1 | © 2012 V-Key.com – Proprietary and Confidential Bugatti Veyron Super SportBugatti Veyron...
-
Upload
antony-whitley -
Category
Documents
-
view
220 -
download
0
Transcript of 1 | © 2012 V-Key.com – Proprietary and Confidential Bugatti Veyron Super SportBugatti Veyron...
1 | © 2012 V-Key.com – Proprietary and Confidential
Bugatti Veyron Super Sport: 267 mph (429 km/h), 0-60 in 2.4 secs
2 | © 2012 V-Key.com – Proprietary and Confidential
History Lessons
• 1st modern automobile invention 1866, Karl Benz
Seat belt legislation introduced US legislation in 1961
3 | © 2012 V-Key.com – Proprietary and Confidential
Mobile Application Security Exposed - What You Must Know!Benjamin Mah Co-Founder and CEO
4 | © 2012 V-Key.com – Proprietary and Confidential
Global Mobile Marketplace Opportunity
50 Billon Connected Devices by 2020
186 Billon Mobile App Downloads by 2014
More Users
More Data and Transactions
5 | © 2012 V-Key.com – Proprietary and Confidential
Global Mobile Threat Landscape
6 | © 2012 V-Key.com – Proprietary and Confidential
Fundamental Mobile Application Weaknesses
Application Phishing
Insecure Mobile OS
Insecure Mobile Apps
Trojan Keylogging
Display Recording
Man-in-the-Middle
Mobile Operating System
TraditionalMobile
Applications
7 | © 2012 V-Key.com – Proprietary and Confidential
Ph
ish
ing
Atta
ck
8 | © 2012 V-Key.com – Proprietary and Confidential
Insecure Mobile OS
Client-Side Attack Server-Side Attack
9 | © 2012 V-Key.com – Proprietary and Confidential
Insecure Mobile OS
Insecure Application Data Reverse Engineering
10 | © 2012 V-Key.com – Proprietary and Confidential
Troja
n K
eylo
gg
ing
11 | © 2012 V-Key.com – Proprietary and Confidential
Dis
pla
y R
ecord
ing
12 | © 2012 V-Key.com – Proprietary and Confidential
Man
-in-th
e-M
idd
le
13 | © 2012 V-Key.com – Proprietary and Confidential
Mobile Security Vs Traditional SecurityLifestyle Vs Protection
Unique Demands of LifestyleMobile
• Preserving Current User Behavior• Convenience • LightWeight• Optimize of Battery Life Cycle• Treat the end users as dummies
CurrentMobile Security Approach
• Hardware focus – additional Token OTP• 3rd Party Mobile Security s/w installation• Heavy Policy Based• Intensive Scanning till battery runs dry• Complex to use
14 | © 2012 V-Key.com – Proprietary and Confidential
V-Key: What We DoMobile Threat Research . Protection . Intelligence
Application Threat Research Focused(Trust Foundation)
Mobile ApplicationDetection & Protection (Enterprise App Focused)
Mobile Threat Intelligence
(Compliance & Reporting)
15 | © 2012 V-Key.com – Proprietary and Confidential
Device IntegrityEnsure security of host operating system
Application IntegrityEnsure security of mobile application
Network IntegrityEnsure security of SSL network connections
V-KEY’s Simplicity & Security
16 | © 2012 V-Key.com – Proprietary and Confidential
V-Tap Advanced Protection Secure Mobile TokenStep-Up User Authentication and Protection Verification
World’s 1st secure mobile token
Secures application access on the mobile device
Integrates mobile device protection with the authentication process
Provides advanced authentication features for third-party applications
17 | © 2012 V-Key.com – Proprietary and Confidential
Industry Accolades and Security AssessmentRecognized Leader in Mobile Application Security
Finalist Finalist
18 | © 2012 V-Key.com – Proprietary and Confidential