Paul Stich CEO Mobile App Risk Management – Over 5 million mobile apps – Small customer – 300 employees = 13,800 apps – Enterprise customer – 100K employees.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

OS Places New Service Products from May 2014 Address Capture & Verification Address Matching GeoSearch Ordnance Survey 2014.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
© 2014 Cognizant 4 th March 2015 MBaaS: Mobile Backend as a Service Pablo Gutiérrez / Senior Mobility developer.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Building Mobile Apps in the Cloud – Comparing Approaches.
XProtect® Expert 2013 Product presentation
Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
MIGRATION FROM SCREENOS TO JUNOS based firewall
Live Process Protection: New Standard in Cloud Availability December 2011 Keeping your IT Systems Live.
Learning: Re-Imagined Getting Learning to Your Learners with OLSA
Piilo Makes HR Easy for Businesses of Any Size, Thanks to the Convenience of Its Mobile App and the Power of the Microsoft Azure Cloud Platform MICROSOFT.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobile Application Ecosystem.
Presenter: NAME Date: MM/DD/YYYY CUSTOMER NAME iHARVEST A STANDARDS-BASED ENTERPRISE ANALYTIC SERVICE THAT ORGANIZES, ANALYZES, AND.
Introducing… …taking desktop computing to the cloud making business effortless!
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
Anthony Bettini Founder & CEO Appthority – The Authority in App Security.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Winning with Check point
Built on Azure, Moodle Helps Educators Create Proprietary Private Web Sites Filled with Dynamic Courses that Extend Learning Anytime, Anywhere MICROSOFT.
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
Expense Management. © 2008 Rearden Commerce. All rights reserved. CONFIDENTIAL & PROPRIETARY TO REARDEN COMMERCE Manual expense reports can be difficult.
IBM Bluemix Ecosystem Development Hands on Workshop Section 1 - Overview.
Website Intelligence Platform “It’s Like Caller-ID for your Website” Proprietary and Confidential.
Building a Fully Trusted Authentication Environment
Mobilizing our Sales Force via Paperless In-Store Selling.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Mobile Testing Overview. Agenda Mobile application quality poses a unique challenge Mobile changes the ALM cycle – Interoperability is unique to mobile.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Blue Coat Cloud Continuum
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Why Verizon. Network performance Breadth of solutions See why better matters when doing business: Confidential and proprietary materials for authorized.
If it’s not automated, it’s broken!
Grid Wide IoT Gateway Supports open standards and technologies, with open interfaces that provide support for proprietary gas-meter reading protocols and.
Tago Tago IoT DAY GRAIN BIN LEVEL? The epicenter of middleware
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Aditya Birla Health Insurance
The Azure Cloud Platform Delivers Data-Driven Digital Transformation for Credit Union Industry Partner Logo “When Helios and Matheson Analytics embarked.
WELCOME Mobile Applications Testing
Azure-Powered Contract Management Solution Turns Business Contracts into Smart Contracts “The scalability of the Microsoft Azure cloud platform’s infrastructure.
Enterprise Productivity Services
Securing Cloud-Native Applications Jason Schmitt CEO
Why Mobile is Important! Nintex Mobile and Nintex Forms
We provide an easy-to-use online accounts platform that empowers micro and small business owners to manage and run sustainable and more profitable enterprises.
Wavestore Integrates…
Wavestore Integrates… Paxton Net2 Access Control
Software-Defined Secure Networks in Action
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
“Azure is the cloud platform of choice for our customers
Cloud Platform Lowers Implementation Barriers, Offers Security for Mobile Scheduling Solution MINI-CASE STUDY “We wanted to focus on providing an optimal.
XtremeData on the Microsoft Azure Cloud Platform:
Technical Capabilities
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
Analytics: the spice to automation testing
Internet of Things Stay Relevant in Digital Era
Open Automation Software
Securing Android Apps using Trusted Execution Environment (TEE) - 07/08/14 Presented by: Mike Hendrick VP Product Sequitur Labs.
Agenda Need of Cloud Computing What is Cloud Computing
Presentation transcript:

Paul Stich CEO

Mobile App Risk Management – Over 5 million mobile apps – Small customer – 300 employees = 13,800 apps – Enterprise customer – 100K employees = 1.2 millions apps – Malware not the only problem – Problem = risky behaviors Data leakage Downloading private data to remote sites Lack of encryption Location Tracking 3

4 How the Appthority Service Works

Appthority Technology – Proprietary engines do deepest analysis Static, dynamic, and behavioral analysis – Database of millions of analyzed apps – Wire-speed results – Fully automated – Trust Score – Reporting – Seamless integration – REST API – Custom policy management / automated enforcement 5

Per App Reporting # of Violations # of Devices with App Installed One-Click Ability to Whitelist/Blacklist

7 Customized App Policy Management 40+ Policy Actions One-Click Policy Selection Multiple Enforcement Options

© 2013 Appthority, Inc. 8

Core Benefits – Fast, automated app risk analysis Database of millions analyzed apps Discovers the hidden, risky behaviors of apps Appthority Trust Score tells how secure an app really is – Scalable, easy-to-manage, cloud-based platform OS, platform, and device agnostic – Mobile app policy management / enforcement 9

THANK YOU Paul Stich CEO

11 Network Effect = Collective Intelligence Collective Intelligence = Appthority Platform delivers best-in-class big data app analytics The system gets smarter with each app scanned Partner ecosystem adds to our intelligence Appthority screens both public and private apps