1copyright © 2013 blue coat systems inc. all rights reserved. mobile threat example
TRANSCRIPT
1Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.
MOBILE THREAT EXAMPLE
2Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.
Mobile Web Browser Desktop Web BrowserNative Mobile
www.facebook.com
Mobile App Gap
TYPES OF APPLICATIONS
Application behavior & available operations vary across application types
m.facebook.com
3Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.
www.facebook.com
COMMON THREATS ACROSS APPLICATIONS
Similar malware can be delivered to all application types Focusing on just one type of application leaves enterprise
vulnerable
m.facebook.com
Mobile Web Browser Desktop Web BrowserNative
4Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.
Mobile Web Browser Desktop Web Browser
Native
www.facebook.com
REQUIREMENT FOR GRANULAR APP CONTROL
Security policy across all types of applications
Granular app control must distinguish between different types of application
5Copyright © 2013 Blue Coat Systems Inc. All Rights Reserved.
Blue CoatSecurity Empowers Business™