rethink your mobile security - cdn-cybersecurity.att.com

1
© 2021 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. The information contained herein is not an offer, commitment, representation, or warranty by AT&T and is subject to change. 1 APWG. 2020. Phishing Activity Trends Report: 4th Quarter 2020. Anti-Phishing Working Group. Retrieved March 25, 2020 from https://apwg.org/trendsreports/ 2 Handley, L. 2019. Nearly three quarters of the world will use just their smartphones to access the internet by 2025. CNBC, Jan 24 2019. Retrieved March 23, 2021 from https://www.cnbc.com/2019/01/24/smartphones-72percent-of-people-will-use-only-mobile-for-internet-by-2025.html 3 Christian, P. 2020. Risky business: survey shows majority of people use work devices for personal use. Malware Bytes Lab, October 8, 2020. Retrieved June 1, 2021 from https://blog.malwarebytes.com/malwarebytes-news/2020/10/work-devices-for-personal-use/ Today’s enterprise demands a security approach that protects company data on any device - equally and comprehensively. Rethink your mobile security As mobile capabilities expand the workplace beyond enterprise walls, employees, companies, and their customers face a landscape of ever-evolving risk and new cybersecurity demands. How protected are you? Do your users access sensitive data or public clouds such as your CRM from their mobile devices? Are you effectively protecting mobile users against phishing via SMS, QR codes, and social media apps? Do you have near-real-time visibility into threats and vulnerabilities? Is mobile threat detection integrated into your overall security posture? In a mobile world, phishing is the primary threat vector… And your workforce is increasingly mobile... Understanding the gap in traditional security architecture Efficiently integrate mobile endpoint protection and response within and across your enterprise. Closing the mobile security gap AT&T and Lookout Comprehensive cybersecurity that protects data accessed by mobile endpoints. SMS You've got a package that you haven't picked up. Click here: linkto.com/badending ! Observed phishing attacks quadrupled in 2020.¹ Did you know your employees are performing company business on personal devices? Are you meeting compliance requirements by ensuring the apps your users download do not leak data? Provide continuous visibility and near-real-time analysis of all mobile devices and network connections. Deliver mobile zero trust by continuously assessing endpoint risks and restricting access to unhealthy devices, permitting only those with acceptable risk level. Help prevent human error by utilizing machine learning, Artificial Intelligence, and the largest mobile threat dataset to provide on-device threat remediation. Prioritize “privacy by design” at every level, proactively anticipating concerns before they arise while respecting user privacy. EXPERTISE Experienced, certified consultants take the time to understand your unique environment and implement policies and solutions that align with your business needs. INTEGRATION Quickly establish or scale your mobile security program while minimizing cost and complexity – enhancing your mobile security maturity with equal and comprehensive protection. SUPPORT The AT&T Customer Support Desk supports your mobile security solution 24x7. Exposing your data to gaps in your mobile security… ! DASHBOARD 200,000,000 31,728 PROTECTED GLOBALLY MOBILE APPS PROTECTED IN YOUR FLEET 100% 1531 CONNECTED DEVICES DEPLOYMENT STATUS DEPLOYMENT RISK High Risk : Moderate Risk : Low Risk : Healthy : 15% 40% 25% 20% APP ANALYSIS Address Book : SMS Archives : Contacts : 28% 15% 31% Out of Date (iOS) Out of Date (Android) Known Vulnerabilities CVEs VULNERABILITY SUMMARY 12% 41% 72 Contact your AT&T representative to learn more about how AT&T and Lookout can secure your mobile enterprise and click here to read more. × × × of users do personal work from work devices.³ of internet users will access the web solely via their smartphone by 2025.² 72.6% © 2021 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design®, SCREAM®, and SIGNAL FLARE® are registered trademarks of Lookout, Inc. in the United States and other countries. EVERYTHING IS OK®, LOOKOUT MOBILE SECURITY®, POWERED BY LOOKOUT®, and PROTECTED BY LOOKOUT® are registered trademarks of Lookout, Inc. in the United States; and POST PERIMETER SECURITY ALLIANCE™ and DAY OF SHECURITY™ are trademarks of Lookout, Inc. All other brand and product names are trademarks or registered trademarks of their respective holders. 4x MOBILE APPS THAT ACCESS: 70% iOS : Android : Chrome :

Upload: others

Post on 11-Jun-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Rethink your mobile security - cdn-cybersecurity.att.com

© 2021 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. The information contained herein is not an offer, commitment, representation, or warranty by AT&T and is subject to change.

