SlideShare uma empresa Scribd logo
1 de 10
Appthority
Appthority
Appthority helps people learn what apps do and what risks they contain




             The Authority in App Security™

“Yes, You Can Have Federal Grade Mobile Data Security
Too!”
                           Appthority © Copyright 2012 All Rights Reserved                   1
          contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority
Most Innovative of RSA Award
Named “The Most Innovative Company of RSA Conference® 2012”




“Appthority and its Appthority Platform won the award based on the current
and future need to secure mobile applications, as well their ability to build an
established partner network and demonstrate robust customer traction.”
– RSA Innovation Sandbox Judging Committee
                             Appthority © Copyright 2012 All Rights Reserved                   2
            contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority team
Appthority
Management team from such companies as




With top notch investors with backgrounds funding successful Enterprise
security companies
                                                  Steve Krausz invested in such Enterprise security
                                                  companies as CheckPoint Software, Imperva, Vontu,
                                                  ThreatMetrix, Trusteer, and CipherTrust



                                                  Ray Rothrock invested in such Enterprise security
                                                  companies as CheckPoint Software, Imperva, Vontu,
                                                  PGP, WholeSecurity, RedSeal, CoreTrace, and
                                                   CloudFlare
                            Appthority © Copyright 2012 All Rights Reserved                           3
           contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority challenges
Customer
Enterprises can’t create or enforce mobile policy nor comply with
regulatory requirements if they don’t know what risks the apps contain
  • Explosion in apps and exponential growth in malware
  • Existing mobile security expertise scarce within the Enterprise
  • No one knows which apps are safe
  • Legacy security technologies are not keeping up with the
    changes in mobile
  • New apps being released faster than they can be manually
    reviewed
  • Cost to determine if an individual app is safe is prohibitively
    expensive and everyone has a different opinion of “safe”



                            Appthority © Copyright 2012 All Rights Reserved                   4
           contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority
Why use Appthority in EASE?
Before distributing apps inside the Enterprise, the apps need to be checked
by Appthority
  • Best-in-class behavior-based malware detection
      •   Works on Android and iOS apps
      •   Reduces supply-chain risk from third-party app developers
      •   Superior protection when paired with Mocana- Appthority keeps
          malware away from VPN clients
  • Risk management approach to screening mobile apps
      •   Allows Enterprises to reject or adjust apps that don’t meet Enterprise
          policy
      •   Helps Enterprises understand what the mobile apps are really
          doing and what Enterprise data they have access to
      •   Easy-to-use Appthority App Inspection within EASE


                            Appthority © Copyright 2012 All Rights Reserved                   5
           contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority Platform
Appthority
Only Appthority can scan iOS apps for malware & risky behaviors seen in
Android
  • Screens mobile apps (Android and iOS) in minutes, in
    the cloud
  • Integrates w/ Enterprise solutions like Apperian and Mocana
  • Detects attributes in apps, such as:
      •   Malware (behavior-based NOT hash-based, detects new & never
          before seen malware)
      •   Location tracking (even without permission)
      •   Ad networks
      •   Data leakage risks
      •   Cryptographic risks



                            Appthority © Copyright 2012 All Rights Reserved                   6
           contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority in Apperian
Workflow
Simply click the magnifying glass in the Apperian Applications console to
begin inspecting apps with Appthority! Contact your Apperian account
manager for eval access today!




 Best practice: Before distributing apps to employees, ensure you’ve
                               Appthority © Copyright 2012 All Rights Reserved                7
 inspected contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
           the apps!
Appthority
Example inspection report




                      Appthority © Copyright 2012 All Rights Reserved                   8
     contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority and best practices
Summary
Don’t distribute software within the Enterprise, without inspecting what the
software does!
  • All apps should be inspected, for malware and policy
    compliance, prior to:
      •   Distributing the apps into the Enterprise
      •   Adding VPN clients into the apps
  • Appthority helps organizations answer:
      •   Are third-party file sharing systems like DropBox used by the app
      •   Does the app take the contact book off the device?
      •   Does the app location track users (with or without permission)?
      •   Is malware present?
      •   Does the app communicate with known sites that serve malware?



                             Appthority © Copyright 2012 All Rights Reserved                   9
            contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
Appthority
Q&A
Wrap-up and Q&A. Questions? Thank you!




