July 27, 2015 By Michael Ambrose 2 min read

When we think of mobile security, the first thought that pops into our heads is securing the device and the content on the device. While this approach has worked well for many companies in the mobile security space, it covers only 20 percent of the threat. To understand why we need to look beyond just securing the device, we must understand how a mobile device gets compromised.

This short video depicts a scenario in which a device can be hacked:

https://youtube.com/watch?v=9O5tLGGnapQ

Why Should Enterprises Care About Mobile Security?

To answer the question of why enterprises should care about mobile security, we have to look at some of the recent trends with regards to adoption of bring-your-own-device (BYOD) policies across large enterprises. Managing mobile devices that run on different operating systems and platforms, while at the same time ensuring intellectual property and information is kept secure, becomes the top priority for a chief information security officer (CISO).

If we were to provide mobile security at an enterprise-wide level, we would need to look beyond just securing the devices and the content. Gone are the days when employees would be happy with access to only email on their devices. Today, sales and marketing professionals must be agile in the field and have access to various enterprise applications on the go.

What Matters to CISOs?

What aspects would a CISO need to consider when planning to implement a comprehensive enterprise mobile security strategy?

An effective mobile security solution will offer a holistic approach to securing the four imperatives of enterprise mobility: the device; the enterprise content and data stored on it; the mobile applications used for employee productivity; and the access and fraud concerns inherent with the devices. Underlying this is an additional layer of protection and visibility through security intelligence. Only by addressing all four imperatives can a company truly deploy a comprehensive mobile strategy and protect the assets and reputation of the enterprise.

Take a look at this video, which explains the mobile security framework and its importance:

https://youtube.com/watch?v=u-AOq3k6Nfo

Deeper Into the Framework

Now that we have an overview of the framework, let’s take a closer look at the four imperatives: protect devices; secure content and collaboration; safeguard applications and data; and manage access and fraud. We will also examine the underlying security intelligence layer in a little more detail, as well.

Here’s what security leaders should be focusing on as they construct their mobile security framework and ensure the imperatives are addressed:

  • Protect Devices: Securing phones, tablets, laptops and other machines includes the management of multi-OS mobile devices while mitigating risks that arise from lost or compromised devices.
  • Secure Content and Collaboration: Protecting information ensures that enterprise and personal data are separated while enforcing compliance with security policies.
  • Safeguard Applications and Data: Applications can now be developed with security by design so enterprise applications may be distributed and controlled without any threats.
  • Manage Access and Fraud: Identity management and antifraud efforts identify users and protect mobile sessions with customers, business partners and temporary workers that are not part of the enterprise mobile ecosystem.
  • Extend Security Intelligence: Leveraging security intelligence gives enterprises the ability to expand security information and event management (SIEM) to the mobile platform, thereby mitigating vulnerability.

Learn more about Securing the mobile enterprise

More from CISO

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today