SlideShare une entreprise Scribd logo
1  sur  9
Mobile Data Security w/MAP

The Power of Application Wrapping
September 2012
Introducing Mocana

Offices                 Target Market                     Major Products
                                                            Major Products         Target Segments
San Francisco, CA       - Enterprises                     - Mobile App Protection™ - Automotive & Aviation
                                                            Shipping Security Platform: 22 Modules
                                                            Smart Device
Headquarters            - Device Manufacturers              (MAP)                  - Banking & Finance
                        - Service Providers
                                                             spanning end-to-end device security
                                                          - Smart Device Security  - Consumer Electronics
Industry                                                    Platform™ (SDSP):      - Datacom
                        Primary                             24 Modules             - Defense & Government
Smart Device Security                                                              - Industrial Automation
Software and Services   Business Benefit                  Customers                - Medical
                        Mocana instills confidence                                 - Mobile
Awards                  and trust for OEMs, service       200+ customers           - Smart Grid / AMI
                        providers, consumers and
- World Economic
  Forum 2012
                        enterprises by securing smart     Multiple Patents          Solid Investors
                        devices and the applications
  Tech Pioneer          and services they carry.          Filed and Granted         -   Trident Capital
- RedHerring Global                                                                 -   Intel
  Top 100 Private Co.                                                               -   Symantec
- Plus others                                                                       -   Shasta Ventures




August 13, 2012                    For Internal Use Only – Mocana Confidential
Organizational Mobility Priorities

▶    Onboard mobile assets fluidly

▶    Give app / data access to the right users

▶    Prevent data loss or leakage (DLP)

▶    Separate or distinguish between corp and personal data

▶    Make it easy / seamless for the user

▶    Understand who is using what / when




August 13, 2012           For Internal Use Only – Mocana Confidential
Mocana Mobile App Protection™ (MAP)
Protecting Corp Data Thru Self-Defending Mobile Applications


                                    ▶     Integrates seamlessly into Apperian
                                          EASE
                                    ▶     High confidence mobile data protection
                                          based on the creation of “self-defending
                                          applications”
                                    ▶     Patent-pending wrapping method adds
                                          key security in seconds
                                    ▶     Flexibility to vary security on each app
                                          as necessary
                                    ▶     Support across iOS and Android


August 13, 2012           For Internal Use Only – Mocana Confidential
Seamless Integration Into Apperian EASE




August 13, 2012   For Internal Use Only – Mocana Confidential
Mocana Mobile App Protection™
Key Security Policies

                  Security and Usage Policies*         Benefit
                                                       Per-Application DLP

                                                       Encrypt data stored by a specific app, without having to encrypt the entire
                  Data-at-Rest Encryption              device.
                                                       Prevent malware and rogue apps from accessing data.

                                                       Prevent sensitive enterprise data leakage by prohibiting unauthorized
                  Secure Copy-Paste                    copying and pasting from specific apps.

                                                       Per-Application VPN

                                                       A VPN specific to the app prevents rogue apps and malware from accessing
                  Data-in-Motion Encryption            or performing reconnaissance on enterprise networks.

                                                       Per-Application ACCESS


                  User Authentication                  Authenticate user prior to granting access to a specific app.



                  Jail-break/Rooted                    Disable a specific app when the device is compromised by jailbreaking
                  Detection                            or rooting.




August 13, 2012                            For Internal Use Only – Mocana Confidential
Illustrative Federal Case Study

The Goal:

•    Want to embrace BYOD as an agency standard platform for field work and
     communications

•    Looking to embrace a MLS strategy

Challenges:

•    iOS not open enough for their needs

•    Android fragmentation makes security standardization at a device-level difficult

•    Different users have different security clearances and access to less or more
     sensitive mobile applications

•    Data needs to be encrypted at a FIPS 140-2 level and using the latest
     cryptographic standards such as Suite B



August 13, 2012               For Internal Use Only – Mocana Confidential
Federal Case Study Cont’d

