Upload
andris-soroka
View
629
Download
0
Embed Size (px)
Citation preview
Mobility will happen by
YoU, with YoU, or to
YoU
2015, Vilnius
Riga, Latvia
“Data Security Solutions” business cardWhat We Do?
DSS
Cyber Security
Only
Full IT Security Services Lifecycle
Most Innovative Portfolio in
BalticsMember–
ships, Awareness
Rising
Technology &
Knowledge Transfer
ICT Security
Evangelists
Endpoints
Applications
Networks
Data
Identity
Mobility
Management
Cloud
Our international cyber security conference
6th annual since 2010
70+ presentations
8 parallel sessions
700 on-site visitors
2500 online watchers
http://event.dss.lv
Remarks from Cybersecurity Month - October
DSS Global Partnerships
DSS Delivering Excellent ICT Security Operatitions to its Customers
Customer ICT Security
Operations Excellence
Cooperation with Industry Top Technology
Leaders Recognised by Gartner, IDC,
Forester
Top level ICT Security
Professionals
Selected Cutting Edge ICT Security Innovative
TechnologyIntegration
Pan-Baltic
Projects
Particular Focus on Security
ERGO Case Study
Dainis Bairs, Head of IT department of
ERGO insurance Latvia
DSS Solution
Integrated
into Corporate
Training
Process
Citadele Bank Case Study
DSS
Internationally
Recognised
Project
ABLV Bank Case StudyDSS Regional
Technological
Inception
Citadele BankCitadele Bank Case Study
DSS
Internationally
Recognised
Project
“Data Security Solutions” business cardAgenda
Mobility
What is Mobility
Mobility as lifestyle
Mobility in Enterprises
Trends in Mobility
Security @Moblity
Things to remember
What is Mobility
a. Capable of moving or of being moved readilyfrom place to place: a mobile organism;
b. A quality or capability of military forces whichpermits them to move from place to place whileretaining the ability to fulfill their primary mission.
Dose it look like this?
Or ….
Maybe ….Excellent Security Center feature
of PrivatOS does what stock Android
should do
Bundled Silent Phone and Silent
Text services anonymize and encrypt
Bundled Kismet Smart Wi-Fi
Manager keeps phone from
connecting to unfriendly networks.
Disconnect VPN and Search keep
web trackers away from your phone
Or more like this
“Data Security Solutions” business cardAgenda
Mobility
What is Mobility
Mobility as lifestyle
Digital revolution and market
Mobile is everywhere
ForSports For Health For Home
MOBILITY IN AUTOMOTIVE INDUSTRY
Google launches Android Auto with 40
car manufacturers in 2016
Porsche to offer Apple CarPlay in future
models in 2017
Mobility in Automotive already Today
What hat that this hacker was wearing…
Hackers Remotely Kill a
Jeep on the Highway—With Me
in It
Fiat Chrysler recalls 1.4
million cars after Jeep hack
Chrysler is mailing out USB
sticks to customers directly
Smart but not Secured
Peeping into 73,000
unsecured security cameras
thanks to default passwords
Some funny examples
Some funny examples (Diapers)
Some funny examples (Lingerie)
Mobile is changing our lifestyle
Mobile is changing our lifestyle
Mobile is changing our lifestyle
Mobile is changing our lifestyle
Mobile is changing our lifestyle
Mobile is changing our lifestyle
Mobile is changing our lifestyle
And many more new technologies3D Printers
Google Glasses
Cloud Computing
Big Data & Supercomputers
Mobile Payment & Virtual Money
Robotics and Intraday Deliveries
Internet of things
Augmented Reality
Extreme development of Aps
Digital prototyping
Gadgets (devices) & Mobility
Technology replaced jobs (automation)
Geo-location power
Biometrics
Health bands and mHealth
Electronic cars
Fastest technology development in time..
Main question of today
“Data Security Solutions” business cardAgenda
Mobility
What is Mobility
Mobility as lifestyle
Mobility in Enterprises
Is your IT Infrastructure ready?
How many mobile devices and what type
of them you have in your IT infrastructure?
Do you have WiFi Security?
Everything is fine approach…
No No No …. We do not have it, we do not need it
We have rules what forbid that
What we are facing with Mobility
Devices owned by users not by company
Various OS versions, Device manufactures
Email connectivity
WiFi/ BT/ GPS enabled
Jailbroken devices
More then 20-50 apps
No application strategy
No Mobility Strategy, Policy, Risk Management
No Middleware systems for Mobile content synchronization
We think that MDM is enough
Apps here and there
Mobility is already in our Business
It is not just about the email app
Your Business will ask for this
What type of apps to develop?
Its all abut the MobileFirst apps
“Data Security Solutions” business cardAgenda
Mobility
What is Mobility
Mobility as lifestyle
Mobility in Enterprises
Trends in Mobility
Trends in Enterprise Mobility
Can Enterprise Mobility Keep pace with Employees?Is This the End for Unmanaged BYOD?Mobile Device Access Will BroadenEnterprise Apps Are Set to Become OperationalMore Corporate Messaging Tools Incoming?Cross-device support for applicationsMobile middleware solutions become mainstreamHTML5 will win the “HTML5 vs. Native” battle for
enterprise apps
“Data Security Solutions” business cardAgenda
Mobility
What is Mobility
Mobility as lifestyle
Mobility in Enterprises
Trends in Mobility
Security @Moblity
No Comments….
Android – 5.x LollipopTo hack an Android phone, just type in a really long
password+40 960 symbols - That overloads the computer, which
redirects you to the phone's home screen.
Security in Mobile space
Mobile threats we facingApplication-Based Threats: Malware is software that performs malicious
actions while installed on your phone Spyware is designed to collect or use private
data without your knowledge or approval Privacy Threats may be caused by applications
that are not necessarily malicious, but gather or use sensitive information
Vulnerable Applications are apps that contain flaws which can be exploited for malicious purposes
Risky apps
Mobile web threats we facingWeb-based Threats: Phishing Scams use email, text messages,
Facebook, and Twitter to send you links to websites that are designed to trick you into providing information like passwords or account numbers
Drive-By Downloads can automatically download an application when you visit a web page.
Browser exploits take advantage of vulnerabilities in your mobile web browser or software launched
Mobile network threats we facing
Network Threats: Network exploits take advantage of
flaws in the mobile operating system or other software that operates on local or cellular networks
Wi-Fi Sniffing intercepts data as it is traveling through the air between the device and the WiFi access point
Our security collapses in seconds
Mobile HotSpots – Security Disaster for Enterprises
“Data Security Solutions” business cardAgenda
Mobility
What is Mobility
Mobility as lifestyle
Mobility in Enterprises
Trends in Mobility
Security @Moblity
Things to remember
10 Essential Elements for a Secure EMMStandardize mobile OS/Device ManufactureManage and protect what matters Think “user experience” first/ User Privacy Avoid the bypass of Cloud AppsPay attention to your strategy for appsAutomate desired outcomes (lost device, etc…)Define networking explicitly/ network requirementsProtect sensitive data above all elseBe clear about roles and ownershipBuild compliance into your solutionsPrepare for the Internet of Things
Android can be secure for enterprise
Technology Challenges in EMM
EMM is the right answer
How we can help
Analyze and detect risks
Fulfill audit
Build security action plan
Train the employees
Pass compliance regulations
Save from data leakage
Protect critical assets
Get rid of passwords
Consult Your professionals
Protect from attacks
Help creating RFP docs
Be Your IT Security Advisor!
Business value of «Data Security Solutions»
Contact UsName Arturs FilatovsEmail [email protected]
Mobile +371 27194080
Riga, Latviawww.dss.lvLinkedIn: http://ow.ly/FAflz
Twitter: http://ow.ly/FAfv0
Facebook:http://ow.ly/FAfzZ
Youtube: http://ow.ly/FAfEN
SlideShare: http://ow.ly/FAfHd
Think Security FirstThank you