Mobile Security: An Internal Enterprise Imperative

In today’s increasingly global and connected world, security threats can come from all manner of sources. The widely-reported cyber attacks on banks and TV stations in South Korea in March were generally thought to be the co-ordinated work of a foreign government looking to bring down the Asian country’s infrastructure. Yet enterprise businesses adopting mobile strategies also face a significant threat to their security and one that is much closer to home: from employees within their own organization.

The trend to Bring Your Own Device (BYOD) to the workplace opens up greater flexibility, but can also compromise a company’s networks, systems and data. New research from Infonetics has found that managing and securing “rogue” devices connected by users was one of the key drivers for deploying mobile device security for 72% of the 103 medium and large companies interviewed by the research company in the US and Canada. Infonetics estimates there will be around one million malicious or high-risk apps on Google’s Android operating system alone this year, and forecasts that nearly all enterprises will experience significant mobile device security incidents by 2015. As a result, some three-quarters of respondents surveyed said they have purchased or are considering the purchase of a cloud-based or hybrid cloud/client-based mobile security solution.

Mobility brings with it additional risks to enterprises, with fast-growing volumes of information scattered across networks, devices and platforms rather than stored centrally. Information, identity, and device and service availability are all under threat. But adopting a structured approach to security will help enterprises to address potential threats and take advantage of the considerable benefits that mobile strategies can offer.

A comprehensive mobile security architecture should take you through a coherent design, implementation and management lifecycle. This will need to cover many elements such as detailing business requirements; evaluating physical platforms, products and technologies; testing of platforms and apps; and adopting ongoing best-practice management and ensuring that implementations are continually improved.
The key to securing mobile devices is understanding the risks posed to the enterprise by their use. Good mobile security is also constantly evolving to take into account the changing behaviors of mobile users, as well as new technologies and new threats. In summary, if enterprises adopt a considered and thorough approach to technologies, policies and governance they can deliver a secure mobile environment that yields considerable business and working benefits.

To find out more about mobile security threats and how to adopt robust mobile security architectures and practices I suggest you read Taking Mobile Security to the Next Level.

Related Posts

Cloud Security

Cloud security is not too different

Roy Samson
August 13, 2018

Take a closer look at your current security options before investing in new ones.


IAM DevOps in Capgemini

Terence Stamp
August 10, 2018

The Agile methodology has been gaining traction in its adoption throughout the business world. This...


Capgemini presents Next Generation Security Operation Center

Christer Jansson
June 14, 2018

Next generation security operation centers (SOCs) resolve the need for cybersecurity skills and help...


By continuing to navigate on this website, you accept the use of cookies.

For more information and to change the setting of cookies on your computer, please read our Privacy Policy.


Close cookie information