SlideShare une entreprise Scribd logo
1  sur  20
S.JYOTHISH KUMAR
2
Definition:
Mobile app security is
the extent of protection
that mobile device applications
(apps) have from malware
and the activities of crackers
and other criminals.
With the explosive growth of smartphones,
tablets and mobile devices, companies must find
a means of providing access to their internal
systems and information to their mobile
workforce securely and seamlessly.
3
 Microsoft Exchange
2003
 Blackberry Enterprise
Server 4.1 SP7
◦ 10,000 email boxes
 2,000 using mobile devices
 Only company provided
Blackberry devices are
supported
4
 Confidentiality
◦ Commercial Data
 Ex: Financial, IP, etc.
◦ Personal Data
 Ex: Customer, Employee records,
PCI, etc.
 User Personal Data
◦ Diplomatic cables
 Accessibility
◦ Resource uptime
◦ High Availability / Recoverability
◦ Archive
5
Maintain device flexibility
while protecting against
security risks
• Business users today are more
mobile than ever before and are
looking to access the enterprise
from multiple devices:
– Apple iOS
– Android
– Blackberry
– Windows Mobile
• Users today are more
technically skilled than before
and are unfortunately able to
develop “Business Managed
Solutions” which may not meet
the security requirements of the
enterprise
– Must securely support
users on the 4
identified leading
mobile platforms
– Must leverage the
significant existing
Exchange and
Blackberry investment
High Level Requirements
&
Solution Approach
The answer – A Mobile Device Management (MDM)
Solution
7
 MS Exchange
◦ Exchange 2003 or Exchange 2007 SP2
◦ ActiveSync (EAS) enabled
◦ Enterprise Certificate services / certificate based
authentication
 Mobile Device support
◦ Support latest Mobile OS’s
◦ Employee-provided device
◦ Support for VPN, Wi-Fi, ActiveSync and encryption
◦ Centralized IT management & control
◦ Support for common file attachments
8
 Security
◦ All devices should be enrolled into corporate network
◦ Provisioning of mobile devices should be secure
◦ Security policies should be targeted to right
groups/employees
◦ Restriction of some/all mobile applications
◦ Complex/multi-character passwords required
◦ Updates of mobile OS required
◦ Encryption of all forms of corporate data
◦ Tracking and inventory of all devices
◦ Access control over corporate email system
◦ Sanction and disconnect modified devices or rouge
device
◦ Selective/full remote wipe of device
9
10
Good Technology
 Manage & Protect access to vital company
information
 Without imprisoning the user or their device
 With flexibility…
◦ Manage the entire device
OR
◦ Manage the Good application
 Plays nice in the mobile sandbox!
11
"Corporate policies should focus on regulating behavior, rather than
devices..."
— Gartner, May 2010
12
13
FIREWALLS
FIREWALLS
AD / LDAP Services Email Servers
Good Message Servers
Good Mobile Control
Good Mobile Access
SQL Database
Good NOC
SSL
14
Good Technology Solution
Capital Expense
Software (2000 licenses) $140,468 -
Hardware $178,801 $34,410
Maintenance - $57,775
Sub Total $319,269 $92,185
TOTAL 2 year capacity $411,454
15
Per Device Comparison
Blackberry
Enterprise
Server
Good
Technology
Annual data plan service $504 $0*
Annual Inclusive maintenance & support $4 $159
Total annual cost $508 $159
$0
$200,000
$400,000
$600,000
$800,000
$1,000,000
0
200
400
600
800
1000
1200
1400
1600
1800
2000
Annual Cost Comparison
of Mobility Run Rates
Good Technology
Blackberry ES
 Financial Liability
◦ May be required to pay stipend for device/usage
 Additionally corporate data plans apply in some
instances
◦ Employee may be taxed for fringe benefit
◦ Nonexempt employees create issues
 Legal Liability
◦ Evidence of illegal activity must not go unreported
◦ Archiving may be required
16
 While some employees will only need access
to PIM-data, many will need full device
management.
 In these cases, all data must be subject to
review and/or archive by the company
◦ Email, SMS/MMS, IM, music, etc.
 All activity (applications, browser, peripheral
control, etc.) must be subject to audit and
control at any time.
 How to handle all of this??
17
 Most people will agree to any ToS
without second thoughts.
 Acceptance of the restrictions rely
completely on employees’
understanding them
 Rewards are worth the
risks …
18
 Despite shared liability, employee-provided
cell phones for business purposes are
extremely popular.
◦ Conveniences for employee
◦ Savings for employer
 Trend will continue
19
 Employee-owned mobile phones provide
risks, challenges.
 However, benefits are great to both company
and employees.
 Our provided solution, leveraging Good
Technology, is the most efficient and feasible
way to implement a corporate private mobile
device policy.
20

Contenu connexe

Tendances

Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
Denim Group
 

Tendances (20)

Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
IOS security
IOS securityIOS security
IOS security
 
Android security
Android securityAndroid security
Android security
 
Mobile App Security Testing -2
Mobile App Security Testing -2Mobile App Security Testing -2
Mobile App Security Testing -2
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
 
Android Security
Android SecurityAndroid Security
Android Security
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Android.ppt
Android.pptAndroid.ppt
Android.ppt
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 

En vedette

Seguridad en android.ppt
Seguridad en android.pptSeguridad en android.ppt
Seguridad en android.ppt
fabibmx7
 
Te pique lo que te pique, analiza un SQLite
Te pique lo que te pique, analiza un SQLiteTe pique lo que te pique, analiza un SQLite
Te pique lo que te pique, analiza un SQLite
Alejandro Ramos
 

En vedette (20)

13 Administración Android - Seguridad
13 Administración Android  -  Seguridad13 Administración Android  -  Seguridad
13 Administración Android - Seguridad
 
Javier Moreno & Eloi Sanfélix - Seguridad y explotación nativa en Android [Ro...
Javier Moreno & Eloi Sanfélix - Seguridad y explotación nativa en Android [Ro...Javier Moreno & Eloi Sanfélix - Seguridad y explotación nativa en Android [Ro...
Javier Moreno & Eloi Sanfélix - Seguridad y explotación nativa en Android [Ro...
 
Android manifest
Android manifestAndroid manifest
Android manifest
 
Seguridad en android.ppt
Seguridad en android.pptSeguridad en android.ppt
Seguridad en android.ppt
 
54. OWASP Mobile Top Ten
54. OWASP Mobile Top Ten54. OWASP Mobile Top Ten
54. OWASP Mobile Top Ten
 
Arquitectura Android
Arquitectura AndroidArquitectura Android
Arquitectura Android
 
SQLite UPCI 2013
SQLite UPCI 2013SQLite UPCI 2013
SQLite UPCI 2013
 
Te pique lo que te pique, analiza un SQLite
Te pique lo que te pique, analiza un SQLiteTe pique lo que te pique, analiza un SQLite
Te pique lo que te pique, analiza un SQLite
 
Testing Android Security
Testing Android SecurityTesting Android Security
Testing Android Security
 
Golosarioooo
GolosariooooGolosarioooo
Golosarioooo
 
Ingeniería Inversa en Android. Rooted Labs. Rooted CON 2012.
Ingeniería Inversa en Android.  Rooted Labs. Rooted CON 2012.Ingeniería Inversa en Android.  Rooted Labs. Rooted CON 2012.
Ingeniería Inversa en Android. Rooted Labs. Rooted CON 2012.
 
Manual moviles.
Manual moviles.Manual moviles.
Manual moviles.
 
Fo 5.desarrollo android-almacenamientodedatos
Fo 5.desarrollo android-almacenamientodedatosFo 5.desarrollo android-almacenamientodedatos
Fo 5.desarrollo android-almacenamientodedatos
 
Android
AndroidAndroid
Android
 
Presentacion segi seminario_yisell
Presentacion segi seminario_yisellPresentacion segi seminario_yisell
Presentacion segi seminario_yisell
 
Empresa de seguridad rootnit android malware
Empresa de seguridad rootnit android malwareEmpresa de seguridad rootnit android malware
Empresa de seguridad rootnit android malware
 
Análisis forense de dispositivos android 01
Análisis forense de dispositivos android 01Análisis forense de dispositivos android 01
Análisis forense de dispositivos android 01
 
Android in practice
Android in practiceAndroid in practice
Android in practice
 
Testing Android Security
Testing Android SecurityTesting Android Security
Testing Android Security
 
Android Pres3
Android Pres3Android Pres3
Android Pres3
 

Similaire à mobile application security

Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device security
EnclaveSecurity
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
Francisco Anes
 

Similaire à mobile application security (20)

Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device security
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Secure Your Mobile Content!
Secure Your Mobile Content!Secure Your Mobile Content!
Secure Your Mobile Content!
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your Data
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 

Plus de -jyothish kumar sirigidi

Plus de -jyothish kumar sirigidi (11)

Pythonintroduction
PythonintroductionPythonintroduction
Pythonintroduction
 
Webtechnologies
Webtechnologies Webtechnologies
Webtechnologies
 
Open source software
Open source softwareOpen source software
Open source software
 
Html
HtmlHtml
Html
 
Authenticating with our minds
Authenticating with our mindsAuthenticating with our minds
Authenticating with our minds
 
Google chrome OS
Google chrome OSGoogle chrome OS
Google chrome OS
 
Blue eye technology ppt
Blue eye technology pptBlue eye technology ppt
Blue eye technology ppt
 
