secure your mobile devices - qualys...qualys security conference 2020 secure your mobile devices...

Post on 16-Jul-2020

15 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

QUALYS SECURITY CONFERENCE 2020

Secure your mobile devices

Secure Enterprise Mobility (SEM)

Jimmy GrahamSenior Director, Product ManagementQualys, Inc.

Device and System Attack

November 20-21, 2019Qualys Security Conference2

!""#$%"&'"('")$%#*'+,"-'"-#'&.&"#$'(*')%%&'+-,/-'*#01,*#&'-)2,34'/($%*($,&#5'"-#'5#2,/#6')//(13"#5''7(*'89:'(7'5#"#/"#5'5#2,/#')"")/;&',3<=>?@

Network Threats and Attacks

November 20-21, 2019Qualys Security Conference3

A#"+(*;'"-*#)"&'+#*# "-*(14-B3&#/1*#5'(*'13#3/*.%"#5'C,DE,'

3#"+(*;&'FG:'6''H)%",2#'%(*")I&'<8:6'A#"+(*;'-)35(77& <F:

Vulnerabilities in iOS and Android OS

November 20-21, 2019Qualys Security Conference4

J(K,I#'LM''2#35(*&''/*#)"#5''%)"/-#&'7(*''

>6>G> &#/1*,".''21I3#*)K,I,",#&

Mobile Device Technology Stack

November 20-21, 2019Qualys Security Conference5

Mobile Device Attack Surface

November 20-21, 2019Qualys Security Conference6

Mobile Ecosystem

7

Device Platforms

,LM

J)/ LM

!%%I# C)"/-

!%%I# NO

C,35(+& >=

!35*(,5 LM

!35*(,5 N-,34&

!35*(,5 NO

H-*($# LM

C#)* LM

P#I#)&#5 P#I#)&#5

Mobile Security Solutions

November 20-21, 2019Qualys Security Conference9

QJJRBQJ

S !"#$%&%'$()*+*,$-$+.

S)/)S 0"1"2"'".&S !%%'M"(*#S H(3"),3#*,T)",(3S U3"#4*)",(3'+,"-'!%%I#6'V((4I#')35'J,/*(&(7"'#/(D&.&"#$&

J(K,I#'N-*#)"'W#7#3&#

S/$3"%$(4 56(3$71"8+19(1$%:7".&(:;<*.$9(1&1.$-(;*7*-$.$719(<$3"%$(%8+#",:7*."8+9(#"7-=*7$

S56(0:'+$7*2"'"."$1

S A#"+(*;'OJS !%%'OJ'X J!NW'

J(K,I#'QYY

S !3",DO,*1&S !3",DJ(K,I#'Y-,&-,34

S W#2,/#'!"")/;'Y*("#/",(3

S H(3"#3"'E,I"#*,34

J(K,I#'Y(I,/.'H($%I,)3/#

! U3"#4*)",(3'+,"-'YH'$(51I#'7(*''AUMN6'VWYP6'HUM6'YHU')35'*#&"

S !%%'H($%I,)3/#S W#7,3#'P1I#&

Q3"#*%*,&#'U3"#4*)",(3&

! J(K,I#'U5#3",".')35'!//#&&'J)3)4#$#3"

SJ(K,I#'U37(*$)",(3'Y*("#/",(3')35'H(3"*(I

SJ(K,I#'V)"#+).')35'!//#&&'Y*("#/",(3

10

Complete Visibility

U3')'&,34I#'%)3#'(7'4I)&&6'4),3'"-#'2,&,K,I,".'(7')II'$(K,I#'5#2,/#&@

11

Integration with Global Asset Inventory

W#2,/#&'#3*(II#5',3'MQJ'+,II'4#"'I,&"#5',3'VI(K)I'!&&#"'U32#3"(*.

November 20-21, 2019Qualys Security Conference12

Introducing VM for Mobility (Beta)

U3')'&,34I#'%)3#'(7'4I)&&6'4),3'"-#'2,&,K,I,".'(7')II'21I3#*)KI# $(K,I#'5#2,/#&

U3,",)I'*#I#)&#',3/I15#'5#2,/#DK)&#5'"-*#)"&D !35*(,5')35',LM'LM'21I3#*)K,I,",#&'D W#"#/",(3'(7'*(("#5RZ),IK*(;#3'5#2,/#&D Q3/*.%",(3'&")"1&

November 20-21, 201913

Visibility into Security Posture

November 20-21, 201914

Vulnerabilities

M)$#'1&#*'#[%#*,#3/#')&')3.'("-#*')&&#"',3'\1)I.&

Active Device Operations

November 20-21, 2019Qualys Security Conference15

N-#&#')/",(3&'-#I%&'.(1'"('$)3)4#')35'%*#2#3"'"-#'5)")'I(&&'%*#&#3"'(3'"-#'$(K,I#'5#2,/#

Capabilities and Roadmap

November 20-21, 2019Qualys Security Conference16

N(5).

Qualys Security Conference16

S O,&,K,I,".S U32#3"(*.S L2#*'>=='5)")'%(,3"&',35#[#5

S U3"#4*)",(3'+,"-'VI(K)I!U

\>R\<'<=<=

November 20-21, 2019

S ,LM'!4#3"'P#I#)&#

S LM'O1I3#*)K,I,",#&

S !%%'21I3#*)K,I,",#&']Y)*"'>^']_#")^

\FR\`'<=<=')35'I)"#*

S Y(I,/.'H($%I,)3/#S HUM6'AUMN6'AU!Y6'LC!MY'N(%'>=

S !%%'21I3#*)K,I,",#&']Y)*"'<^']_#")^

S !%%I,/)",(3'J)3)4#$#3"'Y-)&#'>']_#")^

S !EC']_#")^S WQY']_#")^

a

S U3"#4*)",(3'+,"-'("-#*'QJJ

S b#*('N*1&"S Q3"#*%*,&#'H(33#/"(*&

S !4#3"I#&&

QUALYS SECURITY CONFERENCE 2020

Thank YouJimmy Graham

jgraham@qualys.com

top related