SlideShare une entreprise Scribd logo
1  sur  9
Mission Centered
Mobility Platform
10 June 2020
Simon Hartley, CIS Mobile
CONFIDENTIAL. ALL RIGHTS RESERVED.
CIS Mobile
CIS Secure
 Specialist in hardening COTS telecom,
computing, and video conferencing devices
 Government customers across
IC, DoD, LE, and Civilian Government
 65,000 sq. ft. NSA-Tempest certified
production facility, labs, and demo center
 150+ Staff in Ashburn, VA
 2 decade history
CIS Mobile
 Wholly owned subsidiary of
CIS Secure Computing
 Focused exclusively on
FVEY secure mobility
 Patented technology with
$25MM+ invested since 2015
 Reference customers in
US, Canada, and UK
Consumer mobile device data exhaust and tracking
 Vanderbilt study on Google data collection
 Military fitness tracking
 NY Times Pentagon and POTUS tracking
 WhatsApp and Zoom tracking
 Troops leave behind personal devices
 “For the agencies that have prohibited personal
smartphone use for work, 40% of employees said the
guidelines have had little to no impact on their
behavior.”
CONFIDENTIAL. ALL RIGHTS RESERVED.
“High threat users”
Intel, military, LE, or IG targeted by:
 Nation states
 Organized crime
 Terrorist organizations
Mobile users who:
 Require mobile access to sensitive data / apps
 Work in secure buildings / sites
 Work / travel overseas
CONFIDENTIAL. ALL RIGHTS RESERVED.
Sample Use Cases
Google Google free
Hidden Containers – covert / overseas use
Later
Secure ModeTrigger Trigger Unrestricted
Use
Secure Mode
Google or no Google
Prevent leakage of sensitive data / meta data to third parties
Secure Mode – secure sites / missions
Google free – limit app store, launcher, and ad ID tracking Multiple containers – many phones to 1 and rapid deployments
Public
Persona
Hidden
Container /
Private
Persona
Prevent exfiltration of sensitive data
Address different job and security requirements
Prevent discovery of sensitive missions, apps, and data
Mission
Specific
Work
Personal
Unrestricted
Use
Key use cases
CONFIDENTIAL. ALL RIGHTS RESERVED.
AltOS Components
Operating System
Android (AOSP) + security
enhancements, system
services, containers &
embedded management
Management Server
Application, network, and
security management, control
and monitoring.
OTA Update Server
Distribution of updates and
security patches to altOS and
system software
Services
Maintenance and support,
security updates,
customization and devices
A mobile platform that provides the functionality, control, and
trust required for high risk mobile users (AWS or On-Premises)
CONFIDENTIAL. ALL RIGHTS RESERVED.
Supported Devices
Smartphones
• Pixel 3 and 3 XL
• Pixel 3a and 3a XL
• Sonim XP8 – Ruggedized
CONFIDENTIAL. ALL RIGHTS RESERVED.
AWS or on-prem management
Remote worker setup – wired or wireless – mirror / desktop*
 Google Pixel 3a smartphone
 Powered USB hub
 Monitor adapter
 Mouse
 Keyboard
 Network connection

Contenu connexe

Tendances

2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanIndus Khaitan
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?Ping Identity
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Proofpoint
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseNowSecure
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
Securing Your Wearable Tech Brand
Securing Your Wearable Tech BrandSecuring Your Wearable Tech Brand
Securing Your Wearable Tech BrandSimon Loe
 
Ibm security domains 2015[3]
Ibm security domains 2015[3]Ibm security domains 2015[3]
Ibm security domains 2015[3]joenicod
 
Mobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtMobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtIGN MANTRA
 
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and CountermeasureI.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and CountermeasureIndonesia Honeynet Chapter
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...viaForensics
 
GDPR Part 4: Better Together Quest & SonicWall
GDPR Part 4: Better Together Quest & SonicWallGDPR Part 4: Better Together Quest & SonicWall
GDPR Part 4: Better Together Quest & SonicWallAdrian Dumitrescu
 
Safeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare DataSafeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare DataBitglass
 

Tendances (20)

2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
Securing Your Wearable Tech Brand
Securing Your Wearable Tech BrandSecuring Your Wearable Tech Brand
Securing Your Wearable Tech Brand
 
Ibm security domains 2015[3]
Ibm security domains 2015[3]Ibm security domains 2015[3]
Ibm security domains 2015[3]
 
Mobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirtMobile security mobile malware countermeasure academic csirt
Mobile security mobile malware countermeasure academic csirt
 
