SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Japan Mobile Security:
The 4 Biggest Challenges
Facing CIOs/CSOs in 2013-2014

www.mobiquant.com

Booth A15 –HALL 11

@MOBIQUANT
Mobile Usage Evolution 2008-2013
Mobile Threats Trends in 2013
iOS vs Android Platforms Analysis
MDM vs MSM (Mobile Security Management))
B2B mobility at risk

Future of Mobile Security
MOBIQUANT UNIQUE APPROACH
HOW WE CAN HELP YOUR ORGANIZATION
JAPAN MOBILE SECURITY LANDSCAPE 2013

Mobile Security Costs UK SMEs Over 66 Billion Yens
4 Datacenters of data lost every year
230 00 days men needed to recover services
Mobile Usages Evolution 2008-2013(1)

2008
2011
Mobile Usages Evolution 2008-2013(2)

•
•

2008
2011

Users : Consumerization of mobility rears its head in the enterprise
ITs: centrally managed and secured
Mobile Usages Evolution 2008-2013(2)

1.
2.

Top priority: Manage the lost or stolen data risk
Priority needs:
1.
Rationalize mobile devices management
2.
Optimize productivity
3.
Simplify administration
4.
Facilitate updates
5.
Control by defining security policies
6.
Standardize the infra mobile management with the rest of the IS
Source : Mobiquant Labs 2013 (400 CISOs in Europe and USA)
Mobile Threats Trends in 2013(1)
B2C: Mobile Typical Criminality: [$]
Worms, Mobile Ransomwares (blocking), SPAM, Malwares

B2B: Mobile in IE global war:

[Data]

Botnets, Spybots, backdoors, pervasive + sophisticated malwares
Governmental, Military, Defense :
[Data or Influence]
Suspicions about government-sponsored attacks will grow. Using
zero-day vulnerabilities and sophistical malware, some of these
attacks may be considered APT (advanced persistent threats)
Mobile Threats Trends in 2013 (2)
iOS vs Android Platforms Analysis (1)

9
iOS vs Android Platforms Analysis (2)

10
iOS vs Android Platforms Analysis (2)

11
iOS vs Android Platforms Analysis (3)

12
iOS vs Android Platforms Analysis (4)
• In 2011 alone, Google removed more than 100
malicious apps
• Google discovered 50 applications infected by a
single piece of malware (Droid Dream : personal
data)
• Google hasn’t always acted in a timely manner :
– +260,000 times before Google removed it from the
app market.
So creating a mobile security policy that requires end
users to protect personal mobile devices within the
enterprise is key to keeping your organization's data
safe.
13
iOS vs Android Platforms Analysis (5)
Key Drivers for mobile attacks:
Browser (jailbreak iOS v1..)
Applications (xStores) : No real control PlayStore VS Appstore
Stacks/Software weaknesses: Few on IOS vs Many on Android

14
MDM vs MSM (Mobile Security Management))
- B2B mobility at risk
•

MDM (mobile device mangement) is about Asset Management
– Basic security features (wipe, password)
– Fake implementations (ex : PKI, SCEP only)

•

MSM (mobile Security Management) is about Security
Management(ISO27001/05, PCSSI, Sox, Bale2…)
– Mobile : VPN, PKI, Encryption, Policies, Apps and web services
security (signing house, monitoring,..)

2013 trends: Many CISOs required by management to take over
back to Mobility Management/Strategy as security not covered

15
Future of Mobile Security
Internet objects, Data leakage, Mass-Malwares
More mobility in many usage (Internet Objects):
Exposing data at risk and easing more profitable mass attacks for
hackers
LTE and LTE+ bringing permanent and high bandwith connectivity
(easing blackhat), UMA (Mesh Networks )
Massive standards adoption boosting highly critical (and
benefitial) services : NFC, Mobile Payments, m-Wallets,…
SECURITY TO DO LIST
Need for a real strategy including the Security Experts
Continuous Auditing of the policies enforcements
Devices, Tools, Solutions must be security proven
16

Follow us @ISACANews #APCACS
On-demand solution
Une Appliance ...

