SlideShare a Scribd company logo
All Rights Reserved © 2016
All Rights Reserved © 2016
Critical Vulnerabilities per OS
0
100
200
300
400
2007 2008 2009 2010 2011 2012 2013 2014 2015 2016
Android iOS
All Rights Reserved © 2016 3
Enterprise Mobility: Real world examples
All Rights Reserved © 2016 4
In-app protection made
Simple
❯ Embed Zimperium threat engine into
applications through SDK
Secure
❯ Ensure mobile enterprise applications are
protected against mobile cyberattacks
❯ Implement custom app workflows for a
device under attack
❯ Safeguard the data in customer / partner
business transactions
Single Mobile Threat Management Platform now
generates: Self-Protecting Apps
All Rights Reserved © 2016
All Rights Reserved © 2016
All Rights Reserved © 2016
All Rights Reserved © 2016
All Rights Reserved © 2016
Global Threat Analysis Report Over 3800 Critical* threats in 7 days
• 63% of threats were network based
• 36% were App based
• >1000 devices involved across 86 unique networks
Top 4 Threats
• Suspicious Apps (36%)
• Fake SSLs (35%)
• SSL Strip (23%)
• ARP/ICMP MITM (4%)
24
362
18
6
114
514
13
15
1066
ARP MITM
Fake SSL certificate MITM
ICMP Redirect MITM
Rogue Access Point
SSL Strip
Suspicious Android App
System Tampering
Traffic Tampering
Grand Total
# of Devices
2%
35%
2%
0%
23%
36%
1%
1% # of Threats
ARP MITM
Fake SSL certificate
MITM
ICMP Redirect MITM
Rogue Access Point
App Based
36%
Device Based
1%
Network
Based
63%
Threat Distribution
App Based
Device Based
Network Based
All Rights Reserved © 2016
Currently on Google and Apple stores..
All Rights Reserved © 2016
Contact Us
https://www.zimperium.com/contact

More Related Content

PPTX
Mobile Protect Pro - Powered by Zimperium
Zimperium
 
PPTX
How to Gather Global Mobile Threat Intelligence
Zimperium
 
PPTX
Mobile Security: Perceptions vs Device-harvested Reality
Zimperium
 
PPTX
Zimperium Global Threat Intelligence - Q2 2017
Zimperium
 
PDF
State of Application Security Vol. 4
IBM Security
 
PDF
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Arnold Bijlsma
 
PDF
The state of mobile app security
Mahima Anand Sharma
 
PPTX
State of cybersecurity report 2020- Post Covid 19
HarryJake1
 
Mobile Protect Pro - Powered by Zimperium
Zimperium
 
How to Gather Global Mobile Threat Intelligence
Zimperium
 
Mobile Security: Perceptions vs Device-harvested Reality
Zimperium
 
Zimperium Global Threat Intelligence - Q2 2017
Zimperium
 
State of Application Security Vol. 4
IBM Security
 
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Arnold Bijlsma
 
The state of mobile app security
Mahima Anand Sharma
 
State of cybersecurity report 2020- Post Covid 19
HarryJake1
 

What's hot (20)

PDF
Infographic: 5 Tips for Cloud Success
IBM Security
 
PDF
Security and Your Business
All Covered
 
PDF
Selling Your Organization on Application Security
Veracode
 
PDF
Infographic network protection security
IBM Security
 
PDF
June 2016 Worldwide Netskope Cloud Report
Netskope
 
PDF
[Infographic] CYREN Q3 2015 Cyber Threat Report
Christian Reuter
 
PDF
Infographic: Mobile is growing and so are security threats
IBM Security
 
PDF
Case Closed with IBM Application Security on Cloud infographic
IBM Security
 
PDF
Cloud Access Security Brokers
Abhishek Tripathi
 
PDF
Let's hack your mobile device. Yes we can. And many other do.
DATA SECURITY SOLUTIONS
 
PPTX
Tackling today's cyber security challenges - WISER Services & Solutions
CYBERWISER .eu
 
