SlideShare a Scribd company logo
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 1© 2016 Skycure Inc. 1 August 3, 2016
Three Secrets to Becoming a Mobile Security
Superhero
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 2© 2016 Skycure Inc. 2
Quick Housekeeping
• There will be time for Q&A at the end
• Ask questions using the GTW chat pane
• The webinar is being recorded
• All attendees will receive a copy of the slides/recording
Join the discussion #MobileThreatDefense
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 3© 2016 Skycure Inc. 3
Meet Your Speakers
John Dickson
Director of IT Infrastructure
& Cybersecurity,
Republic National
Distributing Company
Brian Katz
Director of Mobile Strategy,
VMware
Varun Kohli
Vice President,
Skycure
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 4© 2016 Skycure Inc. 4
Agenda
• Mobile Security Superhero
- How to prove to your management that mobile threats are real
- How to choose the right mobile security solution – SANS checklist
- What to report to your CEO and board of directors
• Meet a real mobile security superhero: John Dickson from RNDC
• EMM Leader: Brian Katz from VMware AirWatch
• How Skycure can help
• Q & A
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 5© 2016 Skycure Inc. 5
Is Mobile Security Important?
Source: BYOD and Mobile Security – 2016 Spotlight Report
Q: What are your main security concerns related to BYOD?
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 6© 2016 Skycure Inc. 6
Are Mobile Attacks Real?
Source: BYOD and Mobile Security – 2016 Spotlight Report & Skycure Threat Intelligence Report
Q: Have any of your BYO or corporate-owned devices downloaded malware in the past?
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 7© 2016 Skycure Inc. 7
Are Mobile Attacks Real?
Q: Have any of your BYO or corporate-owned devices connected to a malicious WiFi in the past?
Source: BYOD and Mobile Security – 2016 Spotlight Report
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 8© 2016 Skycure Inc. 8
Are Organizations Getting Impacted?
Q: Have mobile devices been involved in security breaches in your organization in the past?
Source: BYOD and Mobile Security – 2016 Spotlight Report
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 9© 2016 Skycure Inc. 9
Are Organizations Getting Impacted?
What is the real impact?
Source: Department of Health and Human Services
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 10© 2016 Skycure Inc. 10
What Are Leading Analysts Saying?
Physical
Network
Vulnerabilities
Malware
“Concerns related to advanced threats cannot be
countered with traditional mobile security tools [such
as EMM], as well as protection from wireless
vulnerabilities and untrusted public networks, are the
main drivers for adoption of these technologies.”
“Work environment is shifting away from employees
using computers on premise towards causing
smartphones and tablets off a corporate network. This
will drive a growing priority around securing mobile
devices.”
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 11© 2016 Skycure Inc. 11
Selection Criteria
Mobile Threat Defense/Protection/Prevention
Requirement Priority
Deployment
Process
Support app download from public stores High
Overall ease of deployment High
End User
Experience
Low impact on device battery usage High
Low data usage Medium
App maintains end user’s privacy High
Clear display of detected threats and mitigation
options
High
Provide automatic mitigation options for most
threats
High
Management &
Administration
Provide visibility on detected threats and
vulnerabilities
High
Provide an overall risk estimate per device High
Provide forensic capabilities on identified threats Medium
Provide the option to define an organization-level
compliance policy
High
Reporting High
Other
EMM integration High
SIEM integration High
Provide a third-party API Low
Requirement Priority
Threat
Detection
Network Threats
Secure communication downgrading (SSL stripping) attack
detection
High
Secure traffic decryption (SSL decryption) attack detection High
Content manipulation attack detection Medium
Rogue networks detection High
Ability to perform automatic mitigation on detected network
threats
High
Malware
Detection of malicious apps based on different app
properties
High
Detection of repackaged/fake apps High
Detection of malicious apps based on signatures/known
exploits
Medium
Ability to block malicious app installation High
Detection of iOS malware High
Detection of malicious profiles on iOS devices High
Device Vulnerabilities
Ability to identify jailbroken or rooted devices Medium
Ability to identify device OS vulnerabilities High
Ability to prompt end users to upgrade their device OS
version
Medium
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 12© 2016 Skycure Inc. 12
7 Things to Report to Your CEO and Board
1. Details about the high profile public breach from last week/month
2. Reason why the same thing cannot happen to your company
3. What the current mobile risk score is and how you compare to your peers
4. Number of mobile incidents prevented in the last month
5. Which people/devices/department were attacked the most
6. Which dataset was targeted the most
7. The overall ROI of your investment
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 13© 2016 Skycure Inc. 13© 2015 Skycure Inc.
