SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
How to Effectively Secure Hundreds
of Thousands of Mobile Devices
Brian Duckering
Enterprise Mobile
Security Specialist
Symantec
Copyright © 2019 Symantec Corporation 2
Agenda
Mobile IntroducesRisk To Enterprises
How to EffectivelyImplement MobileSecurity
Symantec Recommends…
1
2
3
Copyright © 2019 Symantec Corporation 3
Mobile Devices Represent One of the
Largest Security Gaps in Any Enterprise
C O NNECT ED 24/ 7 TARG E T ED
SE C O ND FAC TOR
LAC K O F C AUT ION
O UT O F D AT E RISK Y AP P S
• 55% o f ema i l i s fi rst o p ened o n mo b i l e d evi ces
• 57% o f gl o b a l w eb t ra ffic o ri gi nated fro m mo b i l e d evi ces
• 64% o f G o o gl e sea rch cl i ck s o ri gi nat ed fro m mo b i l e d evi ces
• Mo b i l e u sers a re 3X mo re l i kel y t o su b mit l o gi n i n fo t o p h i sh ing si t es t h a n d esktop u sers
Copyright © 2019 Symantec Corporation 4
Mobile Breaches Lead To
Corporate Breaches
A careless mobile user can put your company in the news
SMS
Phishing
Device
compromise
Stolen
credentials
Third-party
access
(mission
critical apps)
Major
corporate
breach
… and the original mobile attack won’t get the blame.
Copyright © 2019 Symantec Corporation 5
Build A Mobile Security Program
...Not Just Deploy A Tool
Build the long-term strategy
Get executive support
Define policies and procedures
Find the right technology
Copyright © 2019 Symantec Corporation 6
Considerations To Gain Support
And Increase User Acceptance Rates
Help users
understand
why
Designate
internal
champions
What this
means to
users
Help legal and
compliance
teams
understand
Copyright © 2019 Symantec Corporation 7
Secure Managed And
Unmanaged Devices
Deploy through
phased rollout or
targetedgroup
Understand
managed
vs unmanaged
Educate the userbase
through notifications
Only secure devices
are connecting
to applications
Copyright © 2019 Symantec Corporation 8
Behavior Inspection
Define corporate policies for managed devices
Define a process to handle the incoming events
Enable mobile application whitelisting policy
Feedback to users around insecure / unwanted applications
Copyright © 2019 Symantec Corporation 9
Real-time Prevention And Detection
Build toward the goal of enforcement,
not just detection
Integrate with existing tools
to make use of the data
Create key performance indicators and
other metrics to measure success
Copyright © 2019 Symantec Corporation 10
The Right Resources
Operate the solution
with the right skillsets
depending on your
organization’s objectives
Integrate the tool
into the existing
security incident
response processes
Train the team
to understand their
limits depending on
geography
Copyright © 2019 Symantec Corporation 11
• Phishing
• Risky websites
• Malicious insider
Social engineering
attacks can be very
convincing
• Man in the Middle
• TLS downgrade
• Fake corp Wi-Fi
40% of devices
exposed every
quarter*
• Pegasus
• Data leakage
• HospitalGown
Malicious
Unwanted
Vulnerable
• Malicious Profiles
• App-in-the-Middle
• Bluetooth Attacks
Can also be
persistent (“iOS
Trustjacking”)
Mobile Threats
NETWORK
APPS
DEVICE
Sideload
MOBILEATTACKVECTORS
USER
AT RISK
Information
Stored on and
accessed from
the device
Credentials
Corporate,
app and cloud
Activities
Audio,video,GPS,
communications,
etc.
Mobile
App Stores
Copyright © 2019 Symantec Corporation 12
Symantec Endpoint Protection
Mobile Overview
Symantec holds over 170 patents in mobile security alone.
Public App
Proactive detection and defense
• Simple deployment &
maintenance
• Ensured privacy
• Minimal footprint
Cloud Server
Console, Secondary analysis,
Artificial Intelligence
• Risk/compliance visibility
• Advanced security
• Automation & integration
• Risk benchmarking
Threat Intelligence
Largest Civilian Threat Database
• Integrated Global
Intelligence Network
• 1000 Cyber Warriors
Most Cyber DefenseIntegrations
• Web filtering • SEP
• CASB • EMM/MDM
• DLP • SIEM
• 175 M Endpoints
• 8 B Daily Security Requests
Copyright © 2019 Symantec Corporation 13
Sample of Protected Customers
Large Managed Healthcare Company
460 Instances of credentials/data
protectedonhigh risk networks
701 Total malware infections detected &
protected against
23.97 High risk vulnerabilities detected &
protected against per-device
6-month time period
Major EMEA Utility Company
41 Fully compromiseddevices
333 High risk malware detectedandprotected
against
559 High risk incidents detectedandprotected
against
4-month time period
Large Beverage Distributor
31,789 Vulnerabilities addressed
141,100 High & medium network threats detected&
protectedagainst
1264 High & medium severity malware detected&
protectedagainst
10-month time period
Top 5 Bank
508,305 High & medium network threats detected&
protectedagainst
3791 High and medium risk malware detectedand
protectedagainst
4889 High risk incidents detectedandprotected
against
6-month time period
Copyright © 2019 Symantec Corporation 14
Symantec Endpoint Security Family
SEP Family Provides the Most Complete Endpoint Security in the Industry
Traditional Endpoints:
SEP and EDR
• Single agentfor multi-layered protectionand
Endpoint Detection & Response (EDR)
• High efficacy with low false positives
• Detect,investigate,and remediate suspicious
activities acrossall endpoints
• Scalable and flexible architecture
Mobile Endpoints:
SEP Mobile – Mobile Threat Defense
• ProtectBYOD and corporatemanagedmobile
devices
• Predictive technology with high efficacy
• Productiveand unobtrusive to enable seamless
mobile experience
• Scalable and effortless deployment
Copyright © 2019 Symantec Corporation 15
Holistic, Layered
Mobile Security
On-Device
Protection
Unparalleled
Mobile Research
(9 high severity
discoveries)
Public App
Crowd-sourced
Threat
Intelligence
“SEP Mobile provides advancedon-
device protectionand enforcement
techniques withnodependency on EMM
integration— criticalfor covering all
customers'endpoints.”
- IDC MarketScape:WorldwideMobile
ThreatManagementSoftware2018-2019
Vendor Assessment
Competitor 1
Competitor 2
“[SEP Mobile]has identifiednumerous
malware instances inthe past,whenother
solutions simply did not detect anythreats
on the device.”
Full capabilities on both iOS & Android with or
without EMM/MDM
SEP Mobile Market Leadership
Copyright © 2019 Symantec Corporation 16
Free Assessment and Demo
Risk analysis of apps installed
in your organization
• Objective – Evaluate your risk
exposure due to mobile apps
• Automated – Send EMM logs
and receive a detailed report
• Report Includes
• Unwanted apps
• Risky apps
• Compliance violations
• Malware
Onsite Mobile Threat Day
We demonstrate risk
exposure and protection
• Objective – Full review about
mobile attack surface
• Attendees – Your leadership in mobile
security
• Agenda
• Hacking Demos
• Actionable Threat Intelligence
• Assess current situation
• Discuss how to improve ROI using
existing solutions and policies
App Threat Assessment
Questions?
Brian Duckering
Enterprise Mobile
Security Specialist
Symantec
Thank You
Brian Duckering
Enterprise Mobile
Security Specialist
Symantec

Contenu connexe

Tendances

Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
tmbainjr131
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
EC-Council
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
IBM Security
 

Tendances (20)

Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approach
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection security
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
 
Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to Know
 

Similaire à Symantec Mobile Security Webinar

Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
Francisco Anes
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
calebbarlow
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
Chris Pepin
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
SelectedPresentations
 

Similaire à Symantec Mobile Security Webinar (20)

Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Secure Systems of Engagement
Secure Systems of EngagementSecure Systems of Engagement
Secure Systems of Engagement
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 

Plus de Symantec

Plus de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Symantec Mobile Security Webinar

  • 1. How to Effectively Secure Hundreds of Thousands of Mobile Devices Brian Duckering Enterprise Mobile Security Specialist Symantec
  • 2. Copyright © 2019 Symantec Corporation 2 Agenda Mobile IntroducesRisk To Enterprises How to EffectivelyImplement MobileSecurity Symantec Recommends… 1 2 3
  • 3. Copyright © 2019 Symantec Corporation 3 Mobile Devices Represent One of the Largest Security Gaps in Any Enterprise C O NNECT ED 24/ 7 TARG E T ED SE C O ND FAC TOR LAC K O F C AUT ION O UT O F D AT E RISK Y AP P S • 55% o f ema i l i s fi rst o p ened o n mo b i l e d evi ces • 57% o f gl o b a l w eb t ra ffic o ri gi nated fro m mo b i l e d evi ces • 64% o f G o o gl e sea rch cl i ck s o ri gi nat ed fro m mo b i l e d evi ces • Mo b i l e u sers a re 3X mo re l i kel y t o su b mit l o gi n i n fo t o p h i sh ing si t es t h a n d esktop u sers
  • 4. Copyright © 2019 Symantec Corporation 4 Mobile Breaches Lead To Corporate Breaches A careless mobile user can put your company in the news SMS Phishing Device compromise Stolen credentials Third-party access (mission critical apps) Major corporate breach … and the original mobile attack won’t get the blame.
  • 5. Copyright © 2019 Symantec Corporation 5 Build A Mobile Security Program ...Not Just Deploy A Tool Build the long-term strategy Get executive support Define policies and procedures Find the right technology
  • 6. Copyright © 2019 Symantec Corporation 6 Considerations To Gain Support And Increase User Acceptance Rates Help users understand why Designate internal champions What this means to users Help legal and compliance teams understand
  • 7. Copyright © 2019 Symantec Corporation 7 Secure Managed And Unmanaged Devices Deploy through phased rollout or targetedgroup Understand managed vs unmanaged Educate the userbase through notifications Only secure devices are connecting to applications
  • 8. Copyright © 2019 Symantec Corporation 8 Behavior Inspection Define corporate policies for managed devices Define a process to handle the incoming events Enable mobile application whitelisting policy Feedback to users around insecure / unwanted applications
  • 9. Copyright © 2019 Symantec Corporation 9 Real-time Prevention And Detection Build toward the goal of enforcement, not just detection Integrate with existing tools to make use of the data Create key performance indicators and other metrics to measure success
  • 10. Copyright © 2019 Symantec Corporation 10 The Right Resources Operate the solution with the right skillsets depending on your organization’s objectives Integrate the tool into the existing security incident response processes Train the team to understand their limits depending on geography
