OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
spacer
Welcome Guest | Sign In
spacer
spacer
Network Management
  • Computing
    • Applications
    • Data Management
    • Hardware
      • Chips
      • Personal Computers
      • Servers
    • Operating Systems
  • Internet
    • Internet of Things
    • Online Entertainment
    • Search Tech
    • Social Networking
    • Web Apps
  • IT
    • Developers
    • IT Leadership
    • Network Management
  • Mobile Tech
    • Mobile Apps
    • Smartphones
    • Tablets
    • Wearable Tech
    • Wireless Networking
  • Reviews
  • Security
    • Cybersecurity
    • Hacking
    • Malware
    • Privacy
  • Technology
    • Audio/Video
    • Emerging Tech
      • Virtual Reality
    • Gaming
    • Home Tech
    • How-To
    • Photography
    • Science
      • Health
      • Space
    • Tech Buzz
    • Tech Law
    • Transportation
  • Tech Blog
  •  Reader Services 
    • Account Management
    • Discussion
    • News Alerts
    • Newsletters
    • RSS / spacer Headline Feeds
    • Search ECT News Network
    • ECT News Network Map
      • CRM Buyer Site Map
      • E-Commerce Times Site Map
      • LinuxInsider Site Map
      • TechNewsWorld Site Map
  • |
  • Software Buyers Guide

Mobile Security: A Moving Target

spacer

Mobile security needs must be balanced against the needs of users. Customers "want the freedom to procure apps from a variety of sources without imposing a platform requirement." Users "won't accept some of the more traditional, centralized, IT-driven control, device restrictions, and IT oversight of the past," said Jeremy Stieglitz, vice president of Voltage Security.

By Richard Adhikari
Oct 2, 2012 5:00 AM PT

The threat to enterprise security is increasing as the BYOD phenomenon gains ground in corporate America.

The amount of Android malware out there has gone through the roof, and hackers are leveraging Twitter to create command and control servers for mobile botnets, according to McAfee's Q2, 2012 threats report.

Existing approaches to security don't work well, and new solutions are required.

"The most important difference between [mobile devices] and traditional endpoints is that people view them as joint personal and business devices," Martin Ward, McAfee's senior director of endpoint security product marketing, told TechNewsWorld. "That creates the need for a different approach to security."

Stumbling Toward the New Security

It's not enough to just secure enterprise applications; businesses must now be able to manage the devices users bring in and the data on those devices.

That has given rise to two new fields, mobile device management and mobile application management.

MDM lets enterprises secure, manage and support mobile devices in their infrastructure. It allows for over-the-air distribution of apps, data and configuration settings, and control and protect the data and the configuration settings.

MAM allows the faster, simpler creation of in-house enterprise mobile apps. It also lets users deploy and manage both in-house and commercially available business apps.

Separating Corporate and User Data

MDM and MAM are important parts of a mobile security setup, but perhaps even more important is the separation of corporate and user data. Efforts in that regard haven't been very successful.

"MDM solves part of the problem, but really does nothing to protect the data itself," Jeremy Stieglitz, vice president of business development at Voltage Security, told TechNewsWorld.

"So far, the approach to keep corporate and user data separate has been to pour concrete on the device and say good luck to the end user," Alan Murray, senior vice president of product at Apperian, remarked. "Decent solutions in the past have focused on BlackBerry and that race is over."

Rim's Mobile Fusion technology includes BlackBerry Balance, software that creates a secure AES 256-bit encrypted file system for business data so owners can use their devices at work and in their personal lives. However, BlackBerry maker Research In Motion is hemorrhaging market share and is no longer considered a real player in the smartphone market.

"iOS and Android are clearly [users'] first picks," Murray said. "There are no native solutions for [separating business and personal data] on either platform."

Going Beyond MDM

Additionally, MDM solutions don't generally address cases where users have emails and attachments in their inbox on a server in the cloud, Stieglitz said. "At best, if it has a container, it can provide isolated security protection inside the container, but what about the data on the server, or data pushed to public clouds? What about a reply to a third party? What about when it's transmitted to another non-MDM user?"

Putting apps in a container has other problems, Apperian's Murray told TechNewsWorld. "All apps must now build to the same least common denominator, and this has a direct impact on use, adoption and, ultimately, ROI."

Further, third-party devs may lack the skills for, or access to, the platform the enterprise is using internally, which "represents a technical tax to the enterprise," Murray pointed out.

Also, customers "want the freedom to procure apps from a variety of sources without imposing a platform requirement."

Users "won't accept some of the more traditional, centralized, IT-driven control, device restrictions, and IT oversight of the past," Voltage's Stieglitz suggested. This new democratic approach "paves the way for more data-centric approaches that let IT control sensitive data at the data level, across the new, expanding set of devices and apps users are bringing into the enterprise."

Many Hands Make Security Light Work

These issues have led mobile security vendors to strike up partnerships in order to offer more well-rounded solutions.

For example, Voltage has set up an alliance program that brings together players in the MDM, MAM and data loss prevention areas.

Partners include Apperian, Good Technology and MobileIron.

These companies' products "are all compatible," Stieglitz said. Voltage's Mobile Plus initiative will "extend identity-based encryption and format-preserving encryption technologies to mobile file sharing and data field-level encryption."