                The Authority in App Security™

Thank you!
– Anthony Bettini, Founder & CEO, Appthority

                              Appthority © Copyright 2012 All Rights Reserved                   10
             contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com

Mais conteúdo relacionado

Destaque

Dian suprihatin pgmi vi-a
Dian suprihatin pgmi vi-aDian suprihatin pgmi vi-a
Dian suprihatin pgmi vi-aEva Zen
 
The next wave: understanding how IT developments are changing the future of m...
The next wave: understanding how IT developments are changing the future of m...The next wave: understanding how IT developments are changing the future of m...
The next wave: understanding how IT developments are changing the future of m...Erin Lyons
 
So You're Not a Doctor: Taking the Plunge into Medical Translation without an MD
So You're Not a Doctor: Taking the Plunge into Medical Translation without an MDSo You're Not a Doctor: Taking the Plunge into Medical Translation without an MD
So You're Not a Doctor: Taking the Plunge into Medical Translation without an MDErin Lyons
 
Presentation1[2]
Presentation1[2]Presentation1[2]
Presentation1[2]georgb2789
 
Small Art Promotion Update
Small Art Promotion Update Small Art Promotion Update
Small Art Promotion Update sdtwite
 
Обзор работы паевых фондов 19-26 сентября 2011
Обзор работы паевых фондов 19-26 сентября 2011Обзор работы паевых фондов 19-26 сентября 2011
Обзор работы паевых фондов 19-26 сентября 2011Sergey Manvelov
 
презентация массажных кресел
презентация массажных креселпрезентация массажных кресел
презентация массажных креселAndreykireenkov
 
4.3 port.-buford and my room
4.3 port.-buford and my room4.3 port.-buford and my room
4.3 port.-buford and my roompbwhite
 
Evaluation by lyon owen
Evaluation by lyon owenEvaluation by lyon owen
Evaluation by lyon owenSHubbard1
 

Destaque (15)

Dian suprihatin pgmi vi-a
Dian suprihatin pgmi vi-aDian suprihatin pgmi vi-a
Dian suprihatin pgmi vi-a
 
The next wave: understanding how IT developments are changing the future of m...
The next wave: understanding how IT developments are changing the future of m...The next wave: understanding how IT developments are changing the future of m...
The next wave: understanding how IT developments are changing the future of m...
 
Slide blog
Slide blogSlide blog
Slide blog
 
Fleming college
Fleming collegeFleming college
Fleming college
 
So You're Not a Doctor: Taking the Plunge into Medical Translation without an MD
So You're Not a Doctor: Taking the Plunge into Medical Translation without an MDSo You're Not a Doctor: Taking the Plunge into Medical Translation without an MD
So You're Not a Doctor: Taking the Plunge into Medical Translation without an MD
 
Presentation1[2]
Presentation1[2]Presentation1[2]
Presentation1[2]
 
Infectious // September // 2010
Infectious // September // 2010Infectious // September // 2010
Infectious // September // 2010
 
Small Art Promotion Update
Small Art Promotion Update Small Art Promotion Update
Small Art Promotion Update
 
CMA Sponsor PRG
CMA Sponsor PRGCMA Sponsor PRG
CMA Sponsor PRG
 
Ejemplo aplica zoom
Ejemplo aplica zoomEjemplo aplica zoom
Ejemplo aplica zoom
 
Обзор работы паевых фондов 19-26 сентября 2011
Обзор работы паевых фондов 19-26 сентября 2011Обзор работы паевых фондов 19-26 сентября 2011
Обзор работы паевых фондов 19-26 сентября 2011
 
презентация массажных кресел
презентация массажных креселпрезентация массажных кресел
презентация массажных кресел
 
Faridabad(1)
Faridabad(1)Faridabad(1)
Faridabad(1)
 
4.3 port.-buford and my room
4.3 port.-buford and my room4.3 port.-buford and my room
4.3 port.-buford and my room
 
Evaluation by lyon owen
Evaluation by lyon owenEvaluation by lyon owen
Evaluation by lyon owen
 

Mais de Apperian

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian WebinarApperian
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilityApperian
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiApperian
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with MocanaApperian
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityApperian
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityApperian
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldApperian
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19Apperian
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21Apperian
 
Applification of Business
Applification of BusinessApplification of Business
Applification of BusinessApperian
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Apperian
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE Apperian
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApperian
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now. Apperian
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDMApperian
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesApperian
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in RetailApperian
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them OutApperian
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseApperian
 

Mais de Apperian (20)

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian Webinar
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of Mobility
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roi
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great Opportunity
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM World
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21
 
Applification of Business
Applification of BusinessApplification of Business
Applification of Business
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
 
