1 | © 2012 V-Key.com – Proprietary and Confidential Bugatti Veyron Super SportBugatti Veyron...

Preview:

Citation preview

2 | © 2012 V-Key.com – Proprietary and Confidential

History Lessons

• 1st modern automobile invention 1866, Karl Benz

Seat belt legislation introduced US legislation in 1961

3 | © 2012 V-Key.com – Proprietary and Confidential

Mobile Application Security Exposed - What You Must Know!Benjamin Mah Co-Founder and CEO

4 | © 2012 V-Key.com – Proprietary and Confidential

Global Mobile Marketplace Opportunity

50 Billon Connected Devices by 2020

186 Billon Mobile App Downloads by 2014

More Users

More Data and Transactions

5 | © 2012 V-Key.com – Proprietary and Confidential

Global Mobile Threat Landscape

6 | © 2012 V-Key.com – Proprietary and Confidential

Fundamental Mobile Application Weaknesses

Application Phishing

Insecure Mobile OS

Insecure Mobile Apps

Trojan Keylogging

Display Recording

Man-in-the-Middle

Mobile Operating System

TraditionalMobile

Applications

7 | © 2012 V-Key.com – Proprietary and Confidential

Ph

ish

ing

Atta

ck

8 | © 2012 V-Key.com – Proprietary and Confidential

Insecure Mobile OS

Client-Side Attack Server-Side Attack

9 | © 2012 V-Key.com – Proprietary and Confidential

Insecure Mobile OS

Insecure Application Data Reverse Engineering

10 | © 2012 V-Key.com – Proprietary and Confidential

Troja

n K

eylo

gg

ing

11 | © 2012 V-Key.com – Proprietary and Confidential

Dis

pla

y R

ecord

ing

12 | © 2012 V-Key.com – Proprietary and Confidential

Man

-in-th

e-M

idd

le

13 | © 2012 V-Key.com – Proprietary and Confidential

Mobile Security Vs Traditional SecurityLifestyle Vs Protection

Unique Demands of LifestyleMobile

• Preserving Current User Behavior• Convenience • LightWeight• Optimize of Battery Life Cycle• Treat the end users as dummies

CurrentMobile Security Approach

• Hardware focus – additional Token OTP• 3rd Party Mobile Security s/w installation• Heavy Policy Based• Intensive Scanning till battery runs dry• Complex to use

14 | © 2012 V-Key.com – Proprietary and Confidential

V-Key: What We DoMobile Threat Research . Protection . Intelligence

Application Threat Research Focused(Trust Foundation)

Mobile ApplicationDetection & Protection (Enterprise App Focused)

Mobile Threat Intelligence

(Compliance & Reporting)

15 | © 2012 V-Key.com – Proprietary and Confidential

Device IntegrityEnsure security of host operating system

Application IntegrityEnsure security of mobile application

Network IntegrityEnsure security of SSL network connections

V-KEY’s Simplicity & Security

16 | © 2012 V-Key.com – Proprietary and Confidential

V-Tap Advanced Protection Secure Mobile TokenStep-Up User Authentication and Protection Verification

World’s 1st secure mobile token

Secures application access on the mobile device

Integrates mobile device protection with the authentication process

Provides advanced authentication features for third-party applications

17 | © 2012 V-Key.com – Proprietary and Confidential

Industry Accolades and Security AssessmentRecognized Leader in Mobile Application Security

Finalist Finalist

18 | © 2012 V-Key.com – Proprietary and Confidential