the future of mobile application security

28
Copyright Sencha Inc. 2014 THE EXCITING FUTURE OF MOBILE APPLICATION SECURITY Presented by SecureAuth and Sencha June 12, 2014 www.sencha.co m www.secureauth.c om

Upload: secureauth2fasso

Post on 15-Jan-2015

237 views

Category:

Technology


2 download

DESCRIPTION

The rapid adoption of mobile technology in recent years has created an opportunity for enterprises to increase the productivity and flexibility of their organizations. This demand for greater mobility has forced enterprises to deliver sensitive applications and data across a wide array of devices and networks. SecureAuth and Sencha have created an integrated approach to application, data, and user mobility that elegantly addresses these challenges. -Secure enterprise application deployment -End-to-end data security with strong encryption -Managed application container that works on any device -Developer SDK for creating rich application user experiences

TRANSCRIPT

Page 1: The Future of Mobile Application Security

Copyright Sencha Inc. 2014

THE EXCITING FUTURE OF MOBILE APPLICATION SECURITY

Presented by SecureAuth and Sencha

June 12, 2014

www.sencha.-com

www.secureauth.-com

Page 2: The Future of Mobile Application Security

PRESENTED BY SENCHA AND SECUREAUTH CORPORATION

Nick Harlow, SenchaDirector of Product Management – Sencha Space

Chris Hayes, SecureAuth CorporationChief Solutions Architect

Garret Grajek, SecureAuth CorporationCo-founder and CTO / COO

• All attendee audio lines are muted• Questions will be answered at the end of the session

• Submit brief questions on the Q&A panel

• Send longer questions or off-line topics via email [email protected]

Page 3: The Future of Mobile Application Security

AGENDA

Technology Trends: Apps, Identities

Challenges with App Development and Data Security

Solving the App, Identity, and Security Problem: The Integrated Solution

Demo

Q & A

Page 4: The Future of Mobile Application Security

TECHNOLOGY TRENDSAPPS, IDENTITIES

Page 5: The Future of Mobile Application Security

Consumerization of IT

Rapid Adoption of Mobile

Enterprise Cloud Goes Mainstream

Accelerating Workforce Virtualization

• Personal devices becoming pervasive in the enterprise

• Organizations must address challenges around BYOD• Opportunity for productivity gains and cost savings

• Mobile device sales surpass PC sales• Mobility comes with heightened security risks• Driving a shift to mobile-first development

• Cloud services gain acceptance for use in production

• Cloud providers adapt offerings for the enterprise • Cloud IT investment poised for explosive growth

• Collaboration with non-employees is the new normal• Managing access and data security is a major

challenge• Organizational boundaries increasingly dynamic

TECHNOLOGY TRENDSSHAPING THE EVOLUTION OF ENTERPRISE MOBILITY

Page 6: The Future of Mobile Application Security

THE IDENTITY PROBLEM TODAY

Enterprises have Roles / Policies On-premises

Users Must Obtain Resources Outside of EnterpriseCloud Apps, Mobile Apps

The Result has been Mass Distribution of Identities across the Internet

Page 7: The Future of Mobile Application Security

THE IDENTITY PROBLEM TODAY

Resulting in No Enterprise ControlIdentities

Logon Credentials

Hacks on All ResourcesCloud, Mobile, Network, etc.

Page 8: The Future of Mobile Application Security

A FEW FACTS

75% of Security Breaches Involve Compromised Credentials

71% Targeted User Devices

13% Leveraged Misuse of Privilege Average Cost: $188 per Record

CIO: Testifying Before the Senate

$5.37 Billion in shareholder value

lost

Breach disclosed in

media

Page 9: The Future of Mobile Application Security

APP DEVELOPMENT AND DATA SECURITY

Page 10: The Future of Mobile Application Security

$ $ $ $ $

Management Security

$ $ $ $ $$ $ $ $ $

$ $ $ $ $

And these processes and apps must be

managed and secure to limit risk

…which multiply with each new supported

mobile OS/device platform.

Each part of the app development process

incurs expenses…

INEFFICIENT MOBILITY AND SECURITY WASTES RESOURCESThe cost of mobility can erode its ROI

Page 11: The Future of Mobile Application Security

END-TO-END DATA SECURITY

Data security means protecting confidentiality and integrity of data

Management and enforcement across three modes of data useAt-rest – When data is stored on a deviceIn-motion – When data is traversing the networkIn-use – When a user interacts with the data through an app on a device

Ensuring data security as data moves across the range of untrustworthy networks and devices is not trivial

Overview

Page 12: The Future of Mobile Application Security

MANAGING IDENTITY SPRAWL

Page 13: The Future of Mobile Application Security

THE PROBLEM IDENTITY SPRAWL CREATES

Enterprises have Lost Control of the Identities:

Where they are stored

What authentication strength is required

How the identity is asserted

Page 14: The Future of Mobile Application Security

THE PROBLEM IDENTITY SPRAWL CREATES

Page 15: The Future of Mobile Application Security

THE PROBLEM IDENTITY SPRAWL CREATES

http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

• The hackers at-tack the weakest points

• Credentials are at risk when held outside the en-terprise

Page 16: The Future of Mobile Application Security

THE INTEGRATED SOLUTIONEASILY MANAGE APPS, DATA, AND USERS

Page 17: The Future of Mobile Application Security

Benefits Streamline app development process –

Eliminate PhoneGap/Cordova

Deliver HTML5 apps directly to end-users through a managed, secure runtime platform

Helps protect your apps and data by Managing user access

Remotely wiping your data from devices as needed

Keeping your business data separate from other data on the device

Leverage developer APIs for a rich application experience

SENCHA SPACEEASILY MOBILIZE EXISTING WEB AND HTML5 APPS

Page 18: The Future of Mobile Application Security

SENCHA SPACEMANAGEMENT CONSOLE OVERVIEW

Management Console

• Provides centralized management of the user, data, and application lifecycles

• Improves efficiency of cross-platform application development, testing, maintenance and deployment

• Allows administrators to enforce policy consistently

• Captures user, device, and application analytics for additional revenue capture opportunities

Page 19: The Future of Mobile Application Security

•Facilitates managed use of HTML5 apps across multiple OS/device platforms

•Supports iOS and Android (Win Phone 8 and Blackberry in beta)

•Enforces policies from central management console

•Secures and segregates application data for fine-grained management of data and risk

•Provides developer API to OS/Device features for rich, modern, mobile user experience

Mobile Client Application

SENCHA SPACEMOBILE CLIENT APPLICATION

Page 20: The Future of Mobile Application Security

Data Encryption – All data is stored encrypted in Space to protect the confidentiality of sensitive, proprietary information

Network Security – All data transmitted between the Space client app and management server is SSL-encrypted

VPN Support – Integration with Cisco and Juniper clientless SSL VPN for secure connectivity between the Space client app and back-end data center assets

Authentication – Federated authentication support using widely accepted SAML open standard

Key Benefits

SENCHA SPACESECURITY

Reduce the risk of data breach

Grant access to applications and data based only on business need

Deploy applications securely to anyone on any device

Page 21: The Future of Mobile Application Security

SECUREAUTH TECHNOLOGY OVERVIEW

Page 22: The Future of Mobile Application Security

SECUREAUTH PROVIDESSECURE ENTERPRISE DIRECTORY SSO

Connects to Enterprise Directory

Authenticates based on Existing IDs / Passwords

No Directory Synchronization Required

Connects to AD, LDAP, SQL, ODBC, REST

Page 23: The Future of Mobile Application Security

20+ AUTHENTICATION MECHANISMS

1. SMS OTP2. Telephony OTP3. E-mail OTP4. Static PIN5. KBA / KBQ6. Yubikey (USB)

18. Federated IDs19. Help Desk20. Password21. Kerberos22. Symantic VIP

7. X.509 Native8. X.509 Java9. NFC Prox Card10. CAC / PIV Card11. PUSH

Notification

12. Mobile OATH Token13. Browser OATH Token14. Windows Desktop OATH

Token15. Third-party OATH Token16. Device Fingerprinting17. Social IDs

YOUR COMPANY NAME

Please choose the delivery method for your registration code.

VoiceE-mailSMS

Submit

Page 24: The Future of Mobile Application Security

THEN SECUREAUTH PROVIDESSSO TO ALL RESOURCES

Cloud AppsGoogle, Office 365, Salesforce, Box

Concur, WebEx, ADP

Mobile AppsAndroid, iOS, Windows

Built-in SSO to Enterprise Web AppsSharePoint, WebSphere, ASP.NET

Oracle, J2EE, PeopleSoft

Page 25: The Future of Mobile Application Security

SECUREAUTH PROVIDES2-FACTOR AUTHENTICATION FOR SENCHA SPACE

Enterprise Enforcement of 2-Factor Enrollment and Access of Sencha Space

20+ Authentication Mechanisms

Pre-built Browser FormsEasy User Deployment

Page 26: The Future of Mobile Application Security

DEMOChris Hayes, SecureAuth Corporation

Page 27: The Future of Mobile Application Security

RESOURCES AND CONTACT INFO

SecureAuth: www.secureauth.comFree Trial: www.secureauth.com/free-trialQuestions [email protected] [email protected] [email protected]

Sencha Space: www.sencha.com/spaceFree Trial: manage.space.sencha.comTwitter: @sencha, @nharlowQuestions [email protected] [email protected]

Thank you!

Page 28: The Future of Mobile Application Security