PDF
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec
 
PDF
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Cloud Security Alliance Lviv Chapter
 
PDF
State of Application Security: State of Piracy
IBM Security
 
PPTX
What is the Cybersecurity plan for tomorrow?
Samvel Gevorgyan
 
PDF
The Seven Kinds of Security
Veracode
 
PPTX
The Top Three 2021 Cyber Threats
Sai Huda
 
PDF
Strategies to combat new, innovative cyber threats in 2019
SrikanthRaju7
 
PPTX
2017 Security Report Presentation
ixiademandgen
 
PDF
Security in the Hybrid Cloud Now and in 2016
IDG Connect
 
Infographic: 5 Tips for Cloud Success
IBM Security
 
Security and Your Business
All Covered
 
Selling Your Organization on Application Security
Veracode
 
Infographic network protection security
IBM Security
 
June 2016 Worldwide Netskope Cloud Report
Netskope
 
[Infographic] CYREN Q3 2015 Cyber Threat Report
Christian Reuter
 
Infographic: Mobile is growing and so are security threats
IBM Security
 
Case Closed with IBM Application Security on Cloud infographic
IBM Security
 
Cloud Access Security Brokers
Abhishek Tripathi
 
Let's hack your mobile device. Yes we can. And many other do.
DATA SECURITY SOLUTIONS
 
Tackling today's cyber security challenges - WISER Services & Solutions
CYBERWISER .eu
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec
 
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Cloud Security Alliance Lviv Chapter
 
State of Application Security: State of Piracy
IBM Security
 
What is the Cybersecurity plan for tomorrow?
Samvel Gevorgyan
 
The Seven Kinds of Security
Veracode
 
The Top Three 2021 Cyber Threats
Sai Huda
 
Strategies to combat new, innovative cyber threats in 2019
SrikanthRaju7
 
2017 Security Report Presentation
ixiademandgen
 
Security in the Hybrid Cloud Now and in 2016
IDG Connect
 
Ad

Similar to Deutsche Telekom Partnering Operating Alliance Summit - Zimperium (20)

PDF
Zimperium - Technology Briefing
Jake Leonard
 
PDF
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
EC-Council
 
PDF
Why You'll Care More About Mobile Security in 2020
tmbainjr131
 
PDF
Check Point Mobile Threat Prevention
MarketingArrowECS_CZ
 
PPTX
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks
 
PDF
Mobile Security
MarketingArrowECS_CZ
 
PPTX
Mobile Security for the Enterprise
Will Adams
 
PDF
Securing the Enterprise Mobile Perimeter
Brian Gleeson
 
PDF
Symantec Mobile Security Webinar
Symantec
 
PDF
Protect Your Enterprise - Check Point SandBlast Mobile
MarketingArrowECS_CZ
 
PPTX
Zimperium Enterprise Mobile Threats
Zimperium
 
PPTX
Mobile security by Tajwar khan
Tajwar khan
 
PDF
Reference Security Architecture for Mobility- Insurance
Priyanka Aash
 
PDF
Mobile Apps and Security Attacks: An Introduction
Nagarro
 
PDF
Improving your mobile threat defense strategy
Malte Wirz
 
PPTX
How to Add Advanced Threat Defense to Your EMM
Skycure
 
PPTX
apidays New York 2025 - Why an SDK is Needed to Protect APIs from Mobile Apps...
apidays
 
PDF
Unicom Conference - Mobile Application Security
Subho Halder
 
PDF
Evolutionand impactofhiddenmobilethreats wandera
Anjoum .
 
