Dealing With Enterprise Mobile Security

Cyber-criminals were recently seen targeting BlackBerry and Symbian devices to steal authentication data from online banking customers – another example of mobile devices being on attackers’ radars.

Still, security experts agree most of the threats to mobile devices come in the form of people losing their devices or having them stolen. Rather than dealing with malware, the primary challenge for enterprise mobile security is figuring out how to best manage the plethora of devices employees can bring on to the network.

The number of players in the mobile market presents a challenge. Research from IDC reported Symbian held a 40 percent share of the market during the first half of the year, but also put BlackBerry, Apple iOS and Android at a combined 50 percent.

Handling mobile threats

From a management perspective, organisations have three options, Gartner analyst Eric Maiwald said.

“One – use the BlackBerry Enterprise Server,” he said. “BES only manages BlackBerry devices but it gives you the best management system. Two – use Exchange and ActiveSync. This will work for any device that includes an ActiveSync agent. However, it provides limited capabilities – you can verify authentication and encryption prior to allowing the device to connect and you can remotely wipe the device – and you have to rely on the device to tell you about itself.”

The third option is to use third-party management products, which come in three major flavours: products focused on the security configuration of devices; messaging products, which typically deploy their own agent to send and receive email securely; and service management technology focused “on the quality of service for the device” that provides a detailed view of the device and its configuration, Maiwald said.

“Basically, what I am saying is that you need to understand what you are trying to do: what is your policy, what is the goal for the management product, and what devices do you want to manage,” he said.

Best practice

Having a mobile device management strategy to enforce on devices other than BlackBerry is a common gap in enterprises, Gartner analyst John Pescatore said, as is having a definition of what minimal security policies need to be enforced.

Best practices include having the ability to wipe a device remotely, as well as policies around encryption and passwords, Kevin Mahaffey, CTO of mobile security firm Lookout, told eWEEK.

“A password is the first line of defense to prevent thieves or casual snoops from accessing sensitive data on a smartphone,” he said. “While a password won’t necessarily stop the most determined attackers, it can go a long way in keeping sensitive data safe. Some phones can set policy to automatically erase the device if an incorrect password is entered too many times.”

Page: 1 2

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Share
Published by
Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved
Tags: Android

Recent Posts

Intel Chief Flattens Leadership Structure

New Intel chief executive Lip-Bu Tan flattens company's leadership structure as he seeks to end…

16 mins ago

Google To Appeal Portions Of Ad Monopoly Ruling

Google says it will appeal 'adverse' portions of ruling that found its ad business is…

45 mins ago

TSMC Denies Talks With Intel Over Chipmaking Joint Venture

Denial from TSMC, after multiple reports it was in talks with Intel over a joint…

3 days ago

Apple iPhone Shipments In China Slide, As Cook Talks With Trump Official

CEO Tim Cook talks to Trump official, as IDC notes China's smartphone market growth, and…

3 days ago

AMD Warns Of $800m Charge From US Chip Restrictions On China

Another big name chip maker expects a hefty financial charge, after the US tightened rules…

3 days ago

Google Digital Ad Network Ruled Illegal Monopoly By Judge

More bad news for Google. Second time in less than a year that some part…

4 days ago