how to gather global mobile threat intelligence

25

Upload: zimperium

Post on 14-Apr-2017

90 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: How to Gather Global Mobile Threat Intelligence
Page 2: How to Gather Global Mobile Threat Intelligence
Page 3: How to Gather Global Mobile Threat Intelligence
Page 4: How to Gather Global Mobile Threat Intelligence

By 2018, 25% of corporate data traffic will flow directly from mobile devices to the cloud bypassing enterprise security controls.

By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk.

Gartner, Special Report: Cybersecurity at the Speed of Digital Business, Paul E. Proctor,  Ray Wagner, August 30, 2016

Page 5: How to Gather Global Mobile Threat Intelligence
Page 6: How to Gather Global Mobile Threat Intelligence
Page 7: How to Gather Global Mobile Threat Intelligence
Page 8: How to Gather Global Mobile Threat Intelligence
Page 9: How to Gather Global Mobile Threat Intelligence
Page 10: How to Gather Global Mobile Threat Intelligence
Page 11: How to Gather Global Mobile Threat Intelligence
Page 12: How to Gather Global Mobile Threat Intelligence
Page 13: How to Gather Global Mobile Threat Intelligence
Page 14: How to Gather Global Mobile Threat Intelligence
Page 15: How to Gather Global Mobile Threat Intelligence
Page 16: How to Gather Global Mobile Threat Intelligence
Page 17: How to Gather Global Mobile Threat Intelligence
Page 18: How to Gather Global Mobile Threat Intelligence
Page 19: How to Gather Global Mobile Threat Intelligence

Have we adopted a position concerning the acceptable risk posture of mobile devices, and can we enforce it?

Have we performed an assessment of all potential risks associated with our mobile apps?

Do we know if threats are being perpetrated on our employees’ mobile devices today?

Page 20: How to Gather Global Mobile Threat Intelligence
Page 21: How to Gather Global Mobile Threat Intelligence
Page 22: How to Gather Global Mobile Threat Intelligence
Page 23: How to Gather Global Mobile Threat Intelligence
Page 24: How to Gather Global Mobile Threat Intelligence

Global Threat Analysis Report Over 3800 Critical* threats in 7 days

• 63% of threats were network based

• 36% were App based

• >1000 devices involved across 86 unique networks

Top 4 Threats• Suspicious Apps (36%)• Fake SSLs (35%)• SSL Strip (23%)• ARP/ICMP MITM (4%)

ARP MITMFake SSL certificate MITM

ICMP Redirect MITMRogue Access Point

SSL StripSuspicious Android App

System TamperingTraffic Tampering

Grand Total

24362

186

114514

1315

1066

# of Devices

2%36%

2%0%

23%

36%

1%1%

# of Threats

ARP MITM Fake SSL certificate MITM

ICMP Redirect MITM

Rogue Access Point

SSL Strip Suspicious Android App

System Tampering Traffic Tampering

App Based36%

Device Based

1%

Network Based63%

Threat Distribution

App BasedDevice BasedNetwork Based

Page 25: How to Gather Global Mobile Threat Intelligence