Top Banner
Mobile security in the B2C Market: Mobile App Protection and Fraud Prevention Pedro Hernández 20 th June 2019 Bangkok, Thailand
19

Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

Jun 24, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

Mobile security in the

B2C Market: Mobile App

Protection and Fraud

Prevention

Pedro Hernández

20th June 2019

Bangkok, Thailand

Page 2: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention
Page 3: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention
Page 4: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention
Page 5: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention
Page 6: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention
Page 7: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

Service Providers have to take a Mobile First Approach to address the Consumers

There is a Diversity of Devices on the hands of the consumers and Service Providers have to tackle it

With Security breaches, there is no way back: Once the paste is out can’t be put back in

Page 8: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

Options

Page 9: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

The OEM ecosystem route

Page 10: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

The WEB App route

Page 11: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

The hardened App route

Page 12: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

Neglecting “State-of-the-Art” technology in mobile appsExample: Insufficient security in mobile apps in German banks and the automotive industry

Source: “On App-based Matrix Code Authentication in Online Banking”, 2016https://securelist.com/analysis/publications/77576/mobile-apps-and-stealing-a-connected-car/

Page 13: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

Lack of Binary Protections

•97% of all apps tested lacked binary code protection: reverse engineer and decompile is possible exposing source code to analysis and tampering

Unintended Data Leakage

•90% of the apps tested shared services with other applications on the device: Data from the app accessible to any other application on the device

Insecure Data Storage

•83% of the apps tested insecurely stored data outside of the apps control allowing shared access with other apps; and, exposed a new attack surface via APIs

Weak Encryption

•80% of the apps tested implemented weak encryption algorithms allowing adversaries to decrypt sensitive data and manipulate or steal it as needed

Present day situation has not improved

Source: https://www.prnewswire.com/news-releases/analyst-report-financial-institutions-put-consumer-data-at-risk-by-failing-to-protect-mobile-apps-300822488.html

Page 14: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

Build38 Security Wheel

Secure

Storage

Key Protection

Manager

Fast En- &

Decrypt

HW-Backed

Storage

Attestation Emulator

Detection

Debugger

Detection

Jailbreak

Detection

iOS

Runtime

Integrity

Rooting

Detection

Android

Secure

Channel

API

Protection

Key

Management

Personalized

App Security

Management

T.A.K License

Mgmt.

Analytics

Device

Binding

File

Protector

ID

Protection

Bot

ProtectionApp control

(MAM)

Insights

Android

Re-packing

Anti-Cloning

Read what Gartner says about

our solution!

Market Guide for Application Shielding

Next future

threat …

Real-time

Trust Level

Confidential

Page 15: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

Top reasons for working with an App Protection Provider

Budget

Mobile market conformity – app security w/o the overhead of a MDM / MAM

▪ Automated app life cycle management

▪ Per app/devices basis: Steer application security and get insights

Speed

Provisioning

Meet timelines – time-to-market is crucial for success

▪ Fastest to integrate mobile application focused security SDK

▪ Designed with a developer mindset

▪ Developers focus is on app development, while mobile app security is built-in

Meet budget

▪ No need to engage expensive and scarce security specialist

Compliance Tick of security controls

▪ Meet regulatory or organizational compliance goals with one SDK

▪ Increase the security level of the mobile app on all Android and iOS devices

▪ Know what the apps are doing and react accordingly

Page 16: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

The client and cloud framework allows real time risk and fraud prevention for real time decision making

T.A.K I/F

Fraud Mgmt.

Mobile App

Business Logic

T.A.K Client Library

Service Provider

Trusted Application Kit by Build38

T.A.K Cloud Insights & Analytics Build System

App Backend Dashboard Dev. & CI

API

Faster than Anyone Else

Build, Test, DeployREST based API for integration

into DevOps cycle for

continuous integration

Knowledge is Power

Insights & AnalyticsInformation gain: know what

your device base is doing. Fight

threat and fraud early.

Trust is Essential

Control is betterBase your decision on an

outside opinion, and not what

the app tells you

Closer to the customer

Quick issue responseMulti-channel Service Mgmt.

Scale fast, easy setup

Automated InfrastructureInfrastructure-as-Code (IaC,

Terraform)

Page 17: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

Overview of companies who trust our solution

3

Consortium of:Authentication

Transit

Energy

Automotive

and more

Read what Gartner says about

our solution!

Market Guide for Application Shielding

Note: Not allowed to show all logos of customers

multi-million Apps already

secured for large APAC

energy retailer

Page 18: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

THE ONE essential security solution for Mobile Apps and Assets

On the device In your backend For your SOC Against Fraud

▪ Self defending App

protects itself

▪ Platform agnostic

▪ Security for keys,

data, and code

▪ Transparent usage for

the customer

▪ Secure channels to

unsecure devices

▪ Anti cloning for IDs

▪ API protection

▪ Personalisation per

App (and user)

▪ Password less FIDO

▪ 3rd Factor security

▪ Mobile application

management

▪ Threat detection

▪ Insights on trust levels

and attacks

▪ Backchannel for the

self defending App

▪ Real time monitoring

▪ Social engineering

disabled by 3rd factor

security

▪ Trust level KPIs

▪ Strong authentication

▪ GDPR compliance

enablement

Page 19: Mobile security in the B2C Market: Mobile App Protection ... › app › webroot › content_files › 13 › files › PPT … · B2C Market: Mobile App Protection and Fraud Prevention

Your contact person for questions about our solution. We are looking forward assessing your eco-system with you

Pedro HernándezManaging Director APAC and Co-Founder

+65 9003 5357

[email protected]

www.build38.com

www.linkedin.com/in/pedro-hernandez-pena/

Meet us:

Cybertech Asia | Bangkok | 19-20.06.2019

RSA APJ | Singapore | 16-18.07.2019

itsa | Nürnberg | 8.-10.10.2019

IOT Solutions World Congress | Barcelona | 29.-31.10.2019