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and CountermeasureI.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
 
IoT - Rise of New Zombies Army
IoT - Rise of New Zombies ArmyIoT - Rise of New Zombies Army
IoT - Rise of New Zombies Army
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
 
GDPR Part 4: Better Together Quest & SonicWall
GDPR Part 4: Better Together Quest & SonicWallGDPR Part 4: Better Together Quest & SonicWall
GDPR Part 4: Better Together Quest & SonicWall
 
Safeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare DataSafeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare Data
 

Similaire à OLD - altOS Secure Mobile Platform - Public

WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology MobileWorxs
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...ashoksankar
 
IoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - AllottIoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - Allottwebinos project
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottwebinos project
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursDilum Bandara
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities DeckPete Wassell
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceSolarWinds
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)IAMCP Canada
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Steve Markey
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSDavid J Rosenthal
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and FinanceSierraware
 
Internet of Things with Wearable Devices at Enterprise Radar
Internet of Things with Wearable Devices at Enterprise RadarInternet of Things with Wearable Devices at Enterprise Radar
Internet of Things with Wearable Devices at Enterprise Radariosrjce
 

Similaire à OLD - altOS Secure Mobile Platform - Public (20)

WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
 
IoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - AllottIoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - Allott
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allott
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is Yours
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Internet of Things with Wearable Devices at Enterprise Radar
Internet of Things with Wearable Devices at Enterprise RadarInternet of Things with Wearable Devices at Enterprise Radar
Internet of Things with Wearable Devices at Enterprise Radar
 

Dernier

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

OLD - altOS Secure Mobile Platform - Public

  • 1. Mission Centered Mobility Platform 10 June 2020 Simon Hartley, CIS Mobile
  • 2. CONFIDENTIAL. ALL RIGHTS RESERVED. CIS Mobile CIS Secure  Specialist in hardening COTS telecom, computing, and video conferencing devices  Government customers across IC, DoD, LE, and Civilian Government  65,000 sq. ft. NSA-Tempest certified production facility, labs, and demo center  150+ Staff in Ashburn, VA  2 decade history CIS Mobile  Wholly owned subsidiary of CIS Secure Computing  Focused exclusively on FVEY secure mobility  Patented technology with $25MM+ invested since 2015  Reference customers in US, Canada, and UK
  • 3. Consumer mobile device data exhaust and tracking  Vanderbilt study on Google data collection  Military fitness tracking  NY Times Pentagon and POTUS tracking  WhatsApp and Zoom tracking  Troops leave behind personal devices  “For the agencies that have prohibited personal smartphone use for work, 40% of employees said the guidelines have had little to no impact on their behavior.”
  • 4. CONFIDENTIAL. ALL RIGHTS RESERVED. “High threat users” Intel, military, LE, or IG targeted by:  Nation states  Organized crime  Terrorist organizations Mobile users who:  Require mobile access to sensitive data / apps  Work in secure buildings / sites  Work / travel overseas
  • 5. CONFIDENTIAL. ALL RIGHTS RESERVED. Sample Use Cases Google Google free Hidden Containers – covert / overseas use Later Secure ModeTrigger Trigger Unrestricted Use Secure Mode Google or no Google Prevent leakage of sensitive data / meta data to third parties Secure Mode – secure sites / missions Google free – limit app store, launcher, and ad ID tracking Multiple containers – many phones to 1 and rapid deployments Public Persona Hidden Container / Private Persona Prevent exfiltration of sensitive data Address different job and security requirements Prevent discovery of sensitive missions, apps, and data Mission Specific Work Personal Unrestricted Use Key use cases
  • 6. CONFIDENTIAL. ALL RIGHTS RESERVED. AltOS Components Operating System Android (AOSP) + security enhancements, system services, containers & embedded management Management Server Application, network, and security management, control and monitoring. OTA Update Server Distribution of updates and security patches to altOS and system software Services Maintenance and support, security updates, customization and devices A mobile platform that provides the functionality, control, and trust required for high risk mobile users (AWS or On-Premises)
  • 7. CONFIDENTIAL. ALL RIGHTS RESERVED. Supported Devices Smartphones • Pixel 3 and 3 XL • Pixel 3a and 3a XL • Sonim XP8 – Ruggedized
  • 8. CONFIDENTIAL. ALL RIGHTS RESERVED. AWS or on-prem management
  • 9. Remote worker setup – wired or wireless – mirror / desktop*  Google Pixel 3a smartphone  Powered USB hub  Monitor adapter  Mouse  Keyboard  Network connection

