better mobile threat defense brochure

6
BETTER Mobile Threat Defense A Value Add to MDM platform Mobile Security beyond MDM- A mobile endpoint security platform

Upload: alexcia-shields

Post on 13-Apr-2017

73 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: BETTER Mobile Threat Defense Brochure

BETTER Mobile Threat Defense A Value Add to MDM platform Mobile Security beyond MDM- A mobile endpoint security platform

Page 2: BETTER Mobile Threat Defense Brochure

2

Smartphones and tablets give us unprecedented access to the critical business information we need to work faster and more accurately. Providing your employees with access to that information on the mobile devices they choose has many benefits, but it also exposes your business to risk.

Companies have invested money in Mobile Device Management solutions to manage their mobile devices and protect their physical assets. Users are demanding more from IT to run the business. Mobile devices, such as smart phones, have seen the greatest rise in potential IT security risk in the IT environment.

The line between consumer and enterprise mobile threats is blurry, but most IT Security executives recognize that they have mobile threats in their enterprise and this will be a growing concern for them as threats continue to evolve, putting enterprise data at risk.

Some facts

- iOS Vulnerabilities are increasing compared to Windows

- Two out of three apps in Apple App Store is vulnerable to Man-in-the-middle attack (MiTM)

- 99% of Apps in Apple App Store can be turned into targeted malware in few seconds

- A test performed on January 2015 by BETTER Mobile Security checked the resilience of most iOS security apps against code injection and 99% failed

- Recent high profile mobile threats and vulnerabilities like Operation Pawn Storm, xSSER, mRAT, Masque Atack, WireLurker, Pangu, HeartBleed, XcodeGhost, and more, are showing cyber thieves are making advancements toward mobile as an attack vector.

Page 3: BETTER Mobile Threat Defense Brochure

3

Top 4 cyber security threats to Android mobile devices 1. Mobile Remote Access Trojans (MRATS) 2. System Exploits – Elevated Privileges 3. Wi-Fi Man-in-the-Middle (MiTM) 4. Zero –Day Attacks

BETTER Closes Mobile Vulnerability Gaps & Mitigates Risk BETTER Mobile Threat Defense proactively and predictively protects BYO and corporate-owned iOS, Android and Windows mobile devices (managed and unmanaged devices) from the full range of mobile threats. You can dynamically detect and remediate known and unknown mobile vulnerabilities including malware, network, and OS-level threats. Malware Malware appears innocent enough. End users download it like any other app or open a PDF. Then it runs in the background, making audio or video recordings or accessing your cloud apps, data and other services. BETTER uses a multi-layered approach to detect malware. Signatures, behavior, static/dynamic analysis, source origin, structure, permissions, blacklists all provide clues that the app is malicious. Network Man-in-the-Middle (MiTM) attacks can hijack a session. Occurring when the mobile device connects to a rogue Wi-Fi hotspot, MiTM attacks can steal credentials, deliver a targeted exploit, or take control of the device. BETTER’s deep machine learning technology detects risks while on-device

Page 4: BETTER Mobile Threat Defense Brochure

4

remediation isolates the user’s communication from the compromised network. OS OS-based attacks take advantage of weaknesses in the OS or in pre-installed software to expose user passwords, encryption keys, or other private data—or even wipe the handset and eavesdrop on calls. Indeed, 30% of devices are running an out of date OS with severe vulnerabilities. BETTER research teams work tirelessly to keep ahead of these attacks and deliver the most comprehensive protection

State-of-the-Art Mobile Threat Defense BETTER Mobile Threat Defense protects your iOS, Android, and Windows devices from malware, network and OS-based threats 24x7. Our deep machine learning technology detects threats from every attack vector and can even identify unknown, zero-day attacks. On-device remediation instantly addresses any attacks and gets users back to work quickly. The solution is user friendly, ensuring rapid adoption and use. A security management console provides administrators with complete visibility, and even integrates with other enterprise MDM systems. MONITOR BETTER continuously monitors mobile devices for malicious behavior to defend against all mobile attack vectors, including malware as well as network and OS level threats. Our detection engine sits on the mobile device itself to provide comprehensive protection for both private and company data and resources, around the clock. ANALYZE Our deep machine learning technology analyzes the slightest deviations in the device’s OS statistics; memory, CPU, and other system parameters to accurately classify specific types of attacks and even detect unknown, zero-day attacks. REMEDIATE Should an attack be detected, BETTER Threat Defense automatically remediates the issue, taking local action to remove the threat instantly

and reliably. It also works with EMM, MDM, and SIEM solutions to proactively enforce security policies. Users get back to work immediately ADOPT An excellent user experience ensures adoption. Simple to download, BETTER has no impact on the way users use their favorite apps and access data. Our solution runs in the background with a minimal footprint to avoid draining power. Zero latency prevents disruptions to productivity. It does not invade user privacy. MANAGE Security administrators can centrally manage and report on all BETTER protected devices. A cloud-based security dashboard provides complete visibility and reporting on mobile threats and risks across the enterprise. Actionable network, device, and malware forensics help security administrators understand each mobile security incident. Administrators can even define and enact alerts and policies to protect the organization from mobile attacks. INTEGRATE BETTER Threat Defense can stand-alone or integrate with existing EMM/MDM and SIEM solutions to upgrade reactive mobile security to proactive, multi-vector defense, consolidate threat visibility, and automate responses.

Gartner recognizes Better Mobile as App-Centric Security Tool in their Market Guide for MAM report, published 15th March 2016.

Bryan Taylor, Gartner Research

Page 5: BETTER Mobile Threat Defense Brochure

5

Top 6 cyber security threats to iOS devices 1. iOS Surveillance and Mobile Remote Access Trojans (mRATs) 2. Fake iOS Enterprise or Developer Certificates 3. Malicious iOS Profiles 4. Wi-Fi Man-in-the-Middle (MiTM) 5. WebKit Vulnerabilities 6. Zero-Day Attacks

Page 6: BETTER Mobile Threat Defense Brochure

BETTER Mobile Security A mobile endpoint security solution

Better Mobile Security Inc. 99 Madison Avenue, 4th FL New York City, NY 10016

www.BETTER.mobi