When the iPhone was first introduced, Steve Jobs described it as “way smarter than any mobile device has ever been and super easy to use.” It’s no wonder that millions of iOS devices have since been deployed within the workplace, packed full of apps that fuel everyday communications, collaboration and productivity use cases.

Over time, organizations have not only grown accustomed to using iPhones and iPads for day-to-day processes, they’ve become dependent on them. With this in mind, IT and security leaders in charge of enabling productivity while securing smartphones and tablets must embrace these devices’ advantages responsibly. Adding to the complexity, they must also find a way to achieve security without disrupting an otherwise positive user experience that is exemplified by anytime, anywhere accessibility.

Swing for Visibility Into Mobile Activity

When considering the number of iOS devices that are being put to work, the various ways they’re being used, how far apart they’re located, and how they’re accessing a network, IT professionals have a lot to worry about. For this reason, it’s crucial to seek out an appropriate level of visibility. Optimally, an all-in-one display of this valuable information allows IT teams to understand user behavior on their devices — expanding beyond traditional mobile device management (MDM). For example, are employees using applications that could pose a potential threat to your organization?

When it comes to user app behavior, ask yourself: Do you have a strong understanding of the apps your mobile employees use most frequently? If you don’t have a way to assess the activity within your environment, it could be an app you know about or one you’ve never heard of. If it’s the latter, it would be good to know which users have the app and what level of activity has taken place.

Depending on what you uncover, the app might be completely normal — but there’s always a chance it’s not. Risky users might be using encryption to cover up their browsing history. Without seeing domain details for encrypted traffic, you have no way of knowing. Similarly, apps might be establishing local IP address connections on ephemeral ports. If that’s the case, and the device has corporate data on it, there’s a risk that other endpoints on the network could connect to it and swipe the proprietary data.

Strike With Control Over Risky User Behavior

Beyond visibility, IT professionals need a way to intervene at the most pivotal moments. If someone means to type in one URL, but ends up typing in another, are you certain the domain they’re navigating to is safe? Threat actors are aware of user error, and they commonly set up malicious sites to take advantage of those who may not check their spelling before they hit enter. That’s why it’s important to not only see device-specific web navigation activity, but to be able to act before problems arise.

To avoid mobile mishaps like this, IT and security leaders should invest in the appropriate threat defense capabilities to support the modern enterprise. No matter where your users are, what network they’re connected through or what they’re looking to do, it should be simple to take control if need be — whether you’re blocking, allowing or proxying traffic.

The Best of Both Worlds for Protecting iOS Devices

Built hand-in-hand with Apple, the Cisco Security Connector introduces a more granular level of visibility and control into corporate-owned iOS devices. This cloud-managed solution ensures that employees are protected and compliant at all times and wherever they go, and it can now be deployed and managed via IBM MaaS360 with Watson.

IT and security leaders can take advantage of this valuable integration by visiting the IBM Security App Exchange and downloading the Cisco Security Connector for MaaS360. To learn more about the IBM Security and Cisco partnership, visit the official alliance page.

Learn how Cisco and IBM are taking mobile security to the next level

more from Endpoint

IOCs vs. IOAs — How to Effectively Leverage Indicators

Cybersecurity teams are consistently tasked to identify cybersecurity attacks, adversarial behavior, advanced persistent threats and the dreaded zero-day vulnerability. Through this endeavor, there is a common struggle for cybersecurity practitioners and operational teams to appropriately leverage indicators of compromise (IOCs) and indicators of attack (IOAs) for an effective monitoring, detection and response strategy. Inexperienced security […]

TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware

Malware authors use various techniques to obfuscate their code and protect against reverse engineering. Techniques such as control flow obfuscation using Obfuscator-LLVM and encryption are often observed in malware samples. This post describes a specific technique that involves what is known as metaprogramming, or more specifically template-based metaprogramming, with a particular focus on its implementation […]