Document

advertisement
Bugatti Veyron Super Sport: 267 mph (429 km/h), 0-60 in 2.4 secs
1
|
© 2012 V-Key.com – Proprietary and Confidential
History Lessons
• 1st modern automobile
invention 1866, Karl Benz
2
|
© 2012 V-Key.com – Proprietary and Confidential
Seat belt legislation introduced
US legislation in 1961
Mobile Application Security Exposed - What You Must
Know!
Benjamin Mah
3
|
© 2012 V-Key.com – Proprietary and Confidential
Co-Founder and CEO
Global Mobile Marketplace Opportunity
50 Billon Connected Devices by 2020
186 Billon Mobile App Downloads by 2014
More Users
More Data and Transactions
4
|
© 2012 V-Key.com – Proprietary and Confidential
Global Mobile Threat Landscape
5
|
© 2012 V-Key.com – Proprietary and Confidential
Fundamental Mobile Application Weaknesses
Traditional
Mobile
Applications
• Application Phishing • Trojan Keylogging
• Insecure Mobile OS
• Display Recording
• Insecure Mobile Apps • Man-in-the-Middle
Mobile Operating System
6
|
© 2012 V-Key.com – Proprietary and Confidential
Phishing Attack
7
|
© 2012 V-Key.com – Proprietary and Confidential
Insecure Mobile OS
Client-Side Attack
8
|
© 2012 V-Key.com – Proprietary and Confidential
Server-Side Attack
Insecure Mobile OS
Insecure Application Data
9
|
© 2012 V-Key.com – Proprietary and Confidential
Reverse Engineering
Trojan Keylogging
10
|
© 2012 V-Key.com – Proprietary and Confidential
Display Recording
11
|
© 2012 V-Key.com – Proprietary and Confidential
Man-in-the-Middle
12
|
© 2012 V-Key.com – Proprietary and Confidential
Mobile Security Vs Traditional Security
Lifestyle Vs Protection
Unique Demands of Lifestyle
Mobile
•
•
•
•
•
Preserving Current User Behavior
Convenience
LightWeight
Optimize of Battery Life Cycle
Treat the end users as dummies
13
|
© 2012 V-Key.com – Proprietary and Confidential
Current
Mobile Security Approach
•
•
•
•
•
Hardware focus – additional Token OTP
3rd Party Mobile Security s/w installation
Heavy Policy Based
Intensive Scanning till battery runs dry
Complex to use
V-Key: What We Do
• Mobile Threat Research . Protection . Intelligence
Mobile Application
Detection & Protection
Mobile Threat
Intelligence
(Enterprise App Focused)
(Compliance & Reporting)
Application Threat Research Focused
(Trust Foundation)
14
|
© 2012 V-Key.com – Proprietary and Confidential
V-KEY’s Simplicity & Security
15
|
Device Integrity
Application Integrity
Network Integrity
Ensure security of host operating system
Ensure security of mobile application
Ensure security of SSL network connections
© 2012 V-Key.com – Proprietary and Confidential
V-Tap Advanced Protection Secure Mobile Token
Step-Up User Authentication and Protection Verification
• World’s 1st secure mobile token
• Secures application access on
the mobile device
• Integrates mobile device
protection with the
authentication process
• Provides advanced
authentication features for
third-party applications
16
|
© 2012 V-Key.com – Proprietary and Confidential
Industry Accolades and Security Assessment
Recognized Leader in Mobile Application Security
Finalist
17
|
© 2012 V-Key.com – Proprietary and Confidential
Finalist
18
|
© 2012 V-Key.com – Proprietary and Confidential
Download