... pour déployer

L’agent Mobile
NX sur les
terminaux

07/02/2014
Appliance and Virtual
Range
Patented technology evolving
Major account range / Governments
Appliance MNX 500
Appliance MNX 1000
Appliance MNX 3000
Appliance MNX 5000

SMB Range
Appliance Nano : 1 - 300
Appliance Jumbo: 300 - 1000

18
Mobile NX : Multi OS Solution
Multi Platform

Agent NX
Mobile securing

Rugged Terminals
Windows Mobile6
Android
Psion Teklogix
Motorola Symbol
Intermec

07/02/2014

Universal collaborative
customer

Netbooks
Windows7

Apple
iPad

Androïd
Galaxy Tab
Technology and
Innovation Awards
June 2008
National Innovation Award French
Ministry Of Research and Innovation
October2008
Innovation AWARD of the European IT and Security
Congress ( 1400 CISOs and CIOs)
Décember 2009
Frost&Sullivan experts AWARD
Best Entreprise Mobile Technology
January 2010
Redherring Global TOP100 Award
April 2010
Redherring Europe TOP100 Award

20

Weitere ähnliche Inhalte

Was ist angesagt?

IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentBee_Ware
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
IoT advatage and disadvantage
IoT advatage and disadvantageIoT advatage and disadvantage
IoT advatage and disadvantageRubel Biswas
 
Norton Presentation - Homework
Norton Presentation - HomeworkNorton Presentation - Homework
Norton Presentation - HomeworkLoïc Naga
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyAdam Radly
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMBitglass
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4IBM Security
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityCincoC
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection securityIBM Security
 
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend
 
Idc security graphic
Idc security graphicIdc security graphic
Idc security graphictrenders
 
Webinar - Mobile Security Trends
Webinar - Mobile Security TrendsWebinar - Mobile Security Trends
Webinar - Mobile Security TrendsBitglass
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceZimperium
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumZimperium
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessIBM Security
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021Heidelberg India
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating thingsArpan Pal
 
Handset Design for Digital India Initiative
Handset Design for Digital India Initiative Handset Design for Digital India Initiative
Handset Design for Digital India Initiative Sarwan Singh
 
IBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM Events
 
Samsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS America
 

Was ist angesagt? (20)

IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To Empowerment
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
IoT advatage and disadvantage
IoT advatage and disadvantageIoT advatage and disadvantage
IoT advatage and disadvantage
 
Norton Presentation - Homework
Norton Presentation - HomeworkNorton Presentation - Homework
Norton Presentation - Homework
 
T.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirtyT.A.S.C - mobile device secuirty
T.A.S.C - mobile device secuirty
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-security
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection security
 
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
 
Idc security graphic
Idc security graphicIdc security graphic
Idc security graphic
 
Webinar - Mobile Security Trends
Webinar - Mobile Security TrendsWebinar - Mobile Security Trends
Webinar - Mobile Security Trends
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat Intelligence
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
 
Handset Design for Digital India Initiative
Handset Design for Digital India Initiative Handset Design for Digital India Initiative
Handset Design for Digital India Initiative
 
IBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security KeynoteIBM InterConnect 2013 Security Keynote
IBM InterConnect 2013 Security Keynote
 
Samsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for Healthcare
 

Andere mochten auch

How to Grow and Measure Your API Program - I ♥ APIs 2015
How to Grow and Measure Your API Program - I ♥ APIs 2015How to Grow and Measure Your API Program - I ♥ APIs 2015
How to Grow and Measure Your API Program - I ♥ APIs 2015Andrew Mager
 
Van Catalogiseren Naar Metadatabeheer131107
Van  Catalogiseren Naar Metadatabeheer131107Van  Catalogiseren Naar Metadatabeheer131107
Van Catalogiseren Naar Metadatabeheer131107guestf040ad
 
Rekenen Met Tin
Rekenen Met TinRekenen Met Tin
Rekenen Met Tinireshadse
 
Images of Scenic Nissequogue
Images of Scenic NissequogueImages of Scenic Nissequogue
Images of Scenic Nissequogueniss
 
Presentació Projecte1
Presentació Projecte1Presentació Projecte1
Presentació Projecte1LauraGR
 
Greek Mythology I Search
Greek Mythology I SearchGreek Mythology I Search
Greek Mythology I Searchsherylyn
 
Snorkeling Around Coral Reefs Anna Harrel
Snorkeling Around Coral Reefs   Anna HarrelSnorkeling Around Coral Reefs   Anna Harrel
Snorkeling Around Coral Reefs Anna Harrellheath
 
香水的加工工艺
香水的加工工艺香水的加工工艺
香水的加工工艺lixiang595
 
Trigonometric Equations Practice
Trigonometric Equations PracticeTrigonometric Equations Practice
Trigonometric Equations Practicechrismac47
 
Social Networking narrated
Social Networking narratedSocial Networking narrated
Social Networking narratedvedricko
 
Fp Franchising Orientation Version 2
Fp Franchising Orientation Version 2Fp Franchising Orientation Version 2
Fp Franchising Orientation Version 2Leopold Laset
 

Andere mochten auch (20)

