![]() |
Mobility in the enterprise is a rising challenge for information security and risk leaders. The risks don’t simply stop with confidential data loss, viruses, and malware. The risks also span legal issues, privacy, and regulatory non-compliance. Users are consuming information in new ways and at volume never seen before in business. With users being able to pop on and off the company network oscillating between endless Wi-Fi nodes, carrier network, and hotspots, security teams don’t have the normal visibility and controls allowing traditional monitoring of network traffic. Cloud services are a nightmare for records management and legal professionals because users can upload anything they want when connected to the carrier network or a host of other out of band network options. There is no way for security and risk leaders to ignore the increasing demand and proliferation of mobile into the enterprise at this point. The demand isn’t just being driven from by the mass adoption and use consumer devices, but businesses are also leveraging the power of mobile computing to strengthen their value to their clients and customers, making them more agile, relevant, and able to respond to the needs of their customers. Business applications like salesforce.com and Google business apps are prime examples of cloud-based mobile apps that are changing how business operate. Who could say no to keeping their sales force plugged in 24x7x365? In this article I will summarize the challenges and risks enterprise leaders should be considering when formulating a mobile security strategy and a beginning checklist of possible controls. There are a variety of security options for mobile security, some of more popular include: MDM (mobile device management), enterprise authentication, malware detection, and application containerization. MDM is not the answer in my opinion and an over reliance on it as a silver bullet will lead to undesirable consequences in my opinion. I consider MDM components such as device provisioning, locking and ability to wipe a mobile device, elementary and largely operational. Those things are a given in my mind if you are using mobile in the enterprise environment. It does little to address the real challenges and threats to the enterprise via mobile computing. The devices we carry in our hands are effectively full-blown computers with the advantage of being instantly available and because of the social networking trends and people moving away from home and office phones, they tend to carry them everywhere. Mobile security companies are offering new solutions at blazing speeds with the trends extending beyond device management into application and data management. I suggest that enterprise security leaders think through a clear strategy and not be lured into the next “whiz-bang” piece of software from a security vendor. If security and risk leadership limited their strategies and programs based on vendor solutions, they would be in real trouble. Mobility Challenges for the EnterpriseThere is no way for the enterprise to fight the mobile trend. In the end, we need to have solid controls and solutions for securing the data, visibility into relevant threats, and we need to secure the identities of our users. I have listed some of the most common challenges that enterprise security leaders are facing today:
A Beginning ChecklistThe items below are largely common sense, and in some cases it is more than many enterprises have in place today. Even if an organization were to apply all of the items below, they would still fall short of having an effective set of controls.
The mass adoption of mobile technology will continue to challenge the IT, information security, and risk teams within your organization over time. I think we will see a significant rise in mobile targeted attacks over the next few years because this is where many users are spending most of their time today. Authentication and fraud are major challenges for organizations as is their ability to apply security patches holistically. Simply requiring anti-virus and malware agents is not a simple as it might seem in large scale environments. With the proliferation of web-based apps, cloud services, and browsers on mobile devices being capable of doing everything a desktop can do, the mobile revolution introduces a host of new challenges for security and risk teams that will continue to evolve as we move further down the road. A business landscape driven by virtual cloud environments and a highly mobile workforce looks unlike anything we have had to protect in the past. Read More: Tim’s Security Blog |
Update your feed preferences |
