McAfee Mobile Security

Download Report

Transcript McAfee Mobile Security

BYOD, trends, threats and
solutions.
Carl Peter
Enterprise Solution Architect
Mobility, EMEA
July 16, 2015
Mobile Security
Trends and Challenges
Market Trends
Consumerization of IT – “BYOD”
Employee-owned devices on the corporate network
Device Diversity
iOS, Android, Windows, etc.
App Explosion
Beyond email and web
Mobile Threats Emergence
Android an early favorite
Today’s Business Challenge:
Transformation of Enterprise Mobility
The Old Problem:
The New Problem:
Mobile Email
Enterprise Mobility 2.0
Secure Mobile
Messaging
Secure Mobile App
Management
Today’s Business Challenge:
Enabling Mobility Brings Risk
There is a policy
disconnect between IT
and end users
HR
IT
Mobile devices
predicted to be New
Malware Frontier
More than half of all
users don’t lock their
devices
IT
Finance
Sales
Almost 1 in 5
devices are lost
each year
Mobile Malware
Mobile malware, or more specifically, Android malware went ballistic in Q1 with more than 6,300
new samples detected. Some of this increase is driven by new detection techniques developed by
McAfee Labs, but there’s no doubt that attackers have completed their Android “learning curve” and
are now in full production mode. McAfee Labs found significant amounts of new adware and mobile
backdoor malware, along with some very simple premium-rate SMS-sending malware.
Mobile Malware
By Platform
Mobile Malware Samples
Cumulative
Java ME
2%
9,000
Others
1%
8,000
7,000
Symbian
11%
6,000
5,000
4,000
3,000
2,000
1,000
Q1
10
Q2
10
Q3
10
Q4
10
Q1
11
Q2
11
Q3
11
Q4
11
Q1
12
Android
86%
DATA goes MOBILE –
The Problem is Rapidly Escalating
EMAILS INCLUDE
60%
OF THE COMPANIES
INTELLECTUAL
PROPERTY
Mobile Security
Requirements
Secure App Enablement Requirements
Required:
• Data Protection
• Compliance
• Authentication
• Security Policy Management
• Self-Service Provisioning
• Enterprise App Management
WEB AND
SOCIAL MEDIA
BASIC
SERVICES
ENTERPRISE
AND LOB APPS
CUSTOMERFACING APPS
Enabling Mobility Through Security
PROTECT MOBILE DEVICES
Devices
• Device Management (MDM)
• Anti-Malware
• Jailbroken and Rooted Device Exclusion
Set
Policy
&
Manage
PROTECT MOBILE DATA
Data
• Data Protection (Lock, Wipe, Delete)
• Segregate corporate data
• Encryption
PROTECT MOBILE APPS
Apps
• Enterprise App Store
• Application Blacklisting
• App reputation scoring
Mobile Device Management Life Cycle
Provisioning
Define security policies, network
connectivity, and resources; user selfservice provisioning for automatic device
personalization
Enterprise Application Management
Make apps available in a secure, rolebased way. Offer apps for download, links
to third-party app stores, and web links.
Application
Management
IT Operations Support
Visualize and manage devices
centrally through Management
Console
IT Operations
Support
ePO
Compliance
Compliance
Automatically check devices prior
to network access
12
Provisioning
Security and
Authentication
Policy
Management
Security and Authentication
Enable devices to strongly
authenticate and supporting
two-factor authentication.
Policy Management
Remotely perform helpdesk tasks
and push security policies and
configuration updates over-the-air
You already
built one
security
infrastructure.
Why build
another?
Bring Mobile Devices In
McAfee Confidential—Internal Use Only
Summary
Manage and secure mobile devices with a
single solution
Protect the device, the data, the apps
Manage entire mobile device lifecycle from
one platform
Open platform for partners to deliver
complementary solutions
Manage all endpoints from a single
console
14
Q&A