UCM 3
UCM 3UCM 3
UCM 3
 
How to Grow and Measure Your API Program - I ♥ APIs 2015
How to Grow and Measure Your API Program - I ♥ APIs 2015How to Grow and Measure Your API Program - I ♥ APIs 2015
How to Grow and Measure Your API Program - I ♥ APIs 2015
 
Safe Digital Networking
Safe Digital NetworkingSafe Digital Networking
Safe Digital Networking
 
Van Catalogiseren Naar Metadatabeheer131107
Van  Catalogiseren Naar Metadatabeheer131107Van  Catalogiseren Naar Metadatabeheer131107
Van Catalogiseren Naar Metadatabeheer131107
 
Rekenen Met Tin
Rekenen Met TinRekenen Met Tin
Rekenen Met Tin
 
Vousavezditsexy
VousavezditsexyVousavezditsexy
Vousavezditsexy
 
Images of Scenic Nissequogue
Images of Scenic NissequogueImages of Scenic Nissequogue
Images of Scenic Nissequogue
 
Innovation
InnovationInnovation
Innovation
 
Presentació Projecte1
Presentació Projecte1Presentació Projecte1
Presentació Projecte1
 
UCM 1
UCM 1UCM 1
UCM 1
 
Greek Mythology I Search
Greek Mythology I SearchGreek Mythology I Search
Greek Mythology I Search
 
Snorkeling Around Coral Reefs Anna Harrel
Snorkeling Around Coral Reefs   Anna HarrelSnorkeling Around Coral Reefs   Anna Harrel
Snorkeling Around Coral Reefs Anna Harrel
 
CrowdSourcing
CrowdSourcingCrowdSourcing
CrowdSourcing
 
香水的加工工艺
香水的加工工艺香水的加工工艺
香水的加工工艺
 
Trigonometric Equations Practice
Trigonometric Equations PracticeTrigonometric Equations Practice
Trigonometric Equations Practice
 
Social Networking narrated
Social Networking narratedSocial Networking narrated
Social Networking narrated
 
I-9 Compliance
I-9 ComplianceI-9 Compliance
I-9 Compliance
 
Fp Franchising Orientation Version 2
Fp Franchising Orientation Version 2Fp Franchising Orientation Version 2
Fp Franchising Orientation Version 2
 
A Cabo Villa
A Cabo VillaA Cabo Villa
A Cabo Villa
 
Cm7
Cm7Cm7
Cm7
 

Ähnlich wie Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA ZITOUNI CTO and VP Chief Security

Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks seeweb
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Arnold Bijlsma
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)AP DealFlow
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsJulien Ott
 
Mobile security decision framework
Mobile security decision frameworkMobile security decision framework
Mobile security decision frameworkVishal Sharma
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Allot Communications
 
Mobile's influence on IAM
Mobile's influence on IAMMobile's influence on IAM
Mobile's influence on IAMAbhinaw Kumar
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
 
2017 Mobility industry trends
2017 Mobility industry trends2017 Mobility industry trends
2017 Mobility industry trendsTim Youm
 
Improving your mobile threat defense strategy
Improving your mobile threat defense strategyImproving your mobile threat defense strategy
Improving your mobile threat defense strategyMalte Wirz
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats ReportJuniper Networks
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionEnclaveSecurity
 

Ähnlich wie Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA ZITOUNI CTO and VP Chief Security (20)

Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks Considerazioni su ITC Security e sui Cyber Attacks
Considerazioni su ITC Security e sui Cyber Attacks
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
Mobile security decision framework
Mobile security decision frameworkMobile security decision framework
Mobile security decision framework
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
Mobile's influence on IAM
Mobile's influence on IAMMobile's influence on IAM
Mobile's influence on IAM
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
2017 Mobility industry trends
2017 Mobility industry trends2017 Mobility industry trends
2017 Mobility industry trends
 
Improving your mobile threat defense strategy
Improving your mobile threat defense strategyImproving your mobile threat defense strategy
Improving your mobile threat defense strategy
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 

Kürzlich hochgeladen

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Kürzlich hochgeladen (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA ZITOUNI CTO and VP Chief Security

