Mobile Security in the Enterprise

Mobile Security in the Enterprise

Modern Defense for the BYOD Environment

RELEASE DATE
13-Sep-2016
REGION
Europe
Research Code: MB20-01-00-00-00
SKU: IT03132-EU-MR_18964

$3,000.00

Special Price $2,250.00 save 25 %

In stock
SKU
IT03132-EU-MR_18964

$3,000.00

$2,250.00 save 25 %

DownloadLink

Pay by invoice

ENQUIRE NOW

Description

Mobile security has been largely ignored as something that can be addressed with EMM, MAM, and mobile AV solutions. However, mobile malware and well-crafted mobile configuration profiles can evade these solutions without rooting or jailbreaking the phone. Smartphone and tablet users are line-of-business workers and do not understand the risks of using ultra-mobile devices to access enterprise data. Improved awareness of the security risks and the next-generation solutions available for mobile devices will raise the security bar for enterprises, and protect jobs and entire economies from industrial espionage. Despite changing concerns about mobile device security, the issue remains one of the top 10 security threat concerns worldwide.

Table of Contents

Mobile Apps Targeted by Adversaries

Users Access Unsecured Public Networks

Requests to Connect to Known Networks

Side Loading Apps from Un-curated Stores

Mobile Configuration Profiles

  • A Mobile configuration profile of questionable provenance

Executive Privilege Abused

Plugging Devices into USB Ports

Ostrich Syndrome Security

Piecemeal Security

Modern Mobile Security

Mobile Security Vendor Comparison

Top Security Threat Concerns in DACH

Related Research
Mobile security has been largely ignored as something that can be addressed with EMM, MAM, and mobile AV solutions. However, mobile malware and well-crafted mobile configuration profiles can evade these solutions without rooting or jailbreaking the phone. Smartphone and tablet users are line-of-business workers and do not understand the risks of using ultra-mobile devices to access enterprise data. Improved awareness of the security risks and the next-generation solutions available for mobile devices will raise the security bar for enterprises, and protect jobs and entire economies from industrial espionage. Despite changing concerns about mobile device security, the issue remains one of the top 10 security threat concerns worldwide.
More Information
No Index No
Podcast No
Table of Contents | Modern Enterprise Mobility~ || Mobile Apps Targeted by Adversaries~ | Challenges with BYOD in Enterprise~ || Users Access Unsecured Public Networks~ || Requests to Connect to Known Networks~ || Side Loading Apps from Un-curated Stores~ || Mobile Configuration Profiles~ ||| A Mobile configuration profile of questionable provenance~ || Executive Privilege Abused~ || Plugging Devices into USB Ports~ | Three Categories of Mobile Security Today~ || Ostrich Syndrome Security~ || Piecemeal Security~ || Modern Mobile Security~ | Security Impact and End-user Transparency~ || Mobile Security Vendor Comparison~ | The Final Word~ || Top Security Threat Concerns in DACH~ | Legal Disclaimer~ | The Frost & Sullivan Story~
Author Adrian Drozd
Industries Information Technology
WIP Number MB20-01-00-00-00
Is Prebook No