The RNDC Story
WHO WE ARE
14
15
RNDC AT-A-GLANCE
16
RNDC SECURITY TECHNOLOGIES
Mobile Devices
SFA/BYOD
AirWatch MDM*
AntiMalware
AntiHacking
Patch Mgmt
(Skycure)
17
RNDC’S MOBILE THREAT DEFENSE JOURNEY
Mobile is where PC was 20 years ago
Mobile is actually MORE VALUABLE and MORE VULNERABLE than other corporate devices
You don’t just need to manage these devices,
you need to SECURE THEM too
THERE WAS SKEPTICISM EARLIER…
18
MANAGEMENT BUY-IN WAS EASY
1 2
• Leveraged SKYCURE’S iOS
MALICIOUS PROFILE EXPLOIT
• Took over CFO’s iPhone in less
than a minute
• Easiest sell ever
• Skycure gave 250 FREE SEATS as
part of the trial
• 30% DEVICES had known
vulnerabilities
• 10 DEVICES had keystroke
loggers
19
MY SELECTION CRITERIA
USER IT
• USER EXPERIENCE
• PRIVACY
• BATTERY LIFE
• CLOUD was a must
• Integrated like glue with
AIRWATCH
• Protection against
MALICIOUS APPS, NETWORKS
AND DRIVE-BY WEBSITES
WHO ELSE DID
WE LOOK AT?
ZIMPERIUM
AND
LOOKOUT
Zimperium had a complicated UX and
required scripting
Lookout did not do anything for network
awareness and protection
20
WHAT DO I REPORT ON?
• MULTIPLE DEVICES had malicious activity
• SKYCURE HELPED WITH IMMEDIATE REMEDIATION
• GETTING MORE MOBILE RELATED QUESTIONS – There is more awareness
• Helps to drive more applications into the AirWatch App Store rather than fighting the
pushback
• This gives us a touch into the salesforce automation program.
THIS WAS MISSING EARLIER.
• “THANK YOU’S” from all associate levels, especially for securing BYO devices and
personal data in addition to business data
21
OVERALL IMPACT OF SKYCURE
5,000+
Users
8,000
Devices
~10,000
Networks
Scanned
850,000
Apps
Analyzed
4,000,000
Tests
Performed
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 22© 2016 Skycure Inc. 22© 2015 Skycure Inc.
AirWatch Overview
Manage All Endpoints in a Single Solution
23
Any Endpoint Any Use Case
Knowledge
worker
Corporate |
BYO
Task worker
Line of Business
No user
Kiosk | IOT
Modern Management Framework
Out of box
configuration
Policies and
security settings
Over-the-air
management and
updates
Asset
tracking
Full lifecycle
management
Protect Company Apps and Data Through Multi-layered Security
24
Intelligent Access Controls | Automated Compliance
Secure
the Endpoint
Trust
the User
Containerize
the App
Safeguard
the Data
Protect
the Network
25
Skycure + AirWatch allows you to predict, detect and proactively mitigate mobile threats
Skycure and AirWatch Integration
Malware
Vulnerability
Network
Mobile
Threats
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 26© 2016 Skycure Inc. 26© 2015 Skycure Inc.
