1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE.

Slides:



Advertisements
Similar presentations
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 4.1 Chapter 4.
Advertisements

1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 6.1 Chapter 6.
Device Evolution Greg Pelton Chief Technology Officer
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Chapter 6 Wireless and Mobile Networks. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 6-2.
Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
Separate your corporate environment from unknown threats of the WEB. Define trusted WEB policy. Enforce the use of WEB browsers. Automatically distribute.
The Changing World of Endpoint Protection
by Barb Philipak 2002 Plank Road Publishing, Inc. International Copyright Secured * All Rights Reserved ©
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
3/14/2016 © Crown Copyright. All rights reserved. Risk Managed Cloud Computing HMG IA Approach Ian McCormack TD IA Policy and Risk CESG.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
Waves Copyright© 2015 EducAide Software Inc. All rights reserved.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Blue Coat Cloud Continuum
Section 1.5 Circles Copyright © 2013 Pearson Education, Inc. All rights reserved.
Welcome App Android How to Program
Address Book App Android How to Program
Android Market and App Business Issues
Social Networks.
Modeling Constraints with Parametrics
Section 2.5 Graphing Techniques; Transformations
Tip Calculator App Android How to Program
توكيد الذات.
Doodlz App Android How to Program
Copyright © 2016 Elsevier Inc. All rights reserved.
Copyright © 2013 Pearson Education, Inc. All rights reserved
Route Tracker App Android How to Program
Section 9.4 Area of a Triangle
Section 2.5 Graphing Techniques; Transformations
The Inverse Trigonometric Functions (Continued)
Definition Copyright © 2013 Pearson Education, Inc.. All rights reserved.
1 5 Identify Connect Leverage MOBILE-READY SINGLE PLATFORM
Copyright © 2012, Elsevier Inc. All rights Reserved.
Section 10.1 Polar Coordinates
Extra Nomenclature Practice Answers
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
General Principles for Writing Reaction Mechanisms
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2014, 2000, 1992 Elsevier Inc. All rights reserved.
Enhanced Slideshow App
Chemistry Ch. 10 Review and worksheets
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Section R.2 Algebra Essentials
Portable Biotechnology
Section 10.5 The Dot Product
Modeling Functionality with Use Cases
Unit 4 Review Answers.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2016 Elsevier Inc. All rights reserved.
IntroductionMolecular Structure and Reactivity
Copyright © 2013 Elsevier Inc. All rights reserved.
Forms.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Modeling Message-Based Behavior with Interactions
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 15 Contraception
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 20 Assisted Reproductive Technologies
Presentation transcript:

1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE

2Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. Mobile Web Browser Desktop Web Browser Native Mobile Mobile App Gap TYPES OF APPLICATIONS Application behavior & available operations vary across application types m.facebook.com

3Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. COMMON THREATS ACROSS APPLICATIONS  Similar malware can be delivered to all application types  Focusing on just one type of application leaves enterprise vulnerable m.facebook.com Mobile Web Browser Desktop Web Browser Native

4Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. Mobile Web Browser Desktop Web Browser Native REQUIREMENT FOR GRANULAR APP CONTROL  Security policy across all types of applications  Granular app control must distinguish between different types of application

5Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. Blue Coat Security Empowers Business ™