PPT
Building Enterprise Ready Mobile Apps: A Developer Deep Dive
kidozen
 
Zimperium - Technology Briefing
Jake Leonard
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
EC-Council
 
Why You'll Care More About Mobile Security in 2020
tmbainjr131
 
Check Point Mobile Threat Prevention
MarketingArrowECS_CZ
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks
 
Mobile Security
MarketingArrowECS_CZ
 
Mobile Security for the Enterprise
Will Adams
 
Securing the Enterprise Mobile Perimeter
Brian Gleeson
 
Symantec Mobile Security Webinar
Symantec
 
Protect Your Enterprise - Check Point SandBlast Mobile
MarketingArrowECS_CZ
 
Zimperium Enterprise Mobile Threats
Zimperium
 
Mobile security by Tajwar khan
Tajwar khan
 
Reference Security Architecture for Mobility- Insurance
Priyanka Aash
 
Mobile Apps and Security Attacks: An Introduction
Nagarro
 
Improving your mobile threat defense strategy
Malte Wirz
 
How to Add Advanced Threat Defense to Your EMM
Skycure
 
apidays New York 2025 - Why an SDK is Needed to Protect APIs from Mobile Apps...
apidays
 
Unicom Conference - Mobile Application Security
Subho Halder
 
Evolutionand impactofhiddenmobilethreats wandera
Anjoum .
 
Building Enterprise Ready Mobile Apps: A Developer Deep Dive
kidozen
 
Ad

Recently uploaded (20)

PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CIFDAQ
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
PDF
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
PDF
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
CIFDAQ
 
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
Precisely
 
PPTX
C Programming Basics concept krnppt.pptx
Karan Prajapat
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
Software Development Methodologies in 2025
KodekX
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CIFDAQ
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
CIFDAQ's Teaching Thursday: Moving Averages Made Simple
CIFDAQ
 
Enable Enterprise-Ready Security on IBM i Systems.pdf
Precisely
 
C Programming Basics concept krnppt.pptx
Karan Prajapat
 

Deutsche Telekom Partnering Operating Alliance Summit - Zimperium

  • 2. All Rights Reserved © 2016 Critical Vulnerabilities per OS 0 100 200 300 400 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 Android iOS
  • 3. All Rights Reserved © 2016 3 Enterprise Mobility: Real world examples
  • 4. All Rights Reserved © 2016 4 In-app protection made Simple ❯ Embed Zimperium threat engine into applications through SDK Secure ❯ Ensure mobile enterprise applications are protected against mobile cyberattacks ❯ Implement custom app workflows for a device under attack ❯ Safeguard the data in customer / partner business transactions Single Mobile Threat Management Platform now generates: Self-Protecting Apps
  • 9. All Rights Reserved © 2016 Global Threat Analysis Report Over 3800 Critical* threats in 7 days • 63% of threats were network based • 36% were App based • >1000 devices involved across 86 unique networks Top 4 Threats • Suspicious Apps (36%) • Fake SSLs (35%) • SSL Strip (23%) • ARP/ICMP MITM (4%) 24 362 18 6 114 514 13 15 1066 ARP MITM Fake SSL certificate MITM ICMP Redirect MITM Rogue Access Point SSL Strip Suspicious Android App System Tampering Traffic Tampering Grand Total # of Devices 2% 35% 2% 0% 23% 36% 1% 1% # of Threats ARP MITM Fake SSL certificate MITM ICMP Redirect MITM Rogue Access Point App Based 36% Device Based 1% Network Based 63% Threat Distribution App Based Device Based Network Based
  • 10. All Rights Reserved © 2016 Currently on Google and Apple stores..
  • 11. All Rights Reserved © 2016 Contact Us https://www.zimperium.com/contact

Editor's Notes

  • #5: Embedded zIPS with its z9 is actually embedded in an app to make what we are calling zIAPs, or In-App Protection apps. zIAP determines if the device is compromised, gets the attack details. If the device is under attack, zIAP informs the app and allows for actions to be taken to mitigate the risk (dependent on the threat )such as: registers for a callback and specific actions are then taken dependent on the threat: Invalidate Session / Logout Destroy the keys / Delete Cache Raise Fraud Alert Activate 3-Factor Authentication Reduce functionality to read-only Our zANTI penetration testing tool is a specific example where zIPS is embedded for over 500,000 users Self-Protecting Apps Reduce fraud on customer/partner applications