How MAP Technology Fit In
• User access: 6-digit Alphanumeric passphrases rotating every 6
  weeks on applications touching classified documents
• User agreement feature used to prominently display warning/alert
  for sensitive applications on initial access
• Using a secure VOIP app wrapped with Mocana for person-to-
  person communications
• Use of only wrapped applications for key functions
     •    Third-party camera app can be used which allows photos to be encrypted
          and stored on network share via per-app VPN

• Ability to disable access to some applications (and their data) but
  not to all communication channels


August 13, 2012               For Internal Use Only – Mocana Confidential
Mocana Mobile App Protection™
Summary


                           ▶    A new way to embrace BYOD
                                securely

                           ▶    The “application becomes the
                                endpoint”

                           ▶    Best of both worlds: great user
                                experience, no compromise in
                                security

                           ▶    Available today for both iOS and
                                Android

August 13, 2012   For Internal Use Only – Mocana Confidential

Contenu connexe

Tendances

SAP mobile platform & mobile apps
SAP mobile platform & mobile appsSAP mobile platform & mobile apps
SAP mobile platform & mobile appsCapgemini
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Luca Rossetti
 
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelMobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelCA Technologies
 
Mobile architecture overview
Mobile architecture overviewMobile architecture overview
Mobile architecture overviewDavid Scruggs
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer AppsCA API Management
 
B3 mobile development and deployment platform enabled by oracle fusion midd...
B3   mobile development and deployment platform enabled by oracle fusion midd...B3   mobile development and deployment platform enabled by oracle fusion midd...
B3 mobile development and deployment platform enabled by oracle fusion midd...Dr. Wilfred Lin (Ph.D.)
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...CA API Management
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
Mobile Application Architecture Strategy
Mobile Application Architecture StrategyMobile Application Architecture Strategy
Mobile Application Architecture StrategyGary Wong
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device UniverseCA API Management
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Technologies
 
Ca mdm marketing presentation
Ca mdm marketing presentationCa mdm marketing presentation
Ca mdm marketing presentationCA Technologies
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefingNitin Gaur
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation MATT ALEXANDER
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseAnyPresence
 

Tendances (20)

SAP mobile platform & mobile apps
SAP mobile platform & mobile appsSAP mobile platform & mobile apps
SAP mobile platform & mobile apps
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
 
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelMobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
 
Mobile architecture overview
Mobile architecture overviewMobile architecture overview
Mobile architecture overview
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps
 
B3 mobile development and deployment platform enabled by oracle fusion midd...
B3   mobile development and deployment platform enabled by oracle fusion midd...B3   mobile development and deployment platform enabled by oracle fusion midd...
B3 mobile development and deployment platform enabled by oracle fusion midd...
 
SAP Mobile Platform - Product and Roadmap
SAP Mobile Platform - Product and RoadmapSAP Mobile Platform - Product and Roadmap
SAP Mobile Platform - Product and Roadmap
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
Mobile Application Architecture Strategy
Mobile Application Architecture StrategyMobile Application Architecture Strategy
Mobile Application Architecture Strategy
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Ca mdm marketing presentation
Ca mdm marketing presentationCa mdm marketing presentation
Ca mdm marketing presentation
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefing
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
 

En vedette

3.1.1 fedualisme dan kapitalisme di jerman dan perancis
3.1.1 fedualisme dan kapitalisme di jerman dan perancis3.1.1 fedualisme dan kapitalisme di jerman dan perancis
3.1.1 fedualisme dan kapitalisme di jerman dan perancisKarsodikromo Yatiman
 
Жанна Прашкевич. Необходимая документация в SMM
Жанна Прашкевич. Необходимая документация в SMMЖанна Прашкевич. Необходимая документация в SMM
Жанна Прашкевич. Необходимая документация в SMMSocialMediaClubCA
 
Dich de hoc v1.1 public
Dich de hoc v1.1 publicDich de hoc v1.1 public
Dich de hoc v1.1 publicBui Hang
 
