1 / 10

Mobile Security Overview

<br><br>https://www.linkedin.com/company/mobile-labs<br><br>Mobile Labs provides enterprise-grade, next generation mobile application testing tools. With a focus on security, <br><br>agility and affordability, Mobile Labs delivers solutions to help you deliver quality mobile apps for Android, iOS and <br>Windows platforms while also helping manage mobile devices in a private, secure cloud.

Download Presentation

Mobile Security Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Welcome To • Presentation

  2. Mobile Security Overview

  3. Uniqueness of Mobile • Mobile devices are shared more often • Personal phones and tablets shared with family • Enterprise tablet shared with co-workers • Social norms of mobile apps vs. file systems • Mobile devices have multiple personas • Work tool • Entertainment device • Personal organization • Security profile per persona?

  4. Mobile devices prioritize the user • Conflicts with user experience not tolerated • OS architecture puts the user in control • Difficult to enforce policy, app lists • Mobile devices are used in more locations • A single location could offer public, private, and cell connections • Anywhere, anytime • Increasing reliance on enterprise WiFi • Mobile devices are diverse • OS immaturity for enterprise mgmt • BYOD dictates multiple OSs • Vendor / carrier control dictates multiple OS versions

  5. Visualizing Mobile Security

  6. Addressing Security Imperatives and Challenges? • Device Management and Security • How do I handle BYOD and ensure compliance for new devices? • Multiple device platforms and variants • Managed devices (B2E) • Data separation and protection • Threat protection Network and Data Management and Security • How do I protect the corporation from data leakage and intrusions? • Identity management and mobile entitlements • Policy management and enforcement • Secure connectivity • Security intelligence and reporting

  7. Android Security Architecture Security goals • Protect user data • Protect system resources (hardware, software) • Provide application isolation. Foundations  of  Android  Security Application  Isolation  and  Permission Requirement • Mandatory application sandbox for all applications • Secure inter-process communication • System-built and user-defined permissions • Application signing .

  8. Advantages of mobile devices Accessible anywhere, anytime Conveniently controlling and monitoring Instant notification Easy to exchange data and information

  9. Challenges Small screen-size (will remains) Limited input facilities (will remains?) Diverse software environments: OS (Symbian, Linux, Windows Mobile), Language (J2ME, BREW, C++) Limited bandwidth (will be solved): GSM->GPRS->UMTS, CDMA, WiFi

  10. Contact Information Headquarters 3423 Piedmont Road NE Suite 465 Atlanta, GA 30305 +1 (404) 214 5804 Info@mobilelabsinc.com http://mobilelabsinc.com/

More Related