1copyright © 2013 blue coat systems inc. all rights reserved. mobile threat example

5
1 Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE

Upload: steven-johnson

Post on 12-Jan-2016

220 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: 1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE

1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

MOBILE THREAT EXAMPLE

Page 2: 1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE

2Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

Mobile Web Browser Desktop Web BrowserNative Mobile

www.facebook.com

Mobile App Gap

TYPES OF APPLICATIONS

Application behavior & available operations vary across application types

m.facebook.com

Page 3: 1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE

3Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

www.facebook.com

COMMON THREATS ACROSS APPLICATIONS

Similar malware can be delivered to all application types Focusing on just one type of application leaves enterprise

vulnerable

m.facebook.com

Mobile Web Browser Desktop Web BrowserNative

Page 4: 1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE

4Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

Mobile Web Browser Desktop Web Browser

Native

www.facebook.com

REQUIREMENT FOR GRANULAR APP CONTROL

Security policy across all types of applications

Granular app control must distinguish between different types of application

Page 5: 1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved. MOBILE THREAT EXAMPLE

5Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.

Blue CoatSecurity Empowers Business™