When we think of mobile security, the first thought that pops into our heads is securing the device and the content on the device. While this approach has worked well for many companies in the mobile security space, it covers only 20 percent of the threat. To understand why we need to look beyond just securing the device, we must understand how a mobile device gets compromised.
This short video depicts a scenario in which a device can be hacked:
https://youtube.com/watch?v=9O5tLGGnapQ
Why Should Enterprises Care About Mobile Security?
To answer the question of why enterprises should care about mobile security, we have to look at some of the recent trends with regards to adoption of bring-your-own-device (BYOD) policies across large enterprises. Managing mobile devices that run on different operating systems and platforms, while at the same time ensuring intellectual property and information is kept secure, becomes the top priority for a chief information security officer (CISO).
If we were to provide mobile security at an enterprise-wide level, we would need to look beyond just securing the devices and the content. Gone are the days when employees would be happy with access to only email on their devices. Today, sales and marketing professionals must be agile in the field and have access to various enterprise applications on the go.
What Matters to CISOs?
What aspects would a CISO need to consider when planning to implement a comprehensive enterprise mobile security strategy?
An effective mobile security solution will offer a holistic approach to securing the four imperatives of enterprise mobility: the device; the enterprise content and data stored on it; the mobile applications used for employee productivity; and the access and fraud concerns inherent with the devices. Underlying this is an additional layer of protection and visibility through security intelligence. Only by addressing all four imperatives can a company truly deploy a comprehensive mobile strategy and protect the assets and reputation of the enterprise.
Take a look at this video, which explains the mobile security framework and its importance:
https://youtube.com/watch?v=u-AOq3k6Nfo
Deeper Into the Framework
Now that we have an overview of the framework, let’s take a closer look at the four imperatives: protect devices; secure content and collaboration; safeguard applications and data; and manage access and fraud. We will also examine the underlying security intelligence layer in a little more detail, as well.
Here’s what security leaders should be focusing on as they construct their mobile security framework and ensure the imperatives are addressed:
- Protect Devices: Securing phones, tablets, laptops and other machines includes the management of multi-OS mobile devices while mitigating risks that arise from lost or compromised devices.
- Secure Content and Collaboration: Protecting information ensures that enterprise and personal data are separated while enforcing compliance with security policies.
- Safeguard Applications and Data: Applications can now be developed with security by design so enterprise applications may be distributed and controlled without any threats.
- Manage Access and Fraud: Identity management and antifraud efforts identify users and protect mobile sessions with customers, business partners and temporary workers that are not part of the enterprise mobile ecosystem.
- Extend Security Intelligence: Leveraging security intelligence gives enterprises the ability to expand security information and event management (SIEM) to the mobile platform, thereby mitigating vulnerability.
Learn more about Securing the mobile enterprise
Mobile Security Portfolio Marketing Manager, IBM