Bugatti Veyron Super Sport: 267 mph (429 km/h), 0-60 in 2.4 secs 1 | © 2012 V-Key.com – Proprietary and Confidential History Lessons • 1st modern automobile invention 1866, Karl Benz 2 | © 2012 V-Key.com – Proprietary and Confidential Seat belt legislation introduced US legislation in 1961 Mobile Application Security Exposed - What You Must Know! Benjamin Mah 3 | © 2012 V-Key.com – Proprietary and Confidential Co-Founder and CEO Global Mobile Marketplace Opportunity 50 Billon Connected Devices by 2020 186 Billon Mobile App Downloads by 2014 More Users More Data and Transactions 4 | © 2012 V-Key.com – Proprietary and Confidential Global Mobile Threat Landscape 5 | © 2012 V-Key.com – Proprietary and Confidential Fundamental Mobile Application Weaknesses Traditional Mobile Applications • Application Phishing • Trojan Keylogging • Insecure Mobile OS • Display Recording • Insecure Mobile Apps • Man-in-the-Middle Mobile Operating System 6 | © 2012 V-Key.com – Proprietary and Confidential Phishing Attack 7 | © 2012 V-Key.com – Proprietary and Confidential Insecure Mobile OS Client-Side Attack 8 | © 2012 V-Key.com – Proprietary and Confidential Server-Side Attack Insecure Mobile OS Insecure Application Data 9 | © 2012 V-Key.com – Proprietary and Confidential Reverse Engineering Trojan Keylogging 10 | © 2012 V-Key.com – Proprietary and Confidential Display Recording 11 | © 2012 V-Key.com – Proprietary and Confidential Man-in-the-Middle 12 | © 2012 V-Key.com – Proprietary and Confidential Mobile Security Vs Traditional Security Lifestyle Vs Protection Unique Demands of Lifestyle Mobile • • • • • Preserving Current User Behavior Convenience LightWeight Optimize of Battery Life Cycle Treat the end users as dummies 13 | © 2012 V-Key.com – Proprietary and Confidential Current Mobile Security Approach • • • • • Hardware focus – additional Token OTP 3rd Party Mobile Security s/w installation Heavy Policy Based Intensive Scanning till battery runs dry Complex to use V-Key: What We Do • Mobile Threat Research . Protection . Intelligence Mobile Application Detection & Protection Mobile Threat Intelligence (Enterprise App Focused) (Compliance & Reporting) Application Threat Research Focused (Trust Foundation) 14 | © 2012 V-Key.com – Proprietary and Confidential V-KEY’s Simplicity & Security 15 | Device Integrity Application Integrity Network Integrity Ensure security of host operating system Ensure security of mobile application Ensure security of SSL network connections © 2012 V-Key.com – Proprietary and Confidential V-Tap Advanced Protection Secure Mobile Token Step-Up User Authentication and Protection Verification • World’s 1st secure mobile token • Secures application access on the mobile device • Integrates mobile device protection with the authentication process • Provides advanced authentication features for third-party applications 16 | © 2012 V-Key.com – Proprietary and Confidential Industry Accolades and Security Assessment Recognized Leader in Mobile Application Security Finalist 17 | © 2012 V-Key.com – Proprietary and Confidential Finalist 18 | © 2012 V-Key.com – Proprietary and Confidential