1 APWG. 2020. Phishing Activity Trends Report: 4th Quarter 2020. Anti-Phishing Working Group. Retrieved March 25, 2020 from https://apwg.org/trendsreports/2 Handley, L. 2019. Nearly three quarters of the world will use just their smartphones to access the internet by 2025. CNBC, Jan 24 2019. Retrieved March 23, 2021 from https://www.cnbc.com/2019/01/24/smartphones-72percent-of-people-will-use-only-mobile-for-internet-by-2025.html3 Christian, P. 2020. Risky business: survey shows majority of people use work devices for personal use. Malware Bytes Lab, October 8, 2020. Retrieved June 1, 2021 from https://blog.malwarebytes.com/malwarebytes-news/2020/10/work-devices-for-personal-use/

Today’s enterprise demands a security approach that protects company data on any device - equally and comprehensively.

Rethink your mobile security

As mobile capabilities expand the workplace beyond enterprise walls, employees, companies, and their customers face a landscape of ever-evolving risk and new cybersecurity demands. How protected are you?

Do your users access sensitive data or public clouds such as your CRM from their mobile devices? Are you effectively protecting mobile users against phishing via SMS, QR codes, and social media apps?

Do you have near-real-time visibility into threats and vulnerabilities? Is mobile threat detection integrated into your overall security posture? 

In a mobile world, phishing is the primary threat vector… 

And your workforce is increasingly mobile...

Understanding the gap in traditionalsecurity architecture

Efficiently integrate mobile endpoint protection andresponse within and across your enterprise.

Closing the mobile security gap

AT&T and Lookout Comprehensive cybersecurity that protects

data accessed by mobile endpoints.

SMSYou've got

a package that you haven't picked up.

Click here:linkto.com/badending

!Observed phishing attacks quadrupled

in 2020.¹

Did you know your employees are performing company business on personal devices? Are you meeting compliance requirements by ensuring the apps your users download do not leak data?

Provide continuous visibilityand near-real-time analysis of all mobile devices and network connections.

Deliver mobile zero trust by continuously assessing endpoint risks and restricting access to unhealthy devices, permitting only those with acceptable risk level.

Help prevent human error by utilizing machine learning, Artificial Intelligence, and the largest mobile threat datasetto provide on-device threat remediation.

Prioritize “privacy by design”at every level, proactively anticipating concerns before they arise while respecting user privacy.

EXPERTISE

Experienced, certified consultants take the

time to understand your unique environment and implement policies and solutions that align with

your business needs.

INTEGRATION

Quickly establish orscale your mobile security program while minimizing

cost and complexity – enhancing your mobile security maturity with

equal and comprehensive protection.

SUPPORT

The AT&T Customer Support Desk supports your mobile

security solution 24x7.

Exposing your data to gaps in yourmobile security…

!

DASHBOARD

200,000,000 31,728PROTECTED GLOBALLY MOBILE APPS PROTECTED IN YOUR FLEET

100% 1531CONNECTED DEVICES

DEPLOYMENT STATUS DEPLOYMENT RISK

High Risk :

Moderate Risk :

Low Risk :

Healthy :

15%

40%

25%

20%

APP ANALYSIS

Address Book :

SMS Archives :

Contacts :

28%

15%

31%

Out of Date(iOS)

Out of Date(Android)

Known VulnerabilitiesCVEs

VULNERABILITYSUMMARY

12%41%

72

Contact your AT&T representative to learn more about how AT&T and Lookout can secure your mobile enterprise

and click here to read more.

×× ×

of users do personal work from

work devices.³

of internet users will access the web solely via their smartphone

by 2025.²

72.6%

© 2021 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design®, SCREAM®, and SIGNAL FLARE® are registered trademarks of Lookout, Inc. in the United States and other countries. EVERYTHING IS OK®, LOOKOUT MOBILE SECURITY®, POWERED BY LOOKOUT®, and PROTECTED BY LOOKOUT® are registered trademarks of Lookout, Inc. in the United States; and POST PERIMETER SECURITY ALLIANCE™ and DAY OF SHECURITY™ are trademarks of Lookout, Inc. All other brand and product names are trademarks or registered trademarks of their respective holders.

4x

MOBILE APPS THAT ACCESS:

70%

iOS :

Android :

Chrome :