51
Webinar: A Three-Pronged Approach to Mobile Security

Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Embed Size (px)

DESCRIPTION

Mobile devices are always on the move, switching from network to network and place to place constantly. The best way to keep your company's information safe is through a unified approach securing at the device, app and network levels.

Citation preview

Page 1: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Webinar: A Three-Pronged Approach to Mobile Security

Page 2: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

• View Webinar Archive: http://go.mojave.net/webinar-3pronged-mobile-security

• Learn more about Mojave Networks: http://www.mojave.net

Information

Page 3: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Primer on Mobile Security

Tyler Shields, Forrester Research

3

Page 4: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Making Leaders Successful Every Day

Page 5: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Mobile Security TrendsSecurity Requires More Than Just MDM!

Tyler ShieldsSenior Analyst, Mobile and Application SecurityJune XX, 2014

Page 6: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 6

What do your USERS want!

Anywhere Access No Roadblocks Any Device All Data

Page 7: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 7

What will they DO to get it!

16%

22%

35%

42%

SHADOW IT BYOD

Page 8: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 8

• What mobile device management options are there? Vendor selection?

• How do I get off of Blackberry? Should I get off of Blackberry?

• We don’t think MDM is quite enough. Which technologies do I need to secure my environment?

• How do I apply application security and management to my mobile strategy?

• What should I do to secure the content that is on my mobile devices?

What is the ENTERPRISE asking?

Page 9: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 9

What SHOULD the ENTERPRISE be asking?

• What level of security do I need to offset my mobile risk?

• What combination of technologies can help me meet my business goals?

• Where is the real risk in mobile?

• How can I securely enable my users to get their jobs DONE!

Page 10: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 10 10

Support a wider variety of mobile devices and platforms (e.g., tablets, iOS, Android)

Improve or modernize our mobile app(s) to deliver more information or transaction support

Update our security technologies and processes to better support mobile interactions

Re-architect traditional or back-end apps to make it easier to interface with and support mobile front-end apps

Re-architect our middleware to better support mobile front-end applications

Expand machine-to-machine (M2M) or 'Internet of things' initiatives

Create a set of standard APIs or services that allow mobile app developers to more eas-ily access functions from transactional business applications

Expand or enhance data center infrastructure to handle increasing volume of customers' mobile interactions

22%

20%

14%

26%

26%

27%

26%

22%

48%

48%

46%

45%

45%

38%

42%

45%

24%

23%

36%

18%

19%

17%

16%

26%

Low priority High priority Critical priority

“How important is each of the following initiatives in your firm's mobility strategy for supporting your customers over the next 12

months?”

Base: 891 North American and European enterprise network and telecommunications decision-makers

Source: Forrsights Mobility Survey, Q2 2013

82%

Page 11: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 11

The number of different platforms/operating systems

Rate of releases of the different operating systems/platforms

Providing device security

Securing the apps and data

Complying with regulatory requirements

Managing devices that are used for both personal and corporate apps

44%

29%

59%

64%

33%

45%

“What challenges, if any, does your firm face when managing smartphone/tablet applications and devices?”

Source: Forrsights Mobility Survey, Q2 2013

Base: 891 North American and European enterprise network and telecommunications decision-makers

Page 12: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 12

Are You Overwhelmed Yet?!

• Mobile Device Management• Enterprise Mobile Management• Mobile Application Management• Mobile Security Platform• Application Wrapping SDK• Mobile Static Analysis

Competing Visions and Solutions

• Application Wrapping• Secure Network Gateways• Machine Learning• Mobile Behavioral Analysis• RBMM

Emerging Technologies

Page 13: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 13

Mobile Device

Management

Containerization

Virtualization

Application Hardening

Application Wrapping

Anti-Malware

App Reputation

Mobile Authentication

Device Reputation

Mobile DLP

Mobile Endpoint Security

Static Code Analysis

Secure Mobile Content Sharing

Secure Mobile Network

Gateways

1. Application hardening2. Application wrapping

3. Containerization4. Mobile anti-malware

5. Mobile application reputation services

6. Mobile authentication solutions7. Mobile device management

8. Mobile device reputation services9. Mobile DLP

10. Mobile end point security11. Mobile static code analysis

12. Mobile virtualization13. Secure mobile content sharing

14. Secure mobile network gateways

Mobile Security

Technologies

Page 14: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 14

Technologies By Layer

The Mobile Security Stack

Page 15: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

The Future State of Mobile!

Page 16: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 16

Impact of User / Admin Experience on Technology Success

Minimal B-Value Add Moderate B-Value Add Significant B-Value Add

Anti-malware Mobile Device Reputation Mobile Content Sharing

Virtualization Mobile DLP Mobile Device Management

App Hardening Mobile Application Reputation

Secure Mobile Network Gateway

Application Wrapping

Mobile Authentication

Mobile Static Code Analysis

Containerization

Good Experience Moderate Experience Bad Experience Unknown

Page 17: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 17

Impact of User / Admin Experience on Technology Success

Minimal B-Value Add Moderate B-Value Add Significant B-Value Add

Anti-malware Mobile Device Reputation Mobile Content Sharing

Virtualization Mobile DLP Mobile Device Management

App Hardening Mobile Application ReputationSecure Mobile Network Gateway

Containerization Mobile Authentication Application Wrapping

Mobile Static Code Analysis

Good Experience Moderate Experience Bad Experience Unknown

Page 18: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 18

Device Management

2012

2012 and BEFORE

Mobile Device ManagementMobile device management (MDM) solutions use platform API hooks to

imposecontrol onto smartphones and tablets.

This technology allows support for multiple

platforms and form factors, extends management and security policies to

bothcorporate-liable and employee-owned devices, and automates service desk

support.

Page 19: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 19

Secure Network Gateway

2013

Device Management

2012

2013

Application Wrapping

2013

Secure Mobile Content Sharing

2013Isolated Technologies

Application wrapping and secure network gateway technologies gain

traction. Secure mobile content sharing becomes an easy plug and

play for vendor offerings. Price drops rapidly as base MDM becomes

commoditized.

Page 20: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 20

Secure Network Gateway

2013

Device Management

2012

2014

Application Wrapping

2013

Secure Mobile Content Sharing

2013

Enterprise Mobile Management

2014

*

Enterprise Mobile ManagementA new offering is born. EMM is the

new buzz. Isolated technologies sold in a single platform offering.. The

same players with a slightly different game.

Page 21: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 21

Secure Network Gateway

2013

Device Management

2012

2015 and BEYOND

Application Wrapping

2013

Secure Mobile Content Sharing

2013

Enterprise Mobile Management

2014

*Mobile Authentication

Risk Based Security

Risk Based Mobile Management

Risk Based Mobile ManagementUnderstanding WHO is at the device

and real risk values are as important as security of the device is itself.

2015 adds mobile authentication to the offering mix. Quantification of risk is the future trend. Applying math to risk and using calculated risk values

to enforce security controls. The future is in RBMM.

Page 22: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 22

The Next Wave of Awesome – Techs That Quantify Risk

Up and Coming Technologies

VS VS VS

Mobile Application

Reputation

Mobile Device

Reputation

Mobile Authentication

Risk Based Mobile

Management & Security

Page 23: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 23

What It Means - Enterprises

$

Find roadmaps that go beyond point solutions

Risk tolerance versus user experience

Expect significant consolidation

Defense in Depth

Maximize security while minimizing

UX impact

Demand innovation!

Page 24: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 24

Nobody Ever Got Fired For Buying…

Technology Leading Products

A Strong Product RoadmapDefense in Depth

MobileIron

A Product That Matches Your Needs

VMWare / Airwatch

Citrix

Fiberlink/IBM

Good

Stable Technology

Page 25: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Webinar: A Three-Pronged Approach

to Mobile Security

Page 26: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

• Mobile Risks

• Pillars of Mobile Security• Device• Apps• Network• Analytics

• Background

• Ask our Experts: Q&A

Agenda

26

Page 27: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

27

Understanding Mobile Risk

Page 28: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Why is Knowing Your Mobile Risk Important?

28

• Protecting company data

• Safeguarding other enterprise infrastructure

• Identifying compliance issues

• Creating better policies with better visibility

Page 29: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Quantifying Mobile Risk

29

• Employee Data Access

• Installed Apps

• User / Device Behavior

• Non-mobile Events

Page 30: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Understanding Mobile Risk is Imperative

Source: Verizon 2014 Data Breach Investigations Report

Number of breaches per category

Page 31: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

31

Pillars of Mobile Security

Page 32: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Mobile Security

Network AnalyticsApplicationsDevice

Four Pillars of Mobile Security to Reduce Risk

Page 33: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

• MDM

• Password policies

• Containers

Typical Device Level Security

33

Page 34: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Typical Application Level Security

34

• App catalog

• White / Black List

• App wrapping

Page 35: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Typical Network Level Security

PC’s Traditionally Protected

Mobile is Completely Unprotected

Page 36: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Typical Mobile Analytics Available to other Platforms

Page 37: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

37

How Does Mojave Manage the Pillars?

Page 38: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

HealthEvaluate apps, processes, diagnostics, and behavior to assess risk

Native ExperienceNo wrapping or containers to interfere with the native experience

PrivacyWipe corporate information and set granular employee privacy policies

PoliciesSet configurations, deliver

policies, and manage apps

Device – Security without the Hassle

38

Page 39: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

39

Monitoring Device Health

• Over 50 data points collected daily

• Monitor for critical changes in device health

• Feeds of data for other security tools to analyze

Page 40: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Results1. More visibility

2. Better DLP

3. Block threats

Analysis1. Static & dynamic

2. Enterprise risk

3. Protocol identification

App Reputation

Collection1. Thousands of apps/day

2. App stores, 3rd parties, and devices

40

Page 41: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Gain Visibility into App Risk

41

Page 42: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

App Data

All Data

Globally Distributed Network Optimized for Mobile

42

Page 43: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Gain Visibility into Data Flow

43

Page 44: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Network threats blocked per device

10 per month120 per year

44** Based on Mojave Networks aggregate customer usage data

Page 45: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

• Tie mobile events to broader user profile

• Leverage existing security tools

• See activity that has never been available

Real-time Event API Completes the Loop

45

Mon

itor A

nalyze

Policy

Page 46: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Mojave Connect Real-time API

Common Syslog formats

Better Correlate Mobile Events with Other Enterprise Data

Real-time API’s = Faster Risk Assessment

46

Page 47: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Visibility Security

Effortless & Seamless

Mojave Networks Delivers

47

Control

Page 48: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

• MDM solutions only protect from a small subset of mobile risks

• 4 pillars necessary to provide true mobile security

• Mobile risk should be combined with other threat intelligence

Summary

48

Page 49: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

49

About Mojave Networks

Page 50: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

Mojave Networks Background

• Founded in 2011 and based in Silicon Valley

• Lead investment from Bessemer Venture Partners & Sequoia Capital

• Veteran team from Symantec, McAfee, Lookout, Palo Alto Networks, Cenzic

• Deep security DNA with patent pending technology

• Customers in Healthcare, Finance, Transportation, Government and more

50

Page 51: Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security

51

Questions & Answers