Skycure Overview
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 27
Skycure – High Level Overview
Leading Product & ResearchCustomers
Venture BackedStrategic Partners
CONSUMER GOODS FINANCIAL SERVICES
MANUFACTURING TRANSPORTATION
FORTUNE 50
PHARMACEUTICAL
COMPANY
250+TV
channelsFORTUNE 100
HEALTHCARE
COMPANY
FORTUNE 500
FINANCIAL SERVICES
COMPANIES
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 28© 2016 Skycure Inc. 28
Skycure Solution Overview
Physical
Network
Vulnerabilities
Malware
• 24x7 detection and
protection
• Network, device and
app analysis
• Multi platform
Seamless
experience
Privacy Minimal
footprint
End-User App
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 29© 2016 Skycure Inc. 29
Physical
Network
Vulnerabilities
Malware
• Policy enforcement
• Risk-based
management
• Enterprise integrations
Security Visibility IT Satisfaction
Management
• 24x7 detection and
protection
• Network, device and
app analysis
• Multi platform
End-User App
Seamless
experience
Privacy Minimal
footprint
Skycure Solution Overview
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 30© 2016 Skycure Inc. 30
Physical
Network
Vulnerabilities
Malware
• Policy enforcement
• Risk-based
management
• Enterprise integrations
Security Visibility IT Satisfaction
Management
• 24x7 detection and
protection
• Network, device and
app analysis
• Multi platform
Seamless
experience
Privacy Minimal
footprint
End-User App
Skycure Solution Overview
Mobile Threat Intelligence Platform
1 Million+ Global Threats Identified
https://maps.skycure.com
Crowd
Wisdom
Millions of
monthly tests -
apps & networks
Skycure
Research
No iOS Zone, Malicious
Profiles, WiFiGate,
LinkedOut
Threat
Aggregator
Dozens of threat feeds
from 3rd parties
Legitimate
Services
Attackers
& Threats
Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 31© 2016 Skycure Inc. 31
Is your organization vulnerable?
50 Free Skycure Licenses
• Step 1 – Download Skycure Public App (Recommendation: 5-20 devices)
• Step 2 – Review Skycure Assessment Report in 4 weeks
What do we usually find?
NUMBER OF DEVICES WITH
MALICIOUS APPS INSTALLED
PERCENTAGE OF DEVICES
EXPOSED TO NETWORK THREATS
PERCENTAGE OF MOBILE DEVICES
RUNNING OS WITH HIGH-SEVERITY
VULNERABILITIES
EVERY ORG
with 200+
devices had
iOS malware
81.57%
7.22%
1-800-650-4821
sales@skycure.com

More Related Content

PPTX
How Aetna Mitigated 701 Malware Infections on Mobile Devices
PPTX
Tools for Evaluating Mobile Threat Defense Solutions
PPTX
How Healthcare CISOs Can Secure Mobile Devices
PPTX
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
PPTX
Mobile Security: 2016 Wrap-Up and 2017 Predictions
PPTX
How to Predict, Detect and Protect Against Mobile Cyber Attacks
PPTX
Supply Chain Threats to the US Energy Sector
PDF
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
How Aetna Mitigated 701 Malware Infections on Mobile Devices
Tools for Evaluating Mobile Threat Defense Solutions
How Healthcare CISOs Can Secure Mobile Devices
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Security: 2016 Wrap-Up and 2017 Predictions
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Supply Chain Threats to the US Energy Sector
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions

What's hot (20)

PDF
The Motives, Means and Methods of Cyber-Adversaries
PPTX
How to Add Advanced Threat Defense to Your EMM
PDF
Pactera - Cloud, Application, Cyber Security Trend 2016
PDF
Kaspersky Lab new Enterprise Portfolio
PDF
The Four Horsemen of Mobile Security
PDF
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
PDF
Introduction to Kaspersky Endpoint Security for Businesss
PPTX
Accessibility Clickjacking, Devastating Android Vulnerability
PPTX
Kaspersky endpoint security business presentation
PPTX
Solar winds supply chain breach - Insights from the trenches
PDF
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
PPTX
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
PPT
Top Tactics For Endpoint Security
PDF
Tomorrow Starts Here - Security Everywhere
PDF
Kaspersky Endpoint Security and Control - ENGLISH
PDF
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
PDF
Hardware Security on Vehicles
PPTX
Malware evolution and Endpoint Detection and Response
PPTX
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
PDF
Cyber Threat Intelligence: Highlights and Trends for 2020
The Motives, Means and Methods of Cyber-Adversaries
How to Add Advanced Threat Defense to Your EMM
Pactera - Cloud, Application, Cyber Security Trend 2016
Kaspersky Lab new Enterprise Portfolio
The Four Horsemen of Mobile Security
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Introduction to Kaspersky Endpoint Security for Businesss
Accessibility Clickjacking, Devastating Android Vulnerability
Kaspersky endpoint security business presentation
Solar winds supply chain breach - Insights from the trenches
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Top Tactics For Endpoint Security
Tomorrow Starts Here - Security Everywhere
Kaspersky Endpoint Security and Control - ENGLISH
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
Hardware Security on Vehicles
Malware evolution and Endpoint Detection and Response
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Cyber Threat Intelligence: Highlights and Trends for 2020
Ad

Viewers also liked (7)

PDF
Roche Considers Enterprise Contract Management Software from Icertis
PDF
Marketing Agility: A Brand Point Management Perspective
PPTX
When Healthcare Data Analysts Fulfill the Data Detective Role
PPTX
Healthcare Analytics Adoption Model -- Updated
PPTX
How to Sustain Healthcare Quality Improvement in 3 Critical Steps
PPTX
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?