Apperian is separately integrating Mocana's Mobile App Protection product into its Enterprise App Service Environment platform.

EASE makes for easy creation of in-house enterprise apps. MAP lets IT wrap pre-configured policies on its server around those apps, providing fine-grained application-level security. Existing apps can be so wrapped without accessing their original source code.

"The idea is that [the security] is specific for an app and for specific users of that app," Carlos Montero-Luque, Apperian's chief technology officer, told TechNewsWorld.

The policies are complementary to any other policies, at the enterprise, network or device level, Montero-Luque said.

"We see the need to segment the data to enable businesses to protect only the data they deem critical," McAfee's Ward remarked. The mobile security market "is still in its infancy, [and] we do see [it] evolving rapidly." spacer


-->

spacer Get Permission to License or Reproduce this Article
spacer Print spacer Email spacer Reprints spacer More by Richard Adhikari

spacer
spacer spacer spacer spacer spacer
spacer Most Popularspacer Newslettersspacer News Alerts
Are tablets over?
No - Mine is a prized possession.
No - Heavy laptops are over.
No - I don't have one yet, but I want one.
Maybe - They're good for kids, though.
Yes - Large smartphones make them redundant.
Yes - I won't replace mine.
Yes - Don't have one, don't want one.
spacer
E-Commerce Times
Federal Appeals Court Rules NSA's Phone Data-Vacuuming Illegal
Discover Card Completes Apple Pay
The Next Big Split in Wireless
Watch Band Guidelines Good News for Apple Accessory Makers
Supreme Court to Hear 'Non-Injury' Privacy Class Action
T-Mobile Offers Free 2-Week Vacation From Verizon
Microsoft Fires Up Its Business Engines
Comcast Blithely Juggles Its Options
spacer
CRM Buyer
5 Ways to Stop Stressing Out Your Customers
Everybody Loves Salesforce
It's the Customer Experience
Salesforce Jumps Into HR
Satisfying Customers in the Digital Transformation Era
Marketing's Next Act
The Business Power of Empathy
Digital Disruption and a Great Gap
ECT News Network on Twitter
Tweets about "TechNewsWorld"
spacer
LinuxInsider
Voyager-X Will Take You on a New Xfce Journey
EMC's ViPR Slithers Into Open Source
Mumblehard Malware Mugs Linux Servers
FOSSers Puzzle Over Significance of Open Source .Net Core
Vivid Vervet Doesn't Have Much Meat on Its Bones
VMware Draws on Open Source to Manage Cloud Micro Services
Ubuntu's Vivid Vervet Makes Snappy Entrance
Survey: OSS Gives Enterprises More Bang for Less Bucks
SPONSOR SHOWCASE
Network Monitoring Software
spacer OpManager: Monitors network & servers from a single console. Try it for free!spacer
Penn States Online IT Programs
spacer IT degrees and certificates; grad and undergrad. Nationally ranked, entirely online. Learn more.spacer
Marketers - Fill Your Sales Funnel Instantly
spacer Access millions of IT and business decision makers. Our full-service global marketing program delivers sales-ready leads. Learn more.spacer
spacer
spacer
TechNewsWorld Headlines
TechNewsWorld
Splatoon: Nintendo Hits You With Its Best Shot
Xiaomi's Mi 4i Spreads in Asia
Twitter's Timid Anti-Trolling Tweaks
Oculus VR Promises a Rift for All in 2016
EM Drive Stirs Blood of Hopeful Space Explorers
'Night Terrors' Could Turn Your Home Into a Hellscape
Report: Top Endpoint Security Packages Perfectly Foil Drive-By Attacks
Facebook Responds to Critics by Unlocking Internet.org
spacer
Inside TechNewsWorld
Applications
  • Chrome Web Store Gives Bad Extensions the Boot
  • Devs Rev Up for a Weekend of Galactic Problem-Solving
  • Court Sticks It to Apple in $533M Patent Case
Computing
  • Steer Clear of iOS 8's Infinite Loop
  • Can Microsoft Take Back Momentum From Google and Apple?
  • Google Dresses Up Android Wear
Data Management
  • Your Lawyer Is Vulnerable to Cyberattacks
  • Shopping for Algorithms and APIs in the Cloud
  • FTC Upgrades IT to Protect Consumer Privacy, Data Security
Emerging Tech
  • Our Bodies, Our Security: Biometrics vs. Passwords
  • Elon Musk Unveils Tesla's World-Changing Powerwall
  • Patent Holders: Google Wants Your IP!
Exclusives
  • HP's Marten Mickos: Open Source Is Not a Business Model
  • Dan Allen and Sarah White: Documentation Dearth Dooms Open Source Projects
  • PredictionIO's Simon Chan on Machine Learning by Devs for Devs
Hardware
  • Shiny Apple Has a Few Soft Spots
  • Reactions to New MacBook Run From Tepid to Cold
  • Apple's Storm Clouds
Internet of Things
  • IoT: Why Security Pros Need to Prepare Now
  • Flexible Aluminum-Ion Battery Recharges in 60 Seconds
  • Gadget Ogling: Dashing Buttons, a Plug-In PC and a Smart Teakettle
IT Leadership
  • Feds Get Forward-Looking IT Procurement Advice
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.