Pouring Cement on Mobile Devices
Pouring Cement on Mobile DevicesPouring Cement on Mobile Devices
Pouring Cement on Mobile Devices
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in Retail
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Federal Grade Security with Appthority

  • 1. Appthority Appthority Appthority helps people learn what apps do and what risks they contain The Authority in App Security™ “Yes, You Can Have Federal Grade Mobile Data Security Too!” Appthority © Copyright 2012 All Rights Reserved 1 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 2. Appthority Most Innovative of RSA Award Named “The Most Innovative Company of RSA Conference® 2012” “Appthority and its Appthority Platform won the award based on the current and future need to secure mobile applications, as well their ability to build an established partner network and demonstrate robust customer traction.” – RSA Innovation Sandbox Judging Committee Appthority © Copyright 2012 All Rights Reserved 2 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 3. Appthority team Appthority Management team from such companies as With top notch investors with backgrounds funding successful Enterprise security companies Steve Krausz invested in such Enterprise security companies as CheckPoint Software, Imperva, Vontu, ThreatMetrix, Trusteer, and CipherTrust Ray Rothrock invested in such Enterprise security companies as CheckPoint Software, Imperva, Vontu, PGP, WholeSecurity, RedSeal, CoreTrace, and CloudFlare Appthority © Copyright 2012 All Rights Reserved 3 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 4. Appthority challenges Customer Enterprises can’t create or enforce mobile policy nor comply with regulatory requirements if they don’t know what risks the apps contain • Explosion in apps and exponential growth in malware • Existing mobile security expertise scarce within the Enterprise • No one knows which apps are safe • Legacy security technologies are not keeping up with the changes in mobile • New apps being released faster than they can be manually reviewed • Cost to determine if an individual app is safe is prohibitively expensive and everyone has a different opinion of “safe” Appthority © Copyright 2012 All Rights Reserved 4 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 5. Appthority Why use Appthority in EASE? Before distributing apps inside the Enterprise, the apps need to be checked by Appthority • Best-in-class behavior-based malware detection • Works on Android and iOS apps • Reduces supply-chain risk from third-party app developers • Superior protection when paired with Mocana- Appthority keeps malware away from VPN clients • Risk management approach to screening mobile apps • Allows Enterprises to reject or adjust apps that don’t meet Enterprise policy • Helps Enterprises understand what the mobile apps are really doing and what Enterprise data they have access to • Easy-to-use Appthority App Inspection within EASE Appthority © Copyright 2012 All Rights Reserved 5 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 6. Appthority Platform Appthority Only Appthority can scan iOS apps for malware & risky behaviors seen in Android • Screens mobile apps (Android and iOS) in minutes, in the cloud • Integrates w/ Enterprise solutions like Apperian and Mocana • Detects attributes in apps, such as: • Malware (behavior-based NOT hash-based, detects new & never before seen malware) • Location tracking (even without permission) • Ad networks • Data leakage risks • Cryptographic risks Appthority © Copyright 2012 All Rights Reserved 6 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 7. Appthority in Apperian Workflow Simply click the magnifying glass in the Apperian Applications console to begin inspecting apps with Appthority! Contact your Apperian account manager for eval access today! Best practice: Before distributing apps to employees, ensure you’ve Appthority © Copyright 2012 All Rights Reserved 7 inspected contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com the apps!
  • 8. Appthority Example inspection report Appthority © Copyright 2012 All Rights Reserved 8 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 9. Appthority and best practices Summary Don’t distribute software within the Enterprise, without inspecting what the software does! • All apps should be inspected, for malware and policy compliance, prior to: • Distributing the apps into the Enterprise • Adding VPN clients into the apps • Appthority helps organizations answer: • Are third-party file sharing systems like DropBox used by the app • Does the app take the contact book off the device? • Does the app location track users (with or without permission)? • Is malware present? • Does the app communicate with known sites that serve malware? Appthority © Copyright 2012 All Rights Reserved 9 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com
  • 10. Appthority Q&A Wrap-up and Q&A. Questions? Thank you! The Authority in App Security™ Thank you! – Anthony Bettini, Founder & CEO, Appthority Appthority © Copyright 2012 All Rights Reserved 10 contact@appthority.com | +1 (855) 346-SAFE | @GetAppthority | www.appthority.com

Notas do Editor

  1. http://www.businesswire.com/news/home/20120228005949/en/Appthority-Named-%E2%80%9CMost-Innovative-Company-RSA%C2%AE-Conference