Top Banner
MOBILE CARE EVERYWHERE 1 Securing the Mobile Enterprise CyberTechLA – June 30, 2016 Itai Bass VP Business Development CommuniTake Technologies Inc. [email protected]; (650) 515-3578
15

IntactPhone: Securing the Mobile Enterprise

Jan 17, 2017

Download

Documents

Itai Bass
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IntactPhone: Securing the Mobile Enterprise

MOBILE CARE EVERYWHERE

1

Securing the Mobile Enterprise

CyberTechLA – June 30, 2016

Itai Bass

VP Business Development

CommuniTake Technologies Inc.

[email protected]; (650) 515-3578

Page 2: IntactPhone: Securing the Mobile Enterprise

2 Proprietary of CommuniTake

Page 3: IntactPhone: Securing the Mobile Enterprise

© 2016 COMMUNITAKE TECHNOLOGIES Intellectual Property. All rights reserved.

You will

Ever saw a malware in close-up?

Page 4: IntactPhone: Securing the Mobile Enterprise

Devices

Users

Networks

Applications

Page 5: IntactPhone: Securing the Mobile Enterprise

© 2016 COMMUNITAKE TECHNOLOGIES Intellectual Property. All rights reserved.

enforce patching <10%

have non-compliant device >52%

deploy anti-malware <5%

have jailbroken device 1/10

>20% Remove PW / MDM

Page 6: IntactPhone: Securing the Mobile Enterprise

6 Proprietary of CommuniTake

THE INTACTPHONE

Page 7: IntactPhone: Securing the Mobile Enterprise

Hardened Device

Secure Firmware

Proprietary of CommuniTake

Encrypted Dialog

Command Center

Page 8: IntactPhone: Securing the Mobile Enterprise

Anti-malware

Remote Control

Groups’ Policies

Self-Repair

Page 9: IntactPhone: Securing the Mobile Enterprise

HARDWARE OF TRUST

SECURE BOOT

INTACT ROM UTILITIES

INTACT ROM ENHANCEMENTS

SECURE COMMUNICATIONS

GENERIC DEVICE MANAGEMENT

INTACT APPLICATIONS

Page 10: IntactPhone: Securing the Mobile Enterprise

Blocking Known Trojans Same-day Patches

Encrypted Communications

Administrating Use Governing Content

Omni-Resources Control

Crowd Analysis

Managing Connectivity

& Apps Permissions

Abstracting Resources

& Push Notifications

Internal Encryption

Page 11: IntactPhone: Securing the Mobile Enterprise

The most secure platform Multi-tiered Omni-protection

Built from the ground up Advanced security tool-set

Page 12: IntactPhone: Securing the Mobile Enterprise

Secure

Device

Safe

Dialog

Cloud

& On Prem Central

Governance

Productivity BYOD

& Privacy

Page 13: IntactPhone: Securing the Mobile Enterprise

© 2016 COMMUNITAKE TECHNOLOGIES Intellectual Property. All rights reserved. 13

WHO SHOULD USE IT?

Any organization which the risk and implication of compromising their mobile data

(internal or customer’s) is significant:

Publicly trading companies

Financial services (banking, investment, wealth management…)

Professional services to individuals & companies (law firms, auditing, accounting…)

Critical infrastructure (power/water utilities, airports, seaports, mass transport…)

Executive/Celebrity protection services

Physical security operators (G4S...)

Government and local government organizations

Page 14: IntactPhone: Securing the Mobile Enterprise

MOBILE CARE

MOBILITY MANAGEMENT

MOBILE SECURITY

Founded in 2009; Privately held; Offices in the US; China; Italy; & Israel.

MOBILE CARE EVERYWHERE

INTERNET OF THINGS

14

We craft security, care and management solutions to provide people and businesses better more secure device use

Page 15: IntactPhone: Securing the Mobile Enterprise

Thank you.