Download presentation
Presentation is loading. Please wait.
Published byAntony Whitley Modified over 10 years ago
1
1 | © 2012 V-Key.com – Proprietary and Confidential Bugatti Veyron Super SportBugatti Veyron Super Sport: 267 mph (429 km/h), 0-60 in 2.4 secs
2
2 | © 2012 V-Key.com – Proprietary and Confidential History Lessons 1 st modern automobile invention 1866, Karl Benz Seat belt legislation introduced US legislation in 1961
3
3 | © 2012 V-Key.com – Proprietary and Confidential Mobile Application Security Exposed - What You Must Know! Benjamin MahCo-Founder and CEO
4
4 | © 2012 V-Key.com – Proprietary and Confidential Global Mobile Marketplace Opportunity 50 Billon Connected Devices by 2020 186 Billon Mobile App Downloads by 2014 More UsersMore Data and Transactions
5
5 | © 2012 V-Key.com – Proprietary and Confidential Global Mobile Threat Landscape
6
6 | © 2012 V-Key.com – Proprietary and Confidential Fundamental Mobile Application Weaknesses Application Phishing Insecure Mobile OS Insecure Mobile Apps Trojan Keylogging Display Recording Man-in-the-Middle Mobile Operating System Traditional Mobile Applications
7
7 | © 2012 V-Key.com – Proprietary and Confidential Phishing Attack
8
8 | © 2012 V-Key.com – Proprietary and Confidential Insecure Mobile OS Client-Side Attack Server-Side Attack
9
9 | © 2012 V-Key.com – Proprietary and Confidential Insecure Mobile OS Insecure Application Data Reverse Engineering
10
10 | © 2012 V-Key.com – Proprietary and Confidential Trojan Keylogging
11
11 | © 2012 V-Key.com – Proprietary and Confidential Display Recording
12
12 | © 2012 V-Key.com – Proprietary and Confidential Man-in-the-Middle
13
13 | © 2012 V-Key.com – Proprietary and Confidential Mobile Security Vs Traditional Security Lifestyle Vs Protection Unique Demands of Lifestyle Mobile Preserving Current User Behavior Convenience LightWeight Optimize of Battery Life Cycle Treat the end users as dummies Current Mobile Security Approach Hardware focus – additional Token OTP 3 rd Party Mobile Security s/w installation Heavy Policy Based Intensive Scanning till battery runs dry Complex to use
14
14 | © 2012 V-Key.com – Proprietary and Confidential V-Key: What We Do Mobile Threat Research. Protection. Intelligence Application Threat Research Focused (Trust Foundation) Mobile Application Detection & Protection (Enterprise App Focused) Mobile Threat Intelligence (Compliance & Reporting)
15
15 | © 2012 V-Key.com – Proprietary and Confidential Device Integrity Ensure security of host operating system Application Integrity Ensure security of mobile application Network Integrity Ensure security of SSL network connections V-KEYs Simplicity & Security
16
16 | © 2012 V-Key.com – Proprietary and Confidential V-Tap Advanced Protection Secure Mobile Token Step-Up User Authentication and Protection Verification Worlds 1 st secure mobile token Secures application access on the mobile device Integrates mobile device protection with the authentication process Provides advanced authentication features for third-party applications
17
17 | © 2012 V-Key.com – Proprietary and Confidential Industry Accolades and Security Assessment Recognized Leader in Mobile Application Security Finalist
18
18 | © 2012 V-Key.com – Proprietary and Confidential
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.