PPT
What is the best Healthcare Data Warehouse Model for Your Organization?
Roche Considers Enterprise Contract Management Software from Icertis
Marketing Agility: A Brand Point Management Perspective
When Healthcare Data Analysts Fulfill the Data Detective Role
Healthcare Analytics Adoption Model -- Updated
How to Sustain Healthcare Quality Improvement in 3 Critical Steps
Clinical Data Repository vs. A Data Warehouse - Which Do You Need?
What is the best Healthcare Data Warehouse Model for Your Organization?
Ad

Similar to Three Secrets to Becoming a Mobile Security Superhero (20)

PPTX
Scalar Security Roadshow - Vancouver Presentation
PPTX
Scalar Security Roadshow - Calgary Presentation
PPTX
Mobile Security - 2015 Wrap-up and 2016 Predictions
PPTX
Umbrella DUO Multi-Factor Authentication
PDF
[Webinar] Why Security Certification is Crucial for IoT Success
PDF
Symantec Mobile Security Webinar
PDF
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
PDF
WEEK5 Mobile Device Security 31032022.pdf
PDF
Scalar Security Roadshow - Ottawa Presentation
PPTX
Akamai Intelligent Edge Security
PPTX
Transforming Risky Mobile Apps into Self Defending Apps
PDF
The Secure Path to Value in the Cloud by Denny Heaberlin
PPTX
Top 5 predictions webinar
PDF
Journey to the Cloud: Securing Your AWS Applications - April 2015
PPTX
The Future of Mobile Application Security
PDF
Streamline and Secure Your Network and Users
PDF
Next Generation Firewall and IPS
PDF
Scalar Security Roadshow - Toronto Presentation
PPTX
Analytical Driven Security - Chip Copper
PDF
RA TechED 2019 - SS16 - Security Where and Why do I start
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Calgary Presentation
Mobile Security - 2015 Wrap-up and 2016 Predictions
Umbrella DUO Multi-Factor Authentication
[Webinar] Why Security Certification is Crucial for IoT Success
Symantec Mobile Security Webinar
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
WEEK5 Mobile Device Security 31032022.pdf
Scalar Security Roadshow - Ottawa Presentation
Akamai Intelligent Edge Security
Transforming Risky Mobile Apps into Self Defending Apps
The Secure Path to Value in the Cloud by Denny Heaberlin
Top 5 predictions webinar
Journey to the Cloud: Securing Your AWS Applications - April 2015
The Future of Mobile Application Security
Streamline and Secure Your Network and Users
Next Generation Firewall and IPS
Scalar Security Roadshow - Toronto Presentation
Analytical Driven Security - Chip Copper
RA TechED 2019 - SS16 - Security Where and Why do I start

Three Secrets to Becoming a Mobile Security Superhero

  • 1. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 1© 2016 Skycure Inc. 1 August 3, 2016 Three Secrets to Becoming a Mobile Security Superhero
  • 2. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 2© 2016 Skycure Inc. 2 Quick Housekeeping • There will be time for Q&A at the end • Ask questions using the GTW chat pane • The webinar is being recorded • All attendees will receive a copy of the slides/recording Join the discussion #MobileThreatDefense
  • 3. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 3© 2016 Skycure Inc. 3 Meet Your Speakers John Dickson Director of IT Infrastructure & Cybersecurity, Republic National Distributing Company Brian Katz Director of Mobile Strategy, VMware Varun Kohli Vice President, Skycure
  • 4. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 4© 2016 Skycure Inc. 4 Agenda • Mobile Security Superhero - How to prove to your management that mobile threats are real - How to choose the right mobile security solution – SANS checklist - What to report to your CEO and board of directors • Meet a real mobile security superhero: John Dickson from RNDC • EMM Leader: Brian Katz from VMware AirWatch • How Skycure can help • Q & A
  • 5. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 5© 2016 Skycure Inc. 5 Is Mobile Security Important? Source: BYOD and Mobile Security – 2016 Spotlight Report Q: What are your main security concerns related to BYOD?
