SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Beyond BYOD: securing the
          data (not the device)
                                                                     This event will start at
                                                                           11am CET,
                         March 19, 2013                             thanks for your patience




Securing & Accelerating Your Applications      3/15/2013
                                            3/19/2013      DenyAll &All © 2012 2013
                                                              Deny Promon ©                     1
                                                                                                1
Logistics

           • You’re muted…
           • … but please ask your
             questions using the chat tool
           • We’ll take a few minutes at the
             end to answer them




Securing & Accelerating Your Applications      3/15/2013
                                            3/19/2013      DenyAll &All © 2012 2013
                                                              Deny Promon ©           2
                                                                                      2
Today's Presentors




          Stéphane de Saint Albin                                                 Tom Lysemose
                  CMO                                                             CTO & founder


Securing & Accelerating Your Applications      3/15/2013
                                            3/19/2013      DenyAll &All © 2012 2013
                                                              Deny Promon ©                       3
                                                                                                  3
Todays’ Webinar

                              Bring Your Own Device?
                            The Risk.
          Malware residing on personal devices taking
         advantage of user rights to leak corporate data.

                             The Solution.
              rWeb + Client Shield protect corporate data
               accessed via browsers and mobile apps.


Securing & Accelerating Your Applications      3/15/2013
                                            3/19/2013      DenyAll &All © 2012 2013
                                                              Deny Promon ©           4
                                                                                      4
Content

       1. Beyond BYOD: the issue with personal
          devices
       2. Man-In-The-Browser/Mobile attacks
       3. Protecting corporate data on personal devices
              – Browser-based apps (OWA)
              – Mobile Apps
       4. Q&A and conclusion




Securing & Accelerating Your Applications      3/15/2013
                                            3/19/2013      DenyAll &All © 2012 2013
                                                              Deny Promon ©           5
                                                                                      5
Beyond BYOD: the issue
          with personal devices




Securing & Accelerating Your Applications      3/15/2013 3/15/2013 All © 2012 2013
                                            3/19/2013         Deny
                                                          DenyAll & Promon ©         Deny All © 2012   6
                                                                                                       6
Poll #1




Securing & Accelerating Your Applications      3/15/2013 3/15/2013 All © 2012 2013
                                            3/19/2013         Deny
                                                          DenyAll & Promon ©         Deny All © 2012   7
                                                                                                       7
BYOD related issues

       • Security policy adjusted to allow personal
         device connectivity
              – Exceptions to wifi policy, for example
              – Creates security ‘holes’ that can be exploited by hackers
       • Users access both personal and corporate data
              – User credentials and corporate data ‘stored’ on devices
              – Cracked in minutes, cf. Symantec Experiment
       • Personal devices are unmanaged by default
              – No password, no security control
              – No lock or remote deletion capability if lost/stolen


Securing & Accelerating Your Applications      3/15/2013
                                            3/19/2013      DenyAll &All © 2012 2013
                                                              Deny Promon ©           8
                                                                                      8
Beyond BYOD

       • Endpoint security not efficient vs. modern threats
              – Won’t prevent malware infection
              – Millions of zombie devices in spite of anti-virus software




       • MDM is no silver bullet
              – Enforcing secure configuration policy is a good
                but insufficient step
       • Compromised devices can become attack vectors
              – Modern malware now available on mobile platforms

Securing & Accelerating Your Applications      3/15/2013
                                            3/19/2013      DenyAll &All © 2012 2013
                                                              Deny Promon ©           9
                                                                                      9
Data security is the issue

       • The problem with personal devices is not that they
              –   are used to play and work
              –   can be lost or stolen
              –   are usually unmanaged
              –   are not well protected against malware
              –   should be considered as unsafe
       • The problem is that they access, use and store
         sensitive data
              – User credentials
              – Corporate email
              – Confidential information accessed via mobile apps

