Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Understanding the Risks and Value of Mobility to Your Stakeholders
It’s important to understand what your stakeholders are looking for out of mobility

The key to securing your mobility is to understand how it is being used in your environment and what is potentially at risk. Taking stock of the mobile devices, applications and traffic in your network is critical to identifying how your data and resources are potentially vulnerable.

Since mobile devices are being used to do more and more -the devices being carried around today are 3000 times more powerful than the compute power on the original space shuttle6 - the potential risks continue to increase. Once an attacker is "in" - tricking a user into downloading malware or a malicious app, infecting a Wi-Fi hot spot, exploiting a device vulnerability, in the operating system, hardware, configurations, etc. - they can do almost anything on the device and apps, including:

  • Intercept emails and text messages
  • Steal application data, including content within secure containers and wrappers
  • Capture browsing activity, including any usernames and passwords entered into sites
  • Extract contact lists, call and text logs
  • Activate the microphone (to listen in on private conversations and meetings)
  • Use the camera to take pictures or videos (white boards, manufacturing plant layouts, etc.)
  • Track location (where an executive is going could provide insights into potential customer deals or merger/acquisition plans, etc.) Stakeholders across your organization will likely view these risks differently and have different expectations around what is needed to effectively secure your data and resources. Since security is always a balancing act, requiring decisions on when and how to allow or shut down access, it's important to understand what your stakeholders are looking for out of mobility and what they are willing to accept in terms of security.

Stakeholders across your organization will likely view these risks differently and have different expectations around what is needed to effectively secure your data and resources. Since security is always a balancing act, requiring decisions on when and how to allow or shut down access, it's important to understand what your stakeholders are looking for out of mobility and what they are willing to accept in terms of security.

Role

What Mobility Represents to Them

Their Mobile Security Priorities

CISO

Business-level objective to improve agility and overall productivity.

Getting ahead of the evolving mobile threat landscape to prevent intellectual property loss, tough board-level discussions and lawsuits that:

  • Erode customer confidence
  • Tarnish brand reputation
  • Reduce competitive advantage

Audit & Risk Managers

An initiative that introduces risks that need to be quantified and managed.

Meeting compliance goals by adhering to security best practices and putting measures in place that reduce the attack surface.

Audit & Risk Managers

An initiative with a lot of moving parts out of their control. Need to support:

  • BYOD
  • New mobile application roll outs
  • Ongoing management and maintenance of mobile policies

Improving visibility to better manage mobile devices and applications and reduce risks to ensure alignment with overall security policies and practices.

Security Team

An initiative that opens up a lot of new threat vectors that need to be managed and mitigated to keep resources safe and prevent data leakage.

Effectively assessing mobile risks, integrating mobile intelligence into security information and event management (SIEM) and network access control (NAC) systems, and consistently applying policies, regardless of how or where a user accesses resources.

Employees

The convenience of being able to work whenever and wherever they are located.

Protecting their privacy and preserving a simple, good user experience.

About Michael Shaulov
Michael Shaulov is CEO and co-founder of Lacoon Mobile Security. He’s responsible for the direction of the company, with a maniacal focus on adding the security organizations need to effectively leverage mobility. He is a recognized industry speaker, delivering talks at BlackHat EU, BlackHat USA and Infosec.

Prior to founding Lacoon, Michael co-founded BlueRidge Storage Systems and founded and led the Mobile Intrusive Interception team for the security division of NICE Systems LTD. Before his commercial endeavors, he pioneered the mobile security field in an elite military technological unit, where he received the Israeli Presidential Excellency Honor for his contributions. He holds a BSc in Computer Sciences and Physics from Ben-Gurion University, Israel.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

Latest Cloud Developer Stories
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions n...
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructur...
When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. "Fly two mis...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performa...
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE