the future of mobile application security
DESCRIPTION
The rapid adoption of mobile technology in recent years has created an opportunity for enterprises to increase the productivity and flexibility of their organizations. This demand for greater mobility has forced enterprises to deliver sensitive applications and data across a wide array of devices and networks. SecureAuth and Sencha have created an integrated approach to application, data, and user mobility that elegantly addresses these challenges. -Secure enterprise application deployment -End-to-end data security with strong encryption -Managed application container that works on any device -Developer SDK for creating rich application user experiencesTRANSCRIPT
Copyright Sencha Inc. 2014
THE EXCITING FUTURE OF MOBILE APPLICATION SECURITY
Presented by SecureAuth and Sencha
June 12, 2014
www.sencha.-com
www.secureauth.-com
PRESENTED BY SENCHA AND SECUREAUTH CORPORATION
Nick Harlow, SenchaDirector of Product Management – Sencha Space
Chris Hayes, SecureAuth CorporationChief Solutions Architect
Garret Grajek, SecureAuth CorporationCo-founder and CTO / COO
• All attendee audio lines are muted• Questions will be answered at the end of the session
• Submit brief questions on the Q&A panel
• Send longer questions or off-line topics via email [email protected]
AGENDA
Technology Trends: Apps, Identities
Challenges with App Development and Data Security
Solving the App, Identity, and Security Problem: The Integrated Solution
Demo
Q & A
TECHNOLOGY TRENDSAPPS, IDENTITIES
Consumerization of IT
Rapid Adoption of Mobile
Enterprise Cloud Goes Mainstream
Accelerating Workforce Virtualization
• Personal devices becoming pervasive in the enterprise
• Organizations must address challenges around BYOD• Opportunity for productivity gains and cost savings
• Mobile device sales surpass PC sales• Mobility comes with heightened security risks• Driving a shift to mobile-first development
• Cloud services gain acceptance for use in production
• Cloud providers adapt offerings for the enterprise • Cloud IT investment poised for explosive growth
• Collaboration with non-employees is the new normal• Managing access and data security is a major
challenge• Organizational boundaries increasingly dynamic
TECHNOLOGY TRENDSSHAPING THE EVOLUTION OF ENTERPRISE MOBILITY
THE IDENTITY PROBLEM TODAY
Enterprises have Roles / Policies On-premises
Users Must Obtain Resources Outside of EnterpriseCloud Apps, Mobile Apps
The Result has been Mass Distribution of Identities across the Internet
THE IDENTITY PROBLEM TODAY
Resulting in No Enterprise ControlIdentities
Logon Credentials
Hacks on All ResourcesCloud, Mobile, Network, etc.
A FEW FACTS
75% of Security Breaches Involve Compromised Credentials
71% Targeted User Devices
13% Leveraged Misuse of Privilege Average Cost: $188 per Record
CIO: Testifying Before the Senate
$5.37 Billion in shareholder value
lost
Breach disclosed in
media
APP DEVELOPMENT AND DATA SECURITY
$ $ $ $ $
Management Security
$ $ $ $ $$ $ $ $ $
$ $ $ $ $
And these processes and apps must be
managed and secure to limit risk
…which multiply with each new supported
mobile OS/device platform.
