The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Mobile Protect Pro - Powered by Zimperium
1.
2.
3. By 2018, 25% of corporate data traffic will flow directly from
mobile devices to the cloud bypassing enterprise security
controls.
By 2020, 60% of digital businesses will suffer major service
failures, due to the inability of IT security teams to manage
digital risk.
Gartner, Special Report: Cybersecurity at the Speed of Digital Business,
Paul E. Proctor, Ray Wagner, August 30, 2016
9. iOS 7 – Sept, 2013
< iOS 9.3.5
System Tampering
Elevation of Privilege
10. MOBILE PROTECT Pro
Mobile working, worldwide – without risk
always online
Wi-Fi at hotel, airport, cafe, fare
access to company data, server,
backbone
charging devices and stations
12. MOBILE PROTECT Pro
app-based Protection for Mobile devices
zCONSOLE zIPS App IT-Integrations-Service
Optional
Function:
Monitoring overaall
company threats
Management security
profile
Function:
Protect individual devices
Information for
countermeasures
Function:
Connection to MDM/EMM
Definition specific security
profiles
13. Network Attack Detection Root-/Jailbreak-Detection
zConsole Policies
Anomaly Detection
with MDM/EMM
App Scanning
powered by
Mobile Protect PRO
protects your Smartphone 360°
e.g. OS / Kernel Exploitation,
Profile/Configuration
Modification
MobileIron, AirWatchReporting and forensics
14. powered by
zConsole: reporting and policies
central management
platform provides policy
and risk manage- ment
combination with SIEM
possible
comprehensive reporting
and compliance analysis
basis for forensic threat
prevention and analysis
configurable data privacy
15. Mobile Protect Pro
15
Drivers& Libraries
SystemsServices
Apps
Kernel
Jailbreak & Rooting Detection
Network Attacks (Recon, MITM, SSLStrip
Rogue AP,Rogue Cell Tower), Physical
Attacks (USB, Bluetooth, NFC),
Stagefright
Email and Content Security (MCM),
Application Delivery, Security& Policy,
Containers (MAM)
OS Management and Control (MDM)
Browser, Email, Attachments, SMS
Malware, Adware, mRAT
Exploits, Privilege Elevation, Chained
Attacks
17. powered by
Mobile Protect Pro: Trial Conditions
usable for Android 4.0 and iOS 8.0 or higher, worldwide
usage
support through DTAG
verified criteria for success factors, possibly workshop
trial start now
18.
19.
20.
21. Global Threat Analysis Report Over 3800 Critical* threats in 7 days
• 63% of threats were network based
• 36% were App based
• >1000 devices involved across 86 unique networks
Top 4 Threats
• Suspicious Apps (36%)
• Fake SSLs (35%)
• SSL Strip (23%)
• ARP/ICMP MITM (4%)
24
362
18
6
114
514
13
15
1066
ARP MITM
Fake SSL certificate MITM
ICMP Redirect MITM
Rogue Access Point
SSL Strip
Suspicious Android App
System Tampering
Traffic Tampering
Grand Total
# of Devices
2%
35%
2%
0%
23%
36%
1%
1% # of Threats
ARP MITM
Fake SSL certificate
MITM
ICMP Redirect
MITM
Rogue Access Point
SSL Strip
App
Based
36%
Device
Based
1%
Network
Based
63%
Threat Distribution
App Based
Device Based
Network Based