![Page 1: Do You Know If Your Android Devices Are SAFE?](https://reader034.vdocument.in/reader034/viewer/2022052523/5561b9abd8b42a9f2f8b4c10/html5/thumbnails/1.jpg)
Samsung / Apperian
![Page 2: Do You Know If Your Android Devices Are SAFE?](https://reader034.vdocument.in/reader034/viewer/2022052523/5561b9abd8b42a9f2f8b4c10/html5/thumbnails/2.jpg)
The critical question facing mobile businesses today
How do we protect corporate data on hundreds and thousands ofmobile devices – especially if we don’t own them?
• Companies deploying appswith sensitive and proprietarycorporate data
• > 50% of the US workforce
owns their own smartphone
• 61% of global enterprisessupport use of personaldevices
Data source: Gartner;Forrester
![Page 3: Do You Know If Your Android Devices Are SAFE?](https://reader034.vdocument.in/reader034/viewer/2022052523/5561b9abd8b42a9f2f8b4c10/html5/thumbnails/3.jpg)
Securing apps and data – not just the device
MAM and some MDM solutions offer a variety of basic appmanagement capabilities, including:
• Delete remotely• Device wipe and/or lock• Malware inspection
But real app security requiresa more focused effort …
… encrypting and protecting data at theapp level, not the device or OS
![Page 4: Do You Know If Your Android Devices Are SAFE?](https://reader034.vdocument.in/reader034/viewer/2022052523/5561b9abd8b42a9f2f8b4c10/html5/thumbnails/4.jpg)
• Requires integration at the time of app development• Updating security policies requires development• Does not support pre-existing or developed apps
• Performance and battery hog• Separates data – doesn’t secure it• Separates & divides the native user experience
Mobile app security: key comparisons
Virtual Machines
Integrated SDKs
• Cannot enforce policies on individual apps & users• Separates & divides the native user experience• Multiple apps within a “Super App”
Sandboxes /Containers
• No development or source code access required• Fine-grained policies down to individual apps & users• Maintains native user experience
App Policies
Use API's to add securityinto app at development
time
Installation of secondaryOS on device – apps run
within this VM
Multiple apps run within asingle, secured container
Security policies wrappedor injected into compiled
app
Technology Description Considerations
✗
✗
✗
✓
![Page 5: Do You Know If Your Android Devices Are SAFE?](https://reader034.vdocument.in/reader034/viewer/2022052523/5561b9abd8b42a9f2f8b4c10/html5/thumbnails/5.jpg)
Apperian app policies … powered by Mocana
wrapped around individual mobile apps
• Uses FIPS 140-2 certified encryption and SuiteB algorithms
• Enables:o Separation of enterprise & personal datao “Bring Your Own Device” to worko Protection of enterprise datao Native user experience
(a) App-Level Data Encryption(b) App-Level VPN(c) App-Level Passcode(d) App-Level Copy/Paste Protection
![Page 6: Do You Know If Your Android Devices Are SAFE?](https://reader034.vdocument.in/reader034/viewer/2022052523/5561b9abd8b42a9f2f8b4c10/html5/thumbnails/6.jpg)
Apperian app policies – a deeper look
Security andUsage Policies Capability
• Accomplished through a fully-automated technique called “App Wrapping”
• Supports managed & unmanaged devices:
o Internal employee facing apps
o Customer/Partner Apps (B2C, B2B)
![Page 7: Do You Know If Your Android Devices Are SAFE?](https://reader034.vdocument.in/reader034/viewer/2022052523/5561b9abd8b42a9f2f8b4c10/html5/thumbnails/7.jpg)
Let’s see how this all actually works…
DEMO