Ab undergraduate thesis_final
Ab undergraduate thesis_finalAb undergraduate thesis_final
Ab undergraduate thesis_finalAmber Brant
 
Capitulo1 Mecanica dos fluidos
Capitulo1 Mecanica dos fluidosCapitulo1 Mecanica dos fluidos
Capitulo1 Mecanica dos fluidosadalberto miran
 
Lesson 11. школьный портфель. цирковая школа
Lesson 11. школьный портфель. цирковая школаLesson 11. школьный портфель. цирковая школа
Lesson 11. школьный портфель. цирковая школаshpinat
 
12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...
12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...
12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...Moscow State University
 
Biblioteca pessoal
Biblioteca pessoalBiblioteca pessoal
Biblioteca pessoalRick Rios
 
Раим Дадыбаев. "Победный и Добрый кейсы"
Раим Дадыбаев. "Победный и Добрый кейсы"Раим Дадыбаев. "Победный и Добрый кейсы"
Раим Дадыбаев. "Победный и Добрый кейсы"SocialMediaClubCA
 
E2D3 ver. 0.2 API説明書
E2D3 ver. 0.2 API説明書E2D3 ver. 0.2 API説明書
E2D3 ver. 0.2 API説明書E2D3.org
 
презентация солинг
презентация солингпрезентация солинг
презентация солингAndreykireenkov
 
University of the fraser valley
University of the fraser valleyUniversity of the fraser valley
University of the fraser valleyDhrron Consultancy
 
Themindmapingroad 121126144454-phpapp02
Themindmapingroad 121126144454-phpapp02Themindmapingroad 121126144454-phpapp02
Themindmapingroad 121126144454-phpapp02Thomas Nuth
 
Penetapan kkm
Penetapan kkmPenetapan kkm
Penetapan kkmEva Zen
 

En vedette (20)

3.1.1 fedualisme dan kapitalisme di jerman dan perancis
3.1.1 fedualisme dan kapitalisme di jerman dan perancis3.1.1 fedualisme dan kapitalisme di jerman dan perancis
3.1.1 fedualisme dan kapitalisme di jerman dan perancis
 
Revista
RevistaRevista
Revista
 
Chick N. Head
Chick N. HeadChick N. Head
Chick N. Head
 
Жанна Прашкевич. Необходимая документация в SMM
Жанна Прашкевич. Необходимая документация в SMMЖанна Прашкевич. Необходимая документация в SMM
Жанна Прашкевич. Необходимая документация в SMM
 
Babyzine IPR
Babyzine IPRBabyzine IPR
Babyzine IPR
 
Dich de hoc v1.1 public
Dich de hoc v1.1 publicDich de hoc v1.1 public
Dich de hoc v1.1 public
 
Ab undergraduate thesis_final
Ab undergraduate thesis_finalAb undergraduate thesis_final
Ab undergraduate thesis_final
 
Capitulo1 Mecanica dos fluidos
Capitulo1 Mecanica dos fluidosCapitulo1 Mecanica dos fluidos
Capitulo1 Mecanica dos fluidos
 
Lesson 11. школьный портфель. цирковая школа
Lesson 11. школьный портфель. цирковая школаLesson 11. школьный портфель. цирковая школа
Lesson 11. школьный портфель. цирковая школа
 
Impresion
ImpresionImpresion
Impresion
 
12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...
12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...
12. Общая экономика 2017: Превращение прибыли в среднюю прибыль. «Голландская...
 