  • 6. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 6© 2016 Skycure Inc. 6 Are Mobile Attacks Real? Source: BYOD and Mobile Security – 2016 Spotlight Report & Skycure Threat Intelligence Report Q: Have any of your BYO or corporate-owned devices downloaded malware in the past?
  • 7. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 7© 2016 Skycure Inc. 7 Are Mobile Attacks Real? Q: Have any of your BYO or corporate-owned devices connected to a malicious WiFi in the past? Source: BYOD and Mobile Security – 2016 Spotlight Report
  • 8. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 8© 2016 Skycure Inc. 8 Are Organizations Getting Impacted? Q: Have mobile devices been involved in security breaches in your organization in the past? Source: BYOD and Mobile Security – 2016 Spotlight Report
  • 9. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 9© 2016 Skycure Inc. 9 Are Organizations Getting Impacted? What is the real impact? Source: Department of Health and Human Services
  • 10. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 10© 2016 Skycure Inc. 10 What Are Leading Analysts Saying? Physical Network Vulnerabilities Malware “Concerns related to advanced threats cannot be countered with traditional mobile security tools [such as EMM], as well as protection from wireless vulnerabilities and untrusted public networks, are the main drivers for adoption of these technologies.” “Work environment is shifting away from employees using computers on premise towards causing smartphones and tablets off a corporate network. This will drive a growing priority around securing mobile devices.”
  • 11. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 11© 2016 Skycure Inc. 11 Selection Criteria Mobile Threat Defense/Protection/Prevention Requirement Priority Deployment Process Support app download from public stores High Overall ease of deployment High End User Experience Low impact on device battery usage High Low data usage Medium App maintains end user’s privacy High Clear display of detected threats and mitigation options High Provide automatic mitigation options for most threats High Management & Administration Provide visibility on detected threats and vulnerabilities High Provide an overall risk estimate per device High Provide forensic capabilities on identified threats Medium Provide the option to define an organization-level compliance policy High Reporting High Other EMM integration High SIEM integration High Provide a third-party API Low Requirement Priority Threat Detection Network Threats Secure communication downgrading (SSL stripping) attack detection High Secure traffic decryption (SSL decryption) attack detection High Content manipulation attack detection Medium Rogue networks detection High Ability to perform automatic mitigation on detected network threats High Malware Detection of malicious apps based on different app properties High Detection of repackaged/fake apps High Detection of malicious apps based on signatures/known exploits Medium Ability to block malicious app installation High Detection of iOS malware High Detection of malicious profiles on iOS devices High Device Vulnerabilities Ability to identify jailbroken or rooted devices Medium Ability to identify device OS vulnerabilities High Ability to prompt end users to upgrade their device OS version Medium
  • 12. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 12© 2016 Skycure Inc. 12 7 Things to Report to Your CEO and Board 1. Details about the high profile public breach from last week/month 2. Reason why the same thing cannot happen to your company 3. What the current mobile risk score is and how you compare to your peers 4. Number of mobile incidents prevented in the last month 5. Which people/devices/department were attacked the most 6. Which dataset was targeted the most 7. The overall ROI of your investment
  • 13. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 13© 2016 Skycure Inc. 13© 2015 Skycure Inc. The RNDC Story
  • 16. 16 RNDC SECURITY TECHNOLOGIES Mobile Devices SFA/BYOD AirWatch MDM* AntiMalware AntiHacking Patch Mgmt (Skycure)
  • 17. 17 RNDC’S MOBILE THREAT DEFENSE JOURNEY Mobile is where PC was 20 years ago Mobile is actually MORE VALUABLE and MORE VULNERABLE than other corporate devices You don’t just need to manage these devices, you need to SECURE THEM too
  • 18. THERE WAS SKEPTICISM EARLIER… 18 MANAGEMENT BUY-IN WAS EASY 1 2 • Leveraged SKYCURE’S iOS MALICIOUS PROFILE EXPLOIT • Took over CFO’s iPhone in less than a minute • Easiest sell ever • Skycure gave 250 FREE SEATS as part of the trial • 30% DEVICES had known vulnerabilities • 10 DEVICES had keystroke loggers
  • 19. 19 MY SELECTION CRITERIA USER IT • USER EXPERIENCE • PRIVACY • BATTERY LIFE • CLOUD was a must • Integrated like glue with AIRWATCH • Protection against MALICIOUS APPS, NETWORKS AND DRIVE-BY WEBSITES WHO ELSE DID WE LOOK AT? ZIMPERIUM AND LOOKOUT Zimperium had a complicated UX and required scripting Lookout did not do anything for network awareness and protection
  • 20. 20 WHAT DO I REPORT ON?
  • 21. • MULTIPLE DEVICES had malicious activity • SKYCURE HELPED WITH IMMEDIATE REMEDIATION • GETTING MORE MOBILE RELATED QUESTIONS – There is more awareness • Helps to drive more applications into the AirWatch App Store rather than fighting the pushback • This gives us a touch into the salesforce automation program. THIS WAS MISSING EARLIER. • “THANK YOU’S” from all associate levels, especially for securing BYO devices and personal data in addition to business data 21 OVERALL IMPACT OF SKYCURE 5,000+ Users 8,000 Devices ~10,000 Networks Scanned 850,000 Apps Analyzed 4,000,000 Tests Performed
  • 22. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 22© 2016 Skycure Inc. 22© 2015 Skycure Inc. AirWatch Overview
  • 23. Manage All Endpoints in a Single Solution 23 Any Endpoint Any Use Case Knowledge worker Corporate | BYO Task worker Line of Business No user Kiosk | IOT Modern Management Framework Out of box configuration Policies and security settings Over-the-air management and updates Asset tracking Full lifecycle management
  • 24. Protect Company Apps and Data Through Multi-layered Security 24 Intelligent Access Controls | Automated Compliance Secure the Endpoint Trust the User Containerize the App Safeguard the Data Protect the Network
  • 25. 25 Skycure + AirWatch allows you to predict, detect and proactively mitigate mobile threats Skycure and AirWatch Integration Malware Vulnerability Network Mobile Threats
  • 26. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 26© 2016 Skycure Inc. 26© 2015 Skycure Inc. Skycure Overview
  • 27. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 27 Skycure – High Level Overview Leading Product & ResearchCustomers Venture BackedStrategic Partners CONSUMER GOODS FINANCIAL SERVICES MANUFACTURING TRANSPORTATION FORTUNE 50 PHARMACEUTICAL COMPANY 250+TV channelsFORTUNE 100 HEALTHCARE COMPANY FORTUNE 500 FINANCIAL SERVICES COMPANIES
  • 28. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 28© 2016 Skycure Inc. 28 Skycure Solution Overview Physical Network Vulnerabilities Malware • 24x7 detection and protection • Network, device and app analysis • Multi platform Seamless experience Privacy Minimal footprint End-User App
  • 29. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 29© 2016 Skycure Inc. 29 Physical Network Vulnerabilities Malware • Policy enforcement • Risk-based management • Enterprise integrations Security Visibility IT Satisfaction Management • 24x7 detection and protection • Network, device and app analysis • Multi platform End-User App Seamless experience Privacy Minimal footprint Skycure Solution Overview
  • 30. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 30© 2016 Skycure Inc. 30 Physical Network Vulnerabilities Malware • Policy enforcement • Risk-based management • Enterprise integrations Security Visibility IT Satisfaction Management • 24x7 detection and protection • Network, device and app analysis • Multi platform Seamless experience Privacy Minimal footprint End-User App Skycure Solution Overview Mobile Threat Intelligence Platform 1 Million+ Global Threats Identified https://maps.skycure.com Crowd Wisdom Millions of monthly tests - apps & networks Skycure Research No iOS Zone, Malicious Profiles, WiFiGate, LinkedOut Threat Aggregator Dozens of threat feeds from 3rd parties Legitimate Services Attackers & Threats
  • 31. Title of Presentation DD/MM/YYYY© 2016 Skycure Inc. 31© 2016 Skycure Inc. 31 Is your organization vulnerable? 50 Free Skycure Licenses • Step 1 – Download Skycure Public App (Recommendation: 5-20 devices) • Step 2 – Review Skycure Assessment Report in 4 weeks What do we usually find? NUMBER OF DEVICES WITH MALICIOUS APPS INSTALLED PERCENTAGE OF DEVICES EXPOSED TO NETWORK THREATS PERCENTAGE OF MOBILE DEVICES RUNNING OS WITH HIGH-SEVERITY VULNERABILITIES EVERY ORG with 200+ devices had iOS malware 81.57% 7.22% 1-800-650-4821 [email protected]