A layered mobile security strategy protects against the many types of threats lurking in mobile cyberspace, where the traditional rules that govern security no longer apply.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
As mobility has become an enterprise mainstay, IT teams are up against risks, such as malware, data interception, social engineering and direct attacks. To make matters worse, mobile device users download malicious apps, visit infected websites and use unauthorized cloud services to conduct business. They also connect to public Wi-Fi networks that expose their devices to malware or viruses, which find their way into the corporate network. Users may also lose their devices through theft or carelessness.
The only hope of defending against these onslaughts is with a comprehensive, integrated, layered approach to security that incorporates measures at each vulnerable point. That way, if a breach occurs in the first barrier, the other barriers can prevent further damage.
Test your knowledge of mobile network technology
Think you know what the future holds for the intersection of mobility and networking? Review our recent coverage and then take our quiz to test your knowledge of mobile network technology.
A layered mobile security strategy could include technologies such as mobile device management, mobile application management (MAM), advanced device biometrics, network segmentation, device containerization or antimalware and antiransomware. Also, incorporate monitoring systems and software testing for security-related issues, and apply security patches and updates at regular intervals.
There is no one approach to a layered mobile security strategy -- an effective strategy leverages available tools to ensure protection at any possible weak point. IT might implement biometric authentication, which would require all mobile devices to support biometric access, as well as implement the systems necessary to support these devices. But biometrics is only part of the answer. IT must ensure firewalls and gateways are up to date and utilize URL filtering to protect against phishing campaigns or advanced malware to prevent denial-of-service attacks.
Another important component of any layered security strategy is comprehensive network monitoring to look for suspicious activity on managed mobile devices, such as someone trying to access sensitive data. Admins should use a monitoring tool that alerts them to any questionable activity, so they can respond immediately to any threats. IT should be able to easily access event data from a central location and generate reports that provide comprehensive insights into systems and usage patterns.
Enterprises should also review the applications they implement and how they manage them. If an organization develops enterprise mobile apps, IT should consider security from the app's inception through its implementation and thoroughly test it for any potential security holes. Admins can use MAM tools to protect sensitive data at rest and in motion.
In a comprehensive layered mobile security strategy, no one point should represent a weak security link. When it comes to supporting mobile devices in the enterprise, IT must protect sensitive resources at every phase -- on the back end, network components and mobile devices themselves -- with the ultimate goal of safeguarding all corporate data, wherever it resides.
How MDM is affecting enterprise security
Learn CIOs' expert opinions of layered security
The top three growing mobile security threats
Related Q&A from Robert Sheldon
IT teams must go into the mobile app development process with a strong plan for implementation. Know which tools and types of apps work best for the ...continue reading
A programmable infrastructure offers data center admins even greater flexibility, lower costs and faster modification than converged and ...continue reading
When users run into issues that make them turn to the IT help desk, they expect quick, efficient service that gets them back to work. That starts ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.