Dealing With Enterprise Mobile Security

Cyber-criminals were recently seen targeting BlackBerry and Symbian devices to steal authentication data from online banking customers – another example of mobile devices being on attackers’ radars.

Still, security experts agree most of the threats to mobile devices come in the form of people losing their devices or having them stolen. Rather than dealing with malware, the primary challenge for enterprise mobile security is figuring out how to best manage the plethora of devices employees can bring on to the network.

The number of players in the mobile market presents a challenge. Research from IDC reported Symbian held a 40 percent share of the market during the first half of the year, but also put BlackBerry, Apple iOS and Android at a combined 50 percent.

Handling mobile threats

From a management perspective, organisations have three options, Gartner analyst Eric Maiwald said.

“One – use the BlackBerry Enterprise Server,” he said. “BES only manages BlackBerry devices but it gives you the best management system. Two – use Exchange and ActiveSync. This will work for any device that includes an ActiveSync agent. However, it provides limited capabilities – you can verify authentication and encryption prior to allowing the device to connect and you can remotely wipe the device – and you have to rely on the device to tell you about itself.”

The third option is to use third-party management products, which come in three major flavours: products focused on the security configuration of devices; messaging products, which typically deploy their own agent to send and receive email securely; and service management technology focused “on the quality of service for the device” that provides a detailed view of the device and its configuration, Maiwald said.

“Basically, what I am saying is that you need to understand what you are trying to do: what is your policy, what is the goal for the management product, and what devices do you want to manage,” he said.

Best practice

Having a mobile device management strategy to enforce on devices other than BlackBerry is a common gap in enterprises, Gartner analyst John Pescatore said, as is having a definition of what minimal security policies need to be enforced.

Best practices include having the ability to wipe a device remotely, as well as policies around encryption and passwords, Kevin Mahaffey, CTO of mobile security firm Lookout, told eWEEK.

“A password is the first line of defense to prevent thieves or casual snoops from accessing sensitive data on a smartphone,” he said. “While a password won’t necessarily stop the most determined attackers, it can go a long way in keeping sensitive data safe. Some phones can set policy to automatically erase the device if an incorrect password is entered too many times.”

Page: 1 2

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

London Black Cabs Sue Uber In Latest Legal Tangle

More than 10,000 London black cab drivers sue Uber claiming company acted illegally to obtain…

23 mins ago

Electric Vehicle Turned Away From Hospital Car Park

Liverpool's Alder Hey children's hospital turns away electric car from car park due to 'fire…

53 mins ago

Russia Accused Of Cyberattack On Germany’s Ruling Party, Defence Firms

German foreign minister warns Russia will face consequences for “absolutely intolerable” cyberattack on ruling party,…

3 days ago

Alphabet Axes Hundreds Of Staff From ‘Core’ Organisation

Google is reportedly laying off at least 200 staff from its “Core” organisation, including key…

3 days ago

Apple Announces Record Share Buyback, Amid iPhone Sales Decline

Investor appeasement? Apple unveils huge $110 billion share buyback program, as sales of iPhone decline…

3 days ago

Tesla Backs Away From Gigacasting Manufacturing – Report

Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant

4 days ago