  • 1. Japan Mobile Security: The 4 Biggest Challenges Facing CIOs/CSOs in 2013-2014 www.mobiquant.com Booth A15 –HALL 11 @MOBIQUANT
  • 2. Mobile Usage Evolution 2008-2013 Mobile Threats Trends in 2013 iOS vs Android Platforms Analysis MDM vs MSM (Mobile Security Management)) B2B mobility at risk Future of Mobile Security MOBIQUANT UNIQUE APPROACH HOW WE CAN HELP YOUR ORGANIZATION
  • 3. JAPAN MOBILE SECURITY LANDSCAPE 2013 Mobile Security Costs UK SMEs Over 66 Billion Yens 4 Datacenters of data lost every year 230 00 days men needed to recover services
  • 4. Mobile Usages Evolution 2008-2013(1) 2008 2011
  • 5. Mobile Usages Evolution 2008-2013(2) • • 2008 2011 Users : Consumerization of mobility rears its head in the enterprise ITs: centrally managed and secured
  • 6. Mobile Usages Evolution 2008-2013(2) 1. 2. Top priority: Manage the lost or stolen data risk Priority needs: 1. Rationalize mobile devices management 2. Optimize productivity 3. Simplify administration 4. Facilitate updates 5. Control by defining security policies 6. Standardize the infra mobile management with the rest of the IS Source : Mobiquant Labs 2013 (400 CISOs in Europe and USA)
  • 7. Mobile Threats Trends in 2013(1) B2C: Mobile Typical Criminality: [$] Worms, Mobile Ransomwares (blocking), SPAM, Malwares B2B: Mobile in IE global war: [Data] Botnets, Spybots, backdoors, pervasive + sophisticated malwares Governmental, Military, Defense : [Data or Influence] Suspicions about government-sponsored attacks will grow. Using zero-day vulnerabilities and sophistical malware, some of these attacks may be considered APT (advanced persistent threats)
  • 8. Mobile Threats Trends in 2013 (2)
  • 9. iOS vs Android Platforms Analysis (1) 9
  • 10. iOS vs Android Platforms Analysis (2) 10
  • 11. iOS vs Android Platforms Analysis (2) 11
  • 12. iOS vs Android Platforms Analysis (3) 12
  • 13. iOS vs Android Platforms Analysis (4) • In 2011 alone, Google removed more than 100 malicious apps • Google discovered 50 applications infected by a single piece of malware (Droid Dream : personal data) • Google hasn’t always acted in a timely manner : – +260,000 times before Google removed it from the app market. So creating a mobile security policy that requires end users to protect personal mobile devices within the enterprise is key to keeping your organization's data safe. 13
  • 14. iOS vs Android Platforms Analysis (5) Key Drivers for mobile attacks: Browser (jailbreak iOS v1..) Applications (xStores) : No real control PlayStore VS Appstore Stacks/Software weaknesses: Few on IOS vs Many on Android 14
  • 15. MDM vs MSM (Mobile Security Management)) - B2B mobility at risk • MDM (mobile device mangement) is about Asset Management – Basic security features (wipe, password) – Fake implementations (ex : PKI, SCEP only) • MSM (mobile Security Management) is about Security Management(ISO27001/05, PCSSI, Sox, Bale2…) – Mobile : VPN, PKI, Encryption, Policies, Apps and web services security (signing house, monitoring,..) 2013 trends: Many CISOs required by management to take over back to Mobility Management/Strategy as security not covered 15
  • 16. Future of Mobile Security Internet objects, Data leakage, Mass-Malwares More mobility in many usage (Internet Objects): Exposing data at risk and easing more profitable mass attacks for hackers LTE and LTE+ bringing permanent and high bandwith connectivity (easing blackhat), UMA (Mesh Networks ) Massive standards adoption boosting highly critical (and benefitial) services : NFC, Mobile Payments, m-Wallets,… SECURITY TO DO LIST Need for a real strategy including the Security Experts Continuous Auditing of the policies enforcements Devices, Tools, Solutions must be security proven 16 Follow us @ISACANews #APCACS
  • 17. On-demand solution Une Appliance ... ... pour déployer L’agent Mobile NX sur les terminaux 07/02/2014
  • 18. Appliance and Virtual Range Patented technology evolving Major account range / Governments Appliance MNX 500 Appliance MNX 1000 Appliance MNX 3000 Appliance MNX 5000 SMB Range Appliance Nano : 1 - 300 Appliance Jumbo: 300 - 1000 18
  • 19. Mobile NX : Multi OS Solution Multi Platform Agent NX Mobile securing Rugged Terminals Windows Mobile6 Android Psion Teklogix Motorola Symbol Intermec 07/02/2014 Universal collaborative customer Netbooks Windows7 Apple iPad Androïd Galaxy Tab
  • 20. Technology and Innovation Awards June 2008 National Innovation Award French Ministry Of Research and Innovation October2008 Innovation AWARD of the European IT and Security Congress ( 1400 CISOs and CIOs) Décember 2009 Frost&Sullivan experts AWARD Best Entreprise Mobile Technology January 2010 Redherring Global TOP100 Award April 2010 Redherring Europe TOP100 Award 20