Android
AndroidAndroid
Android
 
Network security
Network securityNetwork security
Network security
 
CLOUD COMPUTING
CLOUD COMPUTINGCLOUD COMPUTING
CLOUD COMPUTING
 
Applications of computer graphics
Applications of computer graphicsApplications of computer graphics
Applications of computer graphics
 

mobile application security

  • 2. 2 Definition: Mobile app security is the extent of protection that mobile device applications (apps) have from malware and the activities of crackers and other criminals.
  • 3. With the explosive growth of smartphones, tablets and mobile devices, companies must find a means of providing access to their internal systems and information to their mobile workforce securely and seamlessly. 3
  • 4.  Microsoft Exchange 2003  Blackberry Enterprise Server 4.1 SP7 ◦ 10,000 email boxes  2,000 using mobile devices  Only company provided Blackberry devices are supported 4
  • 5.  Confidentiality ◦ Commercial Data  Ex: Financial, IP, etc. ◦ Personal Data  Ex: Customer, Employee records, PCI, etc.  User Personal Data ◦ Diplomatic cables  Accessibility ◦ Resource uptime ◦ High Availability / Recoverability ◦ Archive 5 Maintain device flexibility while protecting against security risks
  • 6. • Business users today are more mobile than ever before and are looking to access the enterprise from multiple devices: – Apple iOS – Android – Blackberry – Windows Mobile • Users today are more technically skilled than before and are unfortunately able to develop “Business Managed Solutions” which may not meet the security requirements of the enterprise – Must securely support users on the 4 identified leading mobile platforms – Must leverage the significant existing Exchange and Blackberry investment High Level Requirements & Solution Approach The answer – A Mobile Device Management (MDM) Solution
  • 7. 7
  • 8.  MS Exchange ◦ Exchange 2003 or Exchange 2007 SP2 ◦ ActiveSync (EAS) enabled ◦ Enterprise Certificate services / certificate based authentication  Mobile Device support ◦ Support latest Mobile OS’s ◦ Employee-provided device ◦ Support for VPN, Wi-Fi, ActiveSync and encryption ◦ Centralized IT management & control ◦ Support for common file attachments 8
  • 9.  Security ◦ All devices should be enrolled into corporate network ◦ Provisioning of mobile devices should be secure ◦ Security policies should be targeted to right groups/employees ◦ Restriction of some/all mobile applications ◦ Complex/multi-character passwords required ◦ Updates of mobile OS required ◦ Encryption of all forms of corporate data ◦ Tracking and inventory of all devices ◦ Access control over corporate email system ◦ Sanction and disconnect modified devices or rouge device ◦ Selective/full remote wipe of device 9
  • 10. 10
  • 11. Good Technology  Manage & Protect access to vital company information  Without imprisoning the user or their device  With flexibility… ◦ Manage the entire device OR ◦ Manage the Good application  Plays nice in the mobile sandbox! 11 "Corporate policies should focus on regulating behavior, rather than devices..." — Gartner, May 2010
  • 12. 12
  • 13. 13
  • 14. FIREWALLS FIREWALLS AD / LDAP Services Email Servers Good Message Servers Good Mobile Control Good Mobile Access SQL Database Good NOC SSL 14
  • 15. Good Technology Solution Capital Expense Software (2000 licenses) $140,468 - Hardware $178,801 $34,410 Maintenance - $57,775 Sub Total $319,269 $92,185 TOTAL 2 year capacity $411,454 15 Per Device Comparison Blackberry Enterprise Server Good Technology Annual data plan service $504 $0* Annual Inclusive maintenance & support $4 $159 Total annual cost $508 $159 $0 $200,000 $400,000 $600,000 $800,000 $1,000,000 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Annual Cost Comparison of Mobility Run Rates Good Technology Blackberry ES
  • 16.  Financial Liability ◦ May be required to pay stipend for device/usage  Additionally corporate data plans apply in some instances ◦ Employee may be taxed for fringe benefit ◦ Nonexempt employees create issues  Legal Liability ◦ Evidence of illegal activity must not go unreported ◦ Archiving may be required 16
  • 17.  While some employees will only need access to PIM-data, many will need full device management.  In these cases, all data must be subject to review and/or archive by the company ◦ Email, SMS/MMS, IM, music, etc.  All activity (applications, browser, peripheral control, etc.) must be subject to audit and control at any time.  How to handle all of this?? 17
  • 18.  Most people will agree to any ToS without second thoughts.  Acceptance of the restrictions rely completely on employees’ understanding them  Rewards are worth the risks … 18
  • 19.  Despite shared liability, employee-provided cell phones for business purposes are extremely popular. ◦ Conveniences for employee ◦ Savings for employer  Trend will continue 19
  • 20.  Employee-owned mobile phones provide risks, challenges.  However, benefits are great to both company and employees.  Our provided solution, leveraging Good Technology, is the most efficient and feasible way to implement a corporate private mobile device policy. 20