Notes de l'éditeur

  1. Our Alternative Android OS (altOS) is flashed one time onto standard Google Pixel 3a/3a XL smartphones and hardened Sonim XP8 smartphones then maintained OTA from a web-based console. We offer greater control than consumer-oriented Apple / Android mobile devices while being more affordable, easier to use, and maintain than government only platforms. We focus on these use cases for government communities beyond what regular Apple/Samsung devices do: Combo many devices into one  - Multiple secure containers e.g. to support remote working / multiple independent levels of security Secure sites / missions  - Controlling modems, cameras, mics, and tracking   Covert / OCONUS usage  - Hidden containers, anti-forensics, and spoofing Rapid updates / deployments  - “Easy button” for scaled on-premises or cloud over-the-air management What do customers see drivers for altOS being? Moving from PCs and desk phones to mobile, to drive productivity Consolidating multiple devices into one, to drive prod Separating different levels of security – personal / unclassified / classified for security Driving actual usage of secure systems rather than defaulting to extremes of a) No mobile or b) Leaky COTS devices everywhere FOUO For Official Use Only SBU Sensitive But Unclassified CUI Controlled Unclassified Information NIPR Non-classified Internet Protocol SIPR Secret Internet Protocol
  2. FVEY – Five Eyes – US, Canada, UK, Australia, and New Zealand
  3. digitalcontentnext.org/blog/2018/08/21/google-data-collection-research/ washingtonpost.com/world/the-us-military-reviews-its-rules-as-new-details-of-us-soldiers-and-bases-emerge/2018/01/29/6310d518-050f-11e8-aa61-f3391373867e_story.html techcrunch.com/2019/11/15/los-angeles-juice-jacking-usb/ csoonline.com/article/3448316/cell-phones-dont-belong-in-scifs-says-republican-congressman.html businessinsider.com/nyt-tracked-trump-leaked-location-data-mobile-phone-spying-easy-2019-12 nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html wsj.com/articles/police-tracked-a-terror-suspectuntil-his-phone-went-dark-after-a-facebook-warning-11577996973 https://wsj.com/articles/u-s-military-bans-tiktok-over-ties-to-china-11578090613 https://www.zdnet.com/google-amp/article/us-troops-deploying-to-the-middle-east-told-to-leave-personal-devices-at-home/ https://www.militarytimes.com/flashpoints/2020/01/23/deployed-82nd-airborne-unit-told-to-use-these-encrypted-messaging-apps-on-government-cellphones/ https://www.govexec.com/workforce/2020/03/white-house-calls-maximum-telework-flexibilities-dc-area-employees/163797/ https://techcrunch.com/2020/03/31/zoom-at-your-own-risk/ https://www.afcea.org/content/government-mobile-device-use-still-vulnerable
  4. Single Server Configuration base requirements for a server with all services installed sized to manage up to 1,000 devices. OS:    Ubuntu 18.04 LTS x64 (AMD64)  Multi Core CPU:  minimum 8 cores   CPU speed:    minimum 2 GHz  RAM :     16 GB  DISK:     minimum 1 TB  The database growth rate is approximately 150 MB disk space and 70 MB RAM for each additional 1K devices, the above server configuration should be suitable for deployments up to 5k devices.   Protection is three-fold: • Patching — Our altOS platform is based on the Android Open Source Project (AOSP).  Any issue is patched by Google, and we pass through the monthly patches to our customers to keep them safe any  issues reported.  AltOS’ differentiation in the marketplace is not trying to find or respond to security issues faster than Google itself but instead in making the patching process simpler and easier than the traditional process whereby Google releases patches to OEMs, who then release them to carriers, and then to devices, which can mean vulnerability windows of months. • App white / black listing - You can control what apps run on your altOS devices from our management console.  You can ensure your users only use apps that you’ve tested and approved to protect against these kinds of malicious attacks. • Optional Mobile Threat Defense (MTD) / Mobile Endpoint Defense tools — We have partnered with Zimperium to test their tools on altOS.  We can do the same with other protection products.
  5. "Google's $399 iPhone Killer” -- www.wired.com/story/google-pixel-3a-io-2019-todays-news/ “Rugged phone you can literally jump on” -- mobilesyrup.com/2019/07/19/sonim-xp8-review/
  6. Older hardware / OS = mirroring New hardware / OS = desktop experience with multiple windows