Federal Grade Security with Appthority

10
1 Appthority Appthority © Copyright 2012 All Rights Reserved contact @appthority.com | + 1 (855) 346-SAFE | @GetAppthority | www.appthority.com The Authority in App Security™ “Yes, You Can Have Federal Grade Mobile Data Security Too!” Appthority Appthority helps people learn what apps do and what risks they contain

Transcript of Federal Grade Security with Appthority

Page 1: Federal Grade Security with Appthority

1

Appthority

Appthority © Copyright 2012 All Rights [email protected] | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com

The Authority in App Security™

“Yes, You Can Have Federal Grade Mobile Data Security Too!”

Appthority

Appthority helps people learn what apps do and what risks they contain

Page 2: Federal Grade Security with Appthority

2

Appthority

Appthority © Copyright 2012 All Rights [email protected] | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com

“Appthority and its Appthority Platform won the award based on the current and future need to secure mobile applications, as well their ability to build an established partner network and demonstrate robust customer traction.”– RSA Innovation Sandbox Judging Committee

Most Innovative of RSA AwardNamed “The Most Innovative Company of RSA Conference® 2012”

Page 3: Federal Grade Security with Appthority

3

Appthority

Appthority © Copyright 2012 All Rights [email protected] | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com

Appthority team

Steve Krausz invested in such Enterprise security

companies as CheckPoint Software, Imperva,

Vontu, ThreatMetrix, Trusteer, and CipherTrust

Ray Rothrock invested in such Enterprise security

companies as CheckPoint Software, Imperva,

Vontu, PGP, WholeSecurity, RedSeal, CoreTrace,

and CloudFlare

Management team from such companies as

With top notch investors with backgrounds funding successful

Enterprise security companies

Page 4: Federal Grade Security with Appthority

4

Appthority

Appthority © Copyright 2012 All Rights [email protected] | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com

Customer challenges

Enterprises can’t create or enforce mobile policy nor comply with

regulatory requirements if they don’t know what risks the apps contain

• Explosion in apps and exponential growth in malware• Existing mobile security expertise scarce within the

Enterprise• No one knows which apps are safe • Legacy security technologies are not keeping up with

the changes in mobile• New apps being released faster than they can be

manually reviewed• Cost to determine if an individual app is safe is

prohibitively expensive and everyone has a different opinion of “safe”

Page 5: Federal Grade Security with Appthority

5

Appthority

Appthority © Copyright 2012 All Rights [email protected] | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com

Why use Appthority in EASE?Before distributing apps inside the Enterprise, the apps need to be

checked by Appthority• Best-in-class behavior-based malware detection

• Works on Android and iOS apps

• Reduces supply-chain risk from third-party app developers

• Superior protection when paired with Mocana- Appthority keeps malware away from VPN clients

• Risk management approach to screening mobile apps• Allows Enterprises to reject or adjust apps that don’t meet

Enterprise policy

• Helps Enterprises understand what the mobile apps are really doing and what Enterprise data they have access to

• Easy-to-use Appthority App Inspection within EASE

Page 6: Federal Grade Security with Appthority

6

Appthority

Appthority © Copyright 2012 All Rights [email protected] | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com

Appthority Platform

Only Appthority can scan iOS apps for malware & risky behaviors seen

in Android• Screens mobile apps (Android and iOS) in minutes, in

the cloud

• Integrates w/ Enterprise solutions like Apperian and Mocana

• Detects attributes in apps, such as:• Malware (behavior-based NOT hash-based, detects new &

never before seen malware)

• Location tracking (even without permission)

• Ad networks

• Data leakage risks

• Cryptographic risks

Page 7: Federal Grade Security with Appthority

7

Appthority

Appthority © Copyright 2012 All Rights [email protected] | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com

Workflow in Apperian

Simply click the magnifying glass in the Apperian Applications console

to begin inspecting apps with Appthority! Contact your Apperian

account manager for eval access today!

Best practice: Before distributing apps to employees, ensure you’ve

inspected the apps!

Page 8: Federal Grade Security with Appthority

8

Appthority

Appthority © Copyright 2012 All Rights [email protected] | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com

Example inspection report

Page 9: Federal Grade Security with Appthority

9

Appthority

Appthority © Copyright 2012 All Rights [email protected] | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com

Summary and best practicesDon’t distribute software within the Enterprise, without inspecting what

the software does!• All apps should be inspected, for malware and policy

compliance, prior to:• Distributing the apps into the Enterprise

• Adding VPN clients into the apps

• Appthority helps organizations answer:• Are third-party file sharing systems like DropBox used by the

app

• Does the app take the contact book off the device?

• Does the app location track users (with or without permission)?

• Is malware present?

• Does the app communicate with known sites that serve malware?

Page 10: Federal Grade Security with Appthority

10

Appthority

Appthority © Copyright 2012 All Rights [email protected] | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com

The Authority in App Security™

Q&A

Wrap-up and Q&A. Questions? Thank you!

Thank you!– Anthony Bettini, Founder & CEO, Appthority