  • 11. Copyright © 2019 Symantec Corporation 11 • Phishing • Risky websites • Malicious insider Social engineering attacks can be very convincing • Man in the Middle • TLS downgrade • Fake corp Wi-Fi 40% of devices exposed every quarter* • Pegasus • Data leakage • HospitalGown Malicious Unwanted Vulnerable • Malicious Profiles • App-in-the-Middle • Bluetooth Attacks Can also be persistent (“iOS Trustjacking”) Mobile Threats NETWORK APPS DEVICE Sideload MOBILEATTACKVECTORS USER AT RISK Information Stored on and accessed from the device Credentials Corporate, app and cloud Activities Audio,video,GPS, communications, etc. Mobile App Stores
  • 12. Copyright © 2019 Symantec Corporation 12 Symantec Endpoint Protection Mobile Overview Symantec holds over 170 patents in mobile security alone. Public App Proactive detection and defense • Simple deployment & maintenance • Ensured privacy • Minimal footprint Cloud Server Console, Secondary analysis, Artificial Intelligence • Risk/compliance visibility • Advanced security • Automation & integration • Risk benchmarking Threat Intelligence Largest Civilian Threat Database • Integrated Global Intelligence Network • 1000 Cyber Warriors Most Cyber DefenseIntegrations • Web filtering • SEP • CASB • EMM/MDM • DLP • SIEM • 175 M Endpoints • 8 B Daily Security Requests
  • 13. Copyright © 2019 Symantec Corporation 13 Sample of Protected Customers Large Managed Healthcare Company 460 Instances of credentials/data protectedonhigh risk networks 701 Total malware infections detected & protected against 23.97 High risk vulnerabilities detected & protected against per-device 6-month time period Major EMEA Utility Company 41 Fully compromiseddevices 333 High risk malware detectedandprotected against 559 High risk incidents detectedandprotected against 4-month time period Large Beverage Distributor 31,789 Vulnerabilities addressed 141,100 High & medium network threats detected& protectedagainst 1264 High & medium severity malware detected& protectedagainst 10-month time period Top 5 Bank 508,305 High & medium network threats detected& protectedagainst 3791 High and medium risk malware detectedand protectedagainst 4889 High risk incidents detectedandprotected against 6-month time period
  • 14. Copyright © 2019 Symantec Corporation 14 Symantec Endpoint Security Family SEP Family Provides the Most Complete Endpoint Security in the Industry Traditional Endpoints: SEP and EDR • Single agentfor multi-layered protectionand Endpoint Detection & Response (EDR) • High efficacy with low false positives • Detect,investigate,and remediate suspicious activities acrossall endpoints • Scalable and flexible architecture Mobile Endpoints: SEP Mobile – Mobile Threat Defense • ProtectBYOD and corporatemanagedmobile devices • Predictive technology with high efficacy • Productiveand unobtrusive to enable seamless mobile experience • Scalable and effortless deployment
  • 15. Copyright © 2019 Symantec Corporation 15 Holistic, Layered Mobile Security On-Device Protection Unparalleled Mobile Research (9 high severity discoveries) Public App Crowd-sourced Threat Intelligence “SEP Mobile provides advancedon- device protectionand enforcement techniques withnodependency on EMM integration— criticalfor covering all customers'endpoints.” - IDC MarketScape:WorldwideMobile ThreatManagementSoftware2018-2019 Vendor Assessment Competitor 1 Competitor 2 “[SEP Mobile]has identifiednumerous malware instances inthe past,whenother solutions simply did not detect anythreats on the device.” Full capabilities on both iOS & Android with or without EMM/MDM SEP Mobile Market Leadership
  • 16. Copyright © 2019 Symantec Corporation 16 Free Assessment and Demo Risk analysis of apps installed in your organization • Objective – Evaluate your risk exposure due to mobile apps • Automated – Send EMM logs and receive a detailed report • Report Includes • Unwanted apps • Risky apps • Compliance violations • Malware Onsite Mobile Threat Day We demonstrate risk exposure and protection • Objective – Full review about mobile attack surface • Attendees – Your leadership in mobile security • Agenda • Hacking Demos • Actionable Threat Intelligence • Assess current situation • Discuss how to improve ROI using existing solutions and policies App Threat Assessment
  • 18. Thank You Brian Duckering Enterprise Mobile Security Specialist Symantec