Each part of the app development process
incurs expenses…
INEFFICIENT MOBILITY AND SECURITY WASTES RESOURCESThe cost of mobility can erode its ROI
END-TO-END DATA SECURITY
Data security means protecting confidentiality and integrity of data
Management and enforcement across three modes of data useAt-rest – When data is stored on a deviceIn-motion – When data is traversing the networkIn-use – When a user interacts with the data through an app on a device
Ensuring data security as data moves across the range of untrustworthy networks and devices is not trivial
Overview
MANAGING IDENTITY SPRAWL
THE PROBLEM IDENTITY SPRAWL CREATES
Enterprises have Lost Control of the Identities:
Where they are stored
What authentication strength is required
How the identity is asserted
THE PROBLEM IDENTITY SPRAWL CREATES
THE PROBLEM IDENTITY SPRAWL CREATES
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
• The hackers at-tack the weakest points
• Credentials are at risk when held outside the en-terprise
THE INTEGRATED SOLUTIONEASILY MANAGE APPS, DATA, AND USERS
Benefits Streamline app development process –
Eliminate PhoneGap/Cordova
Deliver HTML5 apps directly to end-users through a managed, secure runtime platform
Helps protect your apps and data by Managing user access
Remotely wiping your data from devices as needed
Keeping your business data separate from other data on the device
Leverage developer APIs for a rich application experience
SENCHA SPACEEASILY MOBILIZE EXISTING WEB AND HTML5 APPS
SENCHA SPACEMANAGEMENT CONSOLE OVERVIEW
Management Console
• Provides centralized management of the user, data, and application lifecycles
• Improves efficiency of cross-platform application development, testing, maintenance and deployment
• Allows administrators to enforce policy consistently
• Captures user, device, and application analytics for additional revenue capture opportunities
•Facilitates managed use of HTML5 apps across multiple OS/device platforms
•Supports iOS and Android (Win Phone 8 and Blackberry in beta)
•Enforces policies from central management console
•Secures and segregates application data for fine-grained management of data and risk
•Provides developer API to OS/Device features for rich, modern, mobile user experience
Mobile Client Application
SENCHA SPACEMOBILE CLIENT APPLICATION
Data Encryption – All data is stored encrypted in Space to protect the confidentiality of sensitive, proprietary information
Network Security – All data transmitted between the Space client app and management server is SSL-encrypted
VPN Support – Integration with Cisco and Juniper clientless SSL VPN for secure connectivity between the Space client app and back-end data center assets
Authentication – Federated authentication support using widely accepted SAML open standard
Key Benefits
SENCHA SPACESECURITY
Reduce the risk of data breach
Grant access to applications and data based only on business need
Deploy applications securely to anyone on any device
SECUREAUTH TECHNOLOGY OVERVIEW
SECUREAUTH PROVIDESSECURE ENTERPRISE DIRECTORY SSO
Connects to Enterprise Directory
Authenticates based on Existing IDs / Passwords
No Directory Synchronization Required
Connects to AD, LDAP, SQL, ODBC, REST
20+ AUTHENTICATION MECHANISMS
1. SMS OTP2. Telephony OTP3. E-mail OTP4. Static PIN5. KBA / KBQ6. Yubikey (USB)
18. Federated IDs19. Help Desk20. Password21. Kerberos22. Symantic VIP
7. X.509 Native8. X.509 Java9. NFC Prox Card10. CAC / PIV Card11. PUSH
Notification
12. Mobile OATH Token13. Browser OATH Token14. Windows Desktop OATH
Token15. Third-party OATH Token16. Device Fingerprinting17. Social IDs
YOUR COMPANY NAME
Please choose the delivery method for your registration code.
VoiceE-mailSMS
Submit
THEN SECUREAUTH PROVIDESSSO TO ALL RESOURCES
Cloud AppsGoogle, Office 365, Salesforce, Box
Concur, WebEx, ADP
Mobile AppsAndroid, iOS, Windows
Built-in SSO to Enterprise Web AppsSharePoint, WebSphere, ASP.NET
Oracle, J2EE, PeopleSoft
SECUREAUTH PROVIDES2-FACTOR AUTHENTICATION FOR SENCHA SPACE
Enterprise Enforcement of 2-Factor Enrollment and Access of Sencha Space
20+ Authentication Mechanisms
Pre-built Browser FormsEasy User Deployment
DEMOChris Hayes, SecureAuth Corporation
RESOURCES AND CONTACT INFO
SecureAuth: www.secureauth.comFree Trial: www.secureauth.com/free-trialQuestions [email protected] [email protected] [email protected]
Sencha Space: www.sencha.com/spaceFree Trial: manage.space.sencha.comTwitter: @sencha, @nharlowQuestions [email protected] [email protected]
Thank you!