© Blue Coat Systems, Inc. 2012. John Yun Director, Product Marketing.

Slides:



Advertisements
Similar presentations
The Changing Communications Security Landscape Prem Iyer | VP of North America Channel Programs | 07/11/12.
Advertisements

Vizred.com Mobile Marketing. vizred.com What is Mobile Marketing? Personal engagement with consumers on their mobile device What type of customer reacts.
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
The Threat Landscape Jan Threat Report 2.
New Delhi, India, 14 March 2013 Innovating Cyber Defense Approaches to Combat Online Financial Fraud in Developing Economies Charles Iheagwara, Director,
Short History of Mobile Web 1996: First access to mobile web (Finland) on Nokia 9000 Communicator 1999: First commercial launch of a mobile-specific browser-
Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
Trend Micro Deployment Kelvin Hwang IT Services University of Windsor.
William Enck, Machigar Ongtang, and Patrick McDaniel.
Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Mobile Work Exchange Spring Town Hall April 30, 2013 Planning for Tomorrow’s Mobile.
Cyber Crimes.
A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO twitter.com/LacoonSecurity.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
March 2011 Affiliate Opportunities eBay Inc. confidential eBay Electronics UK.
+ A look into the opportunities in mobile marketing University of Rhode Island Mobile Strategies Your App Here! iPhone/Android App Your App Here! iPad.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
Einari Kanerva founder and CEO Its My Life – Also in Corporate Wellness.
For info about the proprietary technology used in comScore products, refer to comScore Aaron Rhodes: Director.
1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE.
How YouTube Can Grow Your Business. YouTube is not only the second largest search engine in the world, but it also has over a billion unique, worldwide.
The Changing World of Endpoint Protection
Social Media and Mobile Marketing for International Business Presented By: Rosie Siemer Principal.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
2 2 YouTube by the Numbers  550 million users worldwide  2 Billion + videos watched daily  3 Billion + videos monetised weekly  Localised in 43 languages.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
A unique, photo and video sharing App with self-destructing photos and videos that live for 24hours before deleting forever.
Title of Presentation DD/MM/YYYY © 2015 Skycure Why Are Hackers Winning the Mobile Malware Battle.
Sky Advanced Threat Prevention
321 Phishing Vishing SMiShing Social Engineering Techniques.
Mobile Application Store MAS 2010/1/7. Outline –Mobile Application Store “MAS” App Store Android Market Blackberry App World Nokia Ovi Store Palm App.
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Mpathix Proprietary and Confidential 1 Sell the Steak, Not the Sizzle: Consumer Mobile Branko Zatezalo Chief Technology Officer (416)
Deciphering Mobile Search Patterns: A Study of Yahoo! Mobile Search Queries J Yi, F Maghoul & J Pedersen, Yahoo Inc, 7th International Conference on World.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
February 2013 Thriving in the Mobile First Economy Richard Firminger, GM, EMEA.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
2012 Malnet Report: Breaking the Vicious Cycle Grant Asplund Senior Technology Evangelist.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.Blue Coat Confidential – Internal Use Only COMPLETE LIFECYCLE APPROACH TO ADVANCED THREAT.
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Presented by - Appsolz.com Mobile Apps for Business Growth.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
Webinar Housekeeping 1. Be sure you’re dialed into the audio portion of the webinar: Access Code: Webinar length: approximately.
Information Technology Part 2. Part2-2 Next Three Chapters Copyright © 2016 Pearson Education, Inc. Chapter 4 discusses hardware, software, and mobile.
Small Business Solutions Copyright 2014 Trend Micro Inc.
MEDIA KIT. WHO WE ARE? YOUR TEXT HERE 6:58 min AVG. SESSION DURATION 13.6M+ UNIQUE USERS 2.8M+ FACEBOOK LIKES 189M+ MONTHLY PAGE VIEWS 71.3M+ RETURNING.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Social Media Marketing 101: For the Beginner!
The playground can be in any area of the ecosystem
Jon Peppler, Menlo Security Channels
Today’s Risk. Today’s Solutions. Cyber security and
Android Training in Chandigarh The best Android antivirus in 2018.
Android Market and App Business Issues
دکتر مهدی غضنفری؛ دانشکده مهندسی صنایع، دانشگاه علم و صنعت
Mobile Apps – The Traveler Centric Future
Android.Adware.Plankton.A % Android.Adware.Wapsx.A – 4.73%
New Web Security Bundles For 1500 Users and Below
Democracy in the decade of Google & BBC Iplayer
Security Trends and Threats Affecting Innovations in Technology
Download the My Learning App
Threat Landscape Update
MOBILE SEARCH STATS.
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Presentation transcript:

© Blue Coat Systems, Inc John Yun Director, Product Marketing

© Blue Coat Systems, Inc WebPulse Collaborative Defense  Feed from 75 Million Users Worldwide  Analyze One Billion Requests Daily  Block 3.3M+ Threats Daily  24x7 Malnet Tracking  Negative-Day Defense  Block Consumer & Organizations targeted threats © Blue Coat Systems, Inc

© Blue Coat Systems, Inc Threat Landscape © Blue Coat Systems, Inc  Tracking over 1500 Malnets  2/3 of all attacks in 2012  8 new Malnets targeting mobile devices  40% of all mobile attacks in 2012  600% increase in Android Malware  1,000+ monthly requests to download Android MalwareMALNETS COMMON THREAT VECTOR TOP MOBILE TARGETS MOBILEMALNETS  For-pay Texting  Steal personal information  Top Threat Category: Pornography