Access your Pro+ Content below.
How mobile threat detection tools spot incoming attacks
This article is part of the Access issue of April 2017, Vol. 1, No. 2
There are a wide variety of third-party mobile threat detection products that can address the