SlideShare a Scribd company logo
Mobile – Adoption and Adaption in 2012




Greg Day
Security CTO & Director of strategy
Mobile data usage up 4,000%




                              2
Business Drivers
•   Fast route to market (quick app development)
•   User productivity (familiarity & use in personal time)
•   Cost saving (capex, support costs, contract/data costs)
•   Employee satisfaction
•   Staff attraction and retention
•   Easier to use?
Do you ever text and walk?   Ever walk into something?
What if your camera was on and showed where you were going?
“There’s an app for that…$1.54”
• Found on 3rd party sites and torrents


                         95054




It does two things:
 1. Sends info to a remote location
 2. Sends an SMS to all your contacts
Android.Walkinwat           7
Typical Mobile Malware




          8
Apple vulnerabilities – iOS5 – Access to last used app




        Hold down the power button
Mobile threat history across major platforms.


                         Symbian
                         requires
140                       signing
120
                                                                    20
100                                                              Families
                                                Ikee
 80                                           worms on
                                                                41 Variants
  60                                           rooted
                                              iPhones
  40
  20
   0                                                                   Android
                                                                     iPhone
   2004    2005   2006   2007
                                                                    Symbian

                                    2008     2009        2010   2011


                     Symbian        iPhone   Android
What Is Driving Security?
Industry trends driving security challenges
  • Mobile computing
  • Social media
  • Consumerization of IT




                          11
Business concerns
• Data on the device
• Social networking (blurring personal/business identities)
• Accountability for the device
  (responsible/liable when managing)
• Data privacy regulations
• Malware (HTML5 adoption)
• Location controls – social engineering
• Device physical loss
BYOD concerns
•   3rd party use of the device (family access to data)
•   Basic security controls vs user lockdown
•   Apps installed
•   Blending of data and identities
•   Jail broken devices
•   Damaged devices
•   Lost/stolen devices
•   Privacy of devices in public places
•   Other business users devices
Symantec research

Top three Mobile Security Practice “Must Haves”

To successfully enable and manage mobile technology, CISOs rated
their top practices and related technologies:

1. Protecting information on devices (90%)
2. Authentication to the network and applications (89%)
3. Setting and maintaining security policies (88%)
Source: 2011 IDG/CSO Quick Poll Survey of 124 Qualified respondents.
Mobile – Adoption and Adaption in 2012
Business decisions
• Business or user owned
• In-house or managed                           Data
                                             Protection
                               Identity
  Service                       Mgmt

• Managed device or managed
  applications                            Security
                                          baseline
• What controls
  – What the longer term use
    case?

                               Mobile Security
Smart device = Cloud enabled
                                     • Manage
• Enable new devices                   entitlements
• Consistently govern
  cloud services                     • Hyper-distributed
                                       information




                        CIO

                              CISO
03 - The Rise of Cloud Security Brokers

                                           Managed Devices                Unmanaged Devices

               Governance
                                             Security/protection agents

                Protection                SYMANTEC O3



                  Visibility
                                             Security/protection agents
                                          Datacenter/Private-Cloud        Public Cloud Services


Consistent identity & information security policy setting & auditing across all cloud services

Context and content aware security gateway enforcing enterprise policies above the clouds

Complete cloud audit trail of who (identity), what (information, services) , how (devices) , when (time)
2011 Trends

Mobile Threats




        19
Thank You!
Greg Day
Security CTO & Director of Strategy
Greg_Day@Symantec.com
07714 388998

                  GregDaySecurity
Mobile – Adoption and Adaption in 2012
Discussions on “Mobile” are everywhere right now, from the
street to the boardroom, and it provides a two-sided challenge
for forward-thinking businesses. On one side, how can the
organisation open up new ways of generating engagement and
revenue from its customer base? On the other, how can it open
up new ways of working for its employees that increase their
productivity and improve retention of the best and brightest?
Both of these potentially positive changes must be held up
against increasing expectations of the protection of both
customer and employee information and identity. Derek
O’Carroll from Symantec will host this workshop by first
presenting a viewpoint and leading a discussion into how this is
being addressed today and possible forward-looking strategies.

More Related Content

PDF
Ibm Mobile Device Security Datasheet V2.0
PPTX
Webinar on Enterprise Security & android
PPT
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
PPT
Mobile Device Security
PDF
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
PPTX
iPad-style mobility in the age of Wikileaks
PPTX
MobileIron Presentation
PDF
Presentatie mc afee emm 2011
Ibm Mobile Device Security Datasheet V2.0
Webinar on Enterprise Security & android
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Mobile Device Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
iPad-style mobility in the age of Wikileaks
MobileIron Presentation
Presentatie mc afee emm 2011

What's hot (20)