Securing & Accelerating Your Applications      3/15/2013
                                            3/19/2013      DenyAll &All © 2012 2013
                                                              Deny Promon ©           10
                                                                                      10
Man-in-the-Browser/Mobile
          Attacks




Securing & Accelerating Your Applications      3/15/2013 3/15/2013 All © 2012 2013
                                            3/19/2013         Deny
                                                          DenyAll & Promon ©         Deny All © 2012   11
                                                                                                       11
To read full slides presentation & access to the
video recording on:


       Beyond BYOD: securing the data
              (not the device)


Please click on the link available in the
description below.
Thank you!

                      info@denyall.com
                      +33 1 46 20 96 00




Securing & Accelerating Your Applications      3/15/2013
                                            3/19/2013      DenyAll &All © 2012 2013
                                                              Deny Promon ©           13
                                                                                      13

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 

Kürzlich hochgeladen (20)

Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Empfohlen (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Beyond BYOD: securing the data (not the device)

  • 1. Beyond BYOD: securing the data (not the device) This event will start at 11am CET, March 19, 2013 thanks for your patience Securing & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 1 1
  • 2. Logistics • You’re muted… • … but please ask your questions using the chat tool • We’ll take a few minutes at the end to answer them Securing & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 2 2
  • 3. Today's Presentors Stéphane de Saint Albin Tom Lysemose CMO CTO & founder Securing & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 3 3
  • 4. Todays’ Webinar Bring Your Own Device? The Risk. Malware residing on personal devices taking advantage of user rights to leak corporate data. The Solution. rWeb + Client Shield protect corporate data accessed via browsers and mobile apps. Securing & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 4 4
  • 5. Content 1. Beyond BYOD: the issue with personal devices 2. Man-In-The-Browser/Mobile attacks 3. Protecting corporate data on personal devices – Browser-based apps (OWA) – Mobile Apps 4. Q&A and conclusion Securing & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 5 5
  • 6. Beyond BYOD: the issue with personal devices Securing & Accelerating Your Applications 3/15/2013 3/15/2013 All © 2012 2013 3/19/2013 Deny DenyAll & Promon © Deny All © 2012 6 6
  • 7. Poll #1 Securing & Accelerating Your Applications 3/15/2013 3/15/2013 All © 2012 2013 3/19/2013 Deny DenyAll & Promon © Deny All © 2012 7 7
  • 8. BYOD related issues • Security policy adjusted to allow personal device connectivity – Exceptions to wifi policy, for example – Creates security ‘holes’ that can be exploited by hackers • Users access both personal and corporate data – User credentials and corporate data ‘stored’ on devices – Cracked in minutes, cf. Symantec Experiment • Personal devices are unmanaged by default – No password, no security control – No lock or remote deletion capability if lost/stolen Securing & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 8 8
  • 9. Beyond BYOD • Endpoint security not efficient vs. modern threats – Won’t prevent malware infection – Millions of zombie devices in spite of anti-virus software • MDM is no silver bullet – Enforcing secure configuration policy is a good but insufficient step • Compromised devices can become attack vectors – Modern malware now available on mobile platforms Securing & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 9 9
  • 10. Data security is the issue • The problem with personal devices is not that they – are used to play and work – can be lost or stolen – are usually unmanaged – are not well protected against malware – should be considered as unsafe • The problem is that they access, use and store sensitive data – User credentials – Corporate email – Confidential information accessed via mobile apps Securing & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 10 10
  • 11. Man-in-the-Browser/Mobile Attacks Securing & Accelerating Your Applications 3/15/2013 3/15/2013 All © 2012 2013 3/19/2013 Deny DenyAll & Promon © Deny All © 2012 11 11
  • 12. To read full slides presentation & access to the video recording on: Beyond BYOD: securing the data (not the device) Please click on the link available in the description below.
  • 13. Thank you! info@denyall.com +33 1 46 20 96 00 Securing & Accelerating Your Applications 3/15/2013 3/19/2013 DenyAll &All © 2012 2013 Deny Promon © 13 13