Professional Documents
Culture Documents
SECURITY
NADAV PELEG
Petr KadrmasHEAD OF MOBILE
SE Eastern Europe SECURITY
YOU DON’T NEED TO
BREAK A WINDOW TO
BREAK INTO A HOUSE
YOU JUST NEED
SOMEONE TO
LET YOU IN
MOBILE USERS ARE
3 VECTORS OF
#4 #5
MISCONCEPTIONS
ABOUT MOBILE
SECURITY
"iPhone is immune "Mobile AV can
against threats." protect me."
Container
BYOD
400
1,200
Devices
EMM
Credential Keyloggers
Stealers
#4 #5
MISCONCEPTIONS
ABOUT MOBILE
SECURITY
"iPhone is immune "Mobile AV can
against threats" protect me"
WHAT ABOUT
iOS?
is iPhone immune
to threats?
CAN YOU TRUST
3 rd PARTY APP STORES?
25PP.com vShare.com
more than 40M users, 150M users, 25% iOS.
8M downloads a day 15,000 iOS apps
XcodeGhost
Collects user
and device data
and sends to
C&C server
Over 4,000
malicious apps in
Apple App Store
Source: blog.checkpoint.com
Side Stepper
BUT STILL…
ANDROID IS 17 TIMES MORE
PRONE TO THREATS THAN iOS*
Time gap from
vulnerability to fix
Only 20%
update Android OS
SIGNATURES
can be easily bypassed
by obfuscation
Bypassing AV Detection of Mobile Spyware
Malware
detected by
Anti Virus
Obfuscation
tool for
Android
apps Obfuscated version of
Phonetail app created
Malware
bypassed AV
inspection
AV CANNOT
PROTECT
AGAINST
UNKNOWN
MALWARE
#1 #2 #3
#4 #5
MISCONCEPTIONS
ABOUT MOBILE
SECURITY
"iPhone is immune "Mobile AV can
against threats" protect me"
Mobile Threat Prevention
Unknown Threats and Zero Day
Secure
BUILDING Containers
Data Leakage
Prevention
BLOCKS Anti-Virus,
App Reputation
Known Threats
MOBILE THREAT PREVENTION
Advanced Threat
Detection and Mitigation
Full Visibility
Simple Deployment
MDM
EMM
Threat Technologies
©2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 31
Capsule Workspace
SECURELY log-in
EASILY ACCESS
business applications
Classify
Share
Encrypt