Biblioteca pessoal
Biblioteca pessoalBiblioteca pessoal
Biblioteca pessoal
 
Раим Дадыбаев. "Победный и Добрый кейсы"
Раим Дадыбаев. "Победный и Добрый кейсы"Раим Дадыбаев. "Победный и Добрый кейсы"
Раим Дадыбаев. "Победный и Добрый кейсы"
 
E2D3 ver. 0.2 API説明書
E2D3 ver. 0.2 API説明書E2D3 ver. 0.2 API説明書
E2D3 ver. 0.2 API説明書
 
Bansi
BansiBansi
Bansi
 
The town
The townThe town
The town
 
презентация солинг
презентация солингпрезентация солинг
презентация солинг
 
University of the fraser valley
University of the fraser valleyUniversity of the fraser valley
University of the fraser valley
 
Themindmapingroad 121126144454-phpapp02
Themindmapingroad 121126144454-phpapp02Themindmapingroad 121126144454-phpapp02
Themindmapingroad 121126144454-phpapp02
 
Penetapan kkm
Penetapan kkmPenetapan kkm
Penetapan kkm
 

Similaire à Federal Grade Security with Mocana

Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
Evaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityEvaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityRapidSSLOnline.com
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...ashoksankar
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxArrow ECS UK
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Relayware
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíMarketingArrowECS_CZ
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile applicationVikrant Kansal
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityarms8586
 

Similaire à Federal Grade Security with Mocana (20)

Chris D'Aguanno
Chris D'AguannoChris D'Aguanno
Chris D'Aguanno
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Evaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityEvaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise Mobility
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptx
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile application
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
 

Plus de Apperian

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian WebinarApperian
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilityApperian
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiApperian
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityApperian
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityApperian
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldApperian
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19Apperian
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21Apperian
 
Applification of Business
Applification of BusinessApplification of Business
Applification of BusinessApperian
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Apperian
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE Apperian
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApperian
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now. Apperian
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDMApperian
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesApperian
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in RetailApperian
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them OutApperian
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseApperian
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsApperian
 

Plus de Apperian (20)

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian Webinar
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of Mobility
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roi
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great Opportunity
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM World
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21
 
Applification of Business
Applification of BusinessApplification of Business
Applification of Business
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile Devices
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in Retail
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native Apps
 

Dernier

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Federal Grade Security with Mocana

  • 1. Mobile Data Security w/MAP The Power of Application Wrapping September 2012
  • 2. Introducing Mocana Offices Target Market Major Products Major Products Target Segments San Francisco, CA - Enterprises - Mobile App Protection™ - Automotive & Aviation Shipping Security Platform: 22 Modules Smart Device Headquarters - Device Manufacturers (MAP) - Banking & Finance - Service Providers spanning end-to-end device security - Smart Device Security - Consumer Electronics Industry Platform™ (SDSP): - Datacom Primary 24 Modules - Defense & Government Smart Device Security - Industrial Automation Software and Services Business Benefit Customers - Medical Mocana instills confidence - Mobile Awards and trust for OEMs, service 200+ customers - Smart Grid / AMI providers, consumers and - World Economic Forum 2012 enterprises by securing smart Multiple Patents Solid Investors devices and the applications Tech Pioneer and services they carry. Filed and Granted - Trident Capital - RedHerring Global - Intel Top 100 Private Co. - Symantec - Plus others - Shasta Ventures August 13, 2012 For Internal Use Only – Mocana Confidential
  • 3. Organizational Mobility Priorities ▶ Onboard mobile assets fluidly ▶ Give app / data access to the right users ▶ Prevent data loss or leakage (DLP) ▶ Separate or distinguish between corp and personal data ▶ Make it easy / seamless for the user ▶ Understand who is using what / when August 13, 2012 For Internal Use Only – Mocana Confidential
  • 4. Mocana Mobile App Protection™ (MAP) Protecting Corp Data Thru Self-Defending Mobile Applications ▶ Integrates seamlessly into Apperian EASE ▶ High confidence mobile data protection based on the creation of “self-defending applications” ▶ Patent-pending wrapping method adds key security in seconds ▶ Flexibility to vary security on each app as necessary ▶ Support across iOS and Android August 13, 2012 For Internal Use Only – Mocana Confidential
  • 5. Seamless Integration Into Apperian EASE August 13, 2012 For Internal Use Only – Mocana Confidential
  • 6. Mocana Mobile App Protection™ Key Security Policies Security and Usage Policies* Benefit Per-Application DLP Encrypt data stored by a specific app, without having to encrypt the entire Data-at-Rest Encryption device. Prevent malware and rogue apps from accessing data. Prevent sensitive enterprise data leakage by prohibiting unauthorized Secure Copy-Paste copying and pasting from specific apps. Per-Application VPN A VPN specific to the app prevents rogue apps and malware from accessing Data-in-Motion Encryption or performing reconnaissance on enterprise networks. Per-Application ACCESS User Authentication Authenticate user prior to granting access to a specific app. Jail-break/Rooted Disable a specific app when the device is compromised by jailbreaking Detection or rooting. August 13, 2012 For Internal Use Only – Mocana Confidential
  • 7. Illustrative Federal Case Study The Goal: • Want to embrace BYOD as an agency standard platform for field work and communications • Looking to embrace a MLS strategy Challenges: • iOS not open enough for their needs • Android fragmentation makes security standardization at a device-level difficult • Different users have different security clearances and access to less or more sensitive mobile applications • Data needs to be encrypted at a FIPS 140-2 level and using the latest cryptographic standards such as Suite B August 13, 2012 For Internal Use Only – Mocana Confidential
  • 8. Federal Case Study Cont’d How MAP Technology Fit In • User access: 6-digit Alphanumeric passphrases rotating every 6 weeks on applications touching classified documents • User agreement feature used to prominently display warning/alert for sensitive applications on initial access • Using a secure VOIP app wrapped with Mocana for person-to- person communications • Use of only wrapped applications for key functions • Third-party camera app can be used which allows photos to be encrypted and stored on network share via per-app VPN • Ability to disable access to some applications (and their data) but not to all communication channels August 13, 2012 For Internal Use Only – Mocana Confidential
  • 9. Mocana Mobile App Protection™ Summary ▶ A new way to embrace BYOD securely ▶ The “application becomes the endpoint” ▶ Best of both worlds: great user experience, no compromise in security ▶ Available today for both iOS and Android August 13, 2012 For Internal Use Only – Mocana Confidential

Notes de l'éditeur

  1. Thank you. Good morning and good afternoon, I’m [name], [title] for MAP at Mocana Corporation. I’d like to take you through why Mocana and Apperian feel so passionately about an application centric approach to mobile security, including an example of how federal government customers could use the MAP technology to meet their organizational mobility needs.
  2. Mocana is a software security and services company. We are headquartered in San Francisco, CA and have rich IP in the area of smart device security. We currently have over 200 OEMs that are shipping products with Mocana security IP that span different markets from Medical, Federal, Military, Industrial, and Consumer segments. We have seen tremendous growth in the market over the past few years and expect this to continue. Lastly, we have Symantec, Intel (McAfee), and Shasta Ventures who have funded our company. This is great validation, as the worlds top 2 security companies see Mocana as their answer for smart device security.
  3. Now when we look at the market and what organizations are trying to solve today with their organizational mobility projects, including BYOD and corporate issued devices, here are some of the key requirements we see that are important to meet.It’s starts with onboarding their employees with their applications and in some cases devices. It includes things like making sure the right users are given access, data is not lost.
  4. Mocana’s Mobile App Protection (MAP) protects sensitive corporate data through the use of a unique and patent-pending technology called Appvelope™ that “envelopes” or “wraps” fine-grained data access, usage, and protection policies around individual apps.Enables enterprises to securely extend data access to a greater number of mobile devices, including employee, customer, & corporate-owned devices.Completely automated & seamlessly integrates with existing infrastructure for staging and deploying mobile apps, including 3rd party MDM systems & Corporate App Stores.Designed for enterprise IT to build and deploy secure internal facing & customer facing (B2C) apps—without needing access to the app source code or requiring an on-device client.Compliments MDM systems, but goes beyond sandbox or container solutions to bring security to individual apps.The result is a secure, self-defending App that does not impact user experience.