MobileIron Threat Defense
Raffaele Clementelli Regional Sales Manager MobileIron Confidential Mobile threats are everywhere
24% Of organizations suffered a mobile security attack, primarily driven by malware & malicious WiFi
43% Were unsure if mobile security incidents had occurred
MobileIron Confidential Source: 2017 Mobile Security Report, Zimperium Risk is escalating rapidly
1400
1200
1000
800
600 CVE Score 7+
CVE Score 1-6 400
200 Common Vulnerabilities & Events & Vulnerabilities Common
0 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017
MobileIron Confidential Source: CVE.Mitre.org. CVEDetails.com: Android and iOS CVEs Threats are real, sophisticated and escalating
2014 2015 2016 2017
Masque Wirelurker 2014-4487 ICMP Double xCode YiSpector Pegasus Stagefright zIVA Mach 7.x, 8.x <8.1.3 Direct Ghost iOS 8.4 and below Remote iOS for iOS portal Used in jailbreak exploit, in use for CVE-2016-4637 2+ years
TowelRoot DoubleDirect Heartbleed Stagefright Wormhole Oxygen Triada Zygote HummingBad Drammer HummingWhale 200M devices 800K devices 95% of Android (Moplus SDK) SwiftKey System exploit Hummer (HummingBad variant) impacted impacted impacted malware
QuadRooter Godless PokeMon Go DirtyCow Blueborne Guide
MobileIron Confidential Mobile attacks
Network Attacks Configuration Changes Silent Device Attack
MobileIron Confidential Network Attacks Wi-Fi Man in the Middle
At a coffee shop Redirect to Access to Wi-Fi MITM Data exploit near an office phishing page corporate data
MobileIron threat defense solution detects and blocks here MobileIron Confidential Device Configuration Changes
Consultant that goes in Doesn’t like client Installs “free” VPN profile to Installs SSL cert to All company data is and out of client network restrictions on- bypass restrictions encrypt / decrypt decrypted to the hacker networks site device traffic
MobileIron threat defense solution detects and blocks here MobileIron Confidential Silent Device Attack Device exploitation (e.g. Stagefright)
Phone on table MMS sent to MMS Exploit Privilege Device Persistence for while you sleep dormant device processed executed elevation compromised targeted attack
MobileIron threat defense solution detects and blocks here
MobileIron Confidential Our Unique Approach
MobileIron Confidential Easy
One single app
The best security is invisible to the end user
MobileIron Confidential On-Device
Zero-day detection No internet Machine learning and remediation, connectivity algorithm on-device, required
MobileIron Confidential Detection & remediation Other MTD & EMM solutions
Send Remediation Instructions to EMM Inform EMM agent In The Perform of Policy Cloud Detection Violation
Remediate Threat On Scan Device Device Time to Detect & Remediate MTDEMM MobileIron Confidential Detection & remediation The MobileIron Threat Defense Solution
In The Cloud
Recognize Policy Violation Remediate Threat On Scan Device & Device Perform Detection
Detect & Remediate MTD EMM MobileIron Confidential Jetzt eine kostenlose POC starten!
MobileIron Confidential Thank You
MobileIron Confidential