February 21, 2016 By Christopher Hockings 2 min read

Engaging with any IT vendor around mobile security will invariably lead to the conclusion that there are many tools available. It’s at this time that some simple qualification can determine whether the vendor has a solution that addresses your enterprise requirements.

Mobile solution proliferation is driven by that fact that humans want to engage with systems through devices of their choice. The personas they take on within an enterprise, as well as the devices they use in that environment, impact the ideal solution. Humans, after all, are employees, contractors and customers, and the value of the data to which these personas have access varies greatly. So it’s not a one-size-fits-all proposition.

Mobile Security Solutions

Within the mobile security domain, there are solutions for application scanning and protection, access management technologies, fraud protection, mobile device management and others. It’s when these technologies are used together that they address two key areas of mobile security solutions.

1. Enterprise Mobility

With solutions such as IBM Security’s MaaS360 and VMWare’s Airwatch solution, the objective is to keep enterprise data safe. Gartner named this realm enterprise mobility management.

There are adjacencies to this technology, such as identity and access management and hybrid development platforms, that support the same objective. However, they are designed mainly for providing a safe environment for employees to access mobile enterprise services.

2. Consumer Mobility

Solutions that securely enable consumers to access available services aim to delight customers with a user experience consistent with their device of choice. Solutions that support such an objective include access management and API management technologies, as well as traditionally native development tools with pluggable software development kits. Banks delivering solutions to their customers, for example, will also be interested in providing integrated fraud protection solutions.

In an era where having a proliferation of tools provides more opportunities for adversaries to exploit weaknesses, these simple considerations can set the course for selecting a set of technologies designed to address your requirements. Assessment of viable solution stacks should ensure a clear set of use cases are documented so that your vendor proposes the correct set of technologies.

How to Learn More

Join me in a panel session at InterConnect 2016 titled “Customer Experience Panel on Access Management for Enterprise Mobility.” There, I will host IBM Security customers who will share their experiences with this range of technologies. I hope to demystify the mobile security domain so attendees can chart a clear course for their enterprise requirements.

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today