PDF
BYOD / Mobile-Device Security Guidelines for CxO's
PPTX
Enterprise Mobile Security
PPTX
Microsoft Intune y Gestión de Identidad Corporativa
PPTX
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
PDF
Améliorer la productivité des employés et se protéger contre les menaces ...
PDF
Microsoft Enterprise Mobility and Security EMS
PDF
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
PDF
How to Hack a Cryptographic Key
PDF
CIS14: Providing Security and Identity for a Mobile-First World
PDF
Mobile's influence on IAM
PPT
2011 Sales Presentation V6
PDF
Securing mobile devices_in_the_business_environment
PDF
Afaria Technical White Paper
PDF
Ascure session
PDF
Sholove cyren web security - technical datasheet2
PDF
Designing Secure Mobile Apps
PPTX
MobileIrn Presentation
PDF
MobileIron's Enterprise Solution for App Security and Management
PDF
Entrust Enterprise Authentication
PDF
IBM Mobile Analyzer Saves the Day
BYOD / Mobile-Device Security Guidelines for CxO's
Enterprise Mobile Security
Microsoft Intune y Gestión de Identidad Corporativa
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Améliorer la productivité des employés et se protéger contre les menaces ...
Microsoft Enterprise Mobility and Security EMS
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
How to Hack a Cryptographic Key
CIS14: Providing Security and Identity for a Mobile-First World
Mobile's influence on IAM
2011 Sales Presentation V6
Securing mobile devices_in_the_business_environment
Afaria Technical White Paper
Ascure session
Sholove cyren web security - technical datasheet2
Designing Secure Mobile Apps
MobileIrn Presentation
MobileIron's Enterprise Solution for App Security and Management
Entrust Enterprise Authentication
IBM Mobile Analyzer Saves the Day
Ad

Similar to Mobile – Adoption and Adaption in 2012 (20)

PDF
Mobile Application Security
PPTX
Securing mobile population for White Hats
PDF
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
PDF
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
PDF
Andrew Jaquith SOURCE Boston 2011
PPTX
Mobile device management v5
PPTX
Symantec Advances Enterprise Mobility Strategy
PPT
Mobile Apps Security
PPTX
Symantec Enterprise Mobility Enhancements
PDF
Security In A Hybrid MAM and MDM World
PDF
The New Mobile Landscape - OWASP Ireland
PDF
Enterprise Appstore webinar FEB13
PDF
Securing Mobile Apps: New Approaches for the BYOD World
PDF
iScan Online - PCI DSS Mobile Task Force
PDF
C0c0n 2011 mobile security presentation v1.2
KEY
Smartphone security
PDF
Temia Mobile Device Management Webinar 03 21-12
PPTX
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
PPTX
Mobile advisor zenprise-pitch - lars
PPTX
Security and Mobile Application Management with Worklight
Mobile Application Security
Securing mobile population for White Hats
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
Andrew Jaquith SOURCE Boston 2011
Mobile device management v5
Symantec Advances Enterprise Mobility Strategy
Mobile Apps Security
Symantec Enterprise Mobility Enhancements
Security In A Hybrid MAM and MDM World
The New Mobile Landscape - OWASP Ireland
Enterprise Appstore webinar FEB13
Securing Mobile Apps: New Approaches for the BYOD World
iScan Online - PCI DSS Mobile Task Force
C0c0n 2011 mobile security presentation v1.2
Smartphone security
Temia Mobile Device Management Webinar 03 21-12
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
Mobile advisor zenprise-pitch - lars
Security and Mobile Application Management with Worklight
Ad

More from Global Business Events - the Heart of your Network. (20)

PDF
CIO Agenda_Booklet John Funnell (2)
PDF
Richard Davies CIO Deutsche Post DHL
PPTX
Why physical security just isn’t enough, Sending the heavies into virtualized...
PPT
Graham Benson - CIO - M&M Direct presentation
PPT
The Communicating Information Officer
PPT
Information Leakage - A knowledge Based Approach
PPTX
Greening DECC - The CIO as Champion
CIO Agenda_Booklet John Funnell (2)
Richard Davies CIO Deutsche Post DHL
Why physical security just isn’t enough, Sending the heavies into virtualized...
Graham Benson - CIO - M&M Direct presentation
The Communicating Information Officer
Information Leakage - A knowledge Based Approach
Greening DECC - The CIO as Champion

Recently uploaded (20)

PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
The various Industrial Revolutions .pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
STKI Israel Market Study 2025 version august
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
August Patch Tuesday
PDF
CloudStack 4.21: First Look Webinar slides
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
DOCX
search engine optimization ppt fir known well about this
PDF
Five Habits of High-Impact Board Members
PDF
Unlock new opportunities with location data.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Getting started with AI Agents and Multi-Agent Systems
O2C Customer Invoices to Receipt V15A.pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
1 - Historical Antecedents, Social Consideration.pdf
The various Industrial Revolutions .pptx
Group 1 Presentation -Planning and Decision Making .pptx
Tartificialntelligence_presentation.pptx
STKI Israel Market Study 2025 version august
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
August Patch Tuesday
CloudStack 4.21: First Look Webinar slides
NewMind AI Weekly Chronicles – August ’25 Week III
search engine optimization ppt fir known well about this
Five Habits of High-Impact Board Members
Unlock new opportunities with location data.pdf
DP Operators-handbook-extract for the Mautical Institute
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Web Crawler for Trend Tracking Gen Z Insights.pptx

Mobile – Adoption and Adaption in 2012

  • 1. Mobile – Adoption and Adaption in 2012 Greg Day Security CTO & Director of strategy
  • 2. Mobile data usage up 4,000% 2
  • 3. Business Drivers • Fast route to market (quick app development) • User productivity (familiarity & use in personal time) • Cost saving (capex, support costs, contract/data costs) • Employee satisfaction • Staff attraction and retention • Easier to use?
  • 4. Do you ever text and walk? Ever walk into something?
  • 5. What if your camera was on and showed where you were going?
  • 6. “There’s an app for that…$1.54”
  • 7. • Found on 3rd party sites and torrents 95054 It does two things: 1. Sends info to a remote location 2. Sends an SMS to all your contacts Android.Walkinwat 7
  • 9. Apple vulnerabilities – iOS5 – Access to last used app Hold down the power button
  • 10. Mobile threat history across major platforms. Symbian requires 140 signing 120 20 100 Families Ikee 80 worms on 41 Variants 60 rooted iPhones 40 20 0 Android iPhone 2004 2005 2006 2007 Symbian 2008 2009 2010 2011 Symbian iPhone Android
  • 11. What Is Driving Security? Industry trends driving security challenges • Mobile computing • Social media • Consumerization of IT 11
  • 12. Business concerns • Data on the device • Social networking (blurring personal/business identities) • Accountability for the device (responsible/liable when managing) • Data privacy regulations • Malware (HTML5 adoption) • Location controls – social engineering • Device physical loss
  • 13. BYOD concerns • 3rd party use of the device (family access to data) • Basic security controls vs user lockdown • Apps installed • Blending of data and identities • Jail broken devices • Damaged devices • Lost/stolen devices • Privacy of devices in public places • Other business users devices
  • 14. Symantec research Top three Mobile Security Practice “Must Haves” To successfully enable and manage mobile technology, CISOs rated their top practices and related technologies: 1. Protecting information on devices (90%) 2. Authentication to the network and applications (89%) 3. Setting and maintaining security policies (88%) Source: 2011 IDG/CSO Quick Poll Survey of 124 Qualified respondents.
  • 16. Business decisions • Business or user owned • In-house or managed Data Protection Identity Service Mgmt • Managed device or managed applications Security baseline • What controls – What the longer term use case? Mobile Security
  • 17. Smart device = Cloud enabled • Manage • Enable new devices entitlements • Consistently govern cloud services • Hyper-distributed information CIO CISO
  • 18. 03 - The Rise of Cloud Security Brokers Managed Devices Unmanaged Devices Governance Security/protection agents Protection SYMANTEC O3 Visibility Security/protection agents Datacenter/Private-Cloud Public Cloud Services Consistent identity & information security policy setting & auditing across all cloud services Context and content aware security gateway enforcing enterprise policies above the clouds Complete cloud audit trail of who (identity), what (information, services) , how (devices) , when (time)
  • 20. Thank You! Greg Day Security CTO & Director of Strategy Greg_Day@Symantec.com 07714 388998 GregDaySecurity
  • 21. Mobile – Adoption and Adaption in 2012 Discussions on “Mobile” are everywhere right now, from the street to the boardroom, and it provides a two-sided challenge for forward-thinking businesses. On one side, how can the organisation open up new ways of generating engagement and revenue from its customer base? On the other, how can it open up new ways of working for its employees that increase their productivity and improve retention of the best and brightest? Both of these potentially positive changes must be held up against increasing expectations of the protection of both customer and employee information and identity. Derek O’Carroll from Symantec will host this workshop by first presenting a viewpoint and leading a discussion into how this is being addressed today and possible forward-looking strategies.

Editor's Notes

  • #3: GartnerAccording to Gartner, sales of smartphones will exceed 461 million by the end of the year, surpassing PC shipments in the process. In fact, combined sales of smartphones and tablets will be 44 percent greater than the PC market by the end of 2011.  Oracle mobile data report 201116% of mobile customers have purchased a tablet computer and another 41% plan to purchase one in the next 12 months 55% report having downloaded a free mobile application (app), up significantly from 42% in 2010  47% of mobile customers say their data use has increased in the past 12 months (4Gb-64Gb)
  • #11: Lets look back at some of the moments in Mobile Malware History:I am sure many of you may remember threats like the skulls trojan targeting Symbian that was being carried by many taxidrivers here in Sydney, who were given the gift from their passengers. Ref : http://www.zdnet.com.au/sydney-taxis-infested-with-worms-139182408.htmCode Signing introduced by Symbian started the decline targeting that platform.Rick Rolling Iphone users in 2009Android seems to be where the action is right now <click>
  • #12: Applied Research fielded this survey by telephone in April and May 2011. These results are based on 3,300 responses.Of the organizations surveyed in April and May, respondents came from companies with a range of 5 to more than 5,000 employees. Of the total responses, 1,225 were from companies with 1,000 employees or greater.This survey has a reliability of 95% confidence with +/- 1.8% margin of error.When we asked companies that question, the top three industry trends they saw affecting the difficulty of providing cybersecurity were: - Mobile computing (47%) - Social media (46%) - Consumerization of IT (45%)
  • #20: Symantec is spending a lot of time monitoring the mobile threat landscape and you an read in more detail many of our findings