apperian, Inc. Page! 22!
  • 23. Moving Forward: Making a Plan!   Make Security part of overall Strategy   Focus on “high impact” areas   Establish Basic Policies User Agreement   “Best Practices” including encryption for data in transit and data at rest   Basic security policy for PINs, registration (“Find Me”) and enabling wipe for company and user   Have Plan in Place for Data Breach   Event reporting protocol   Specific steps and actions   Measure and Monitor Copyright © 2012, Apperian, Inc. Page! 23!
  • 24. QA www.apperian.com Additional Questions? Contact Cimarron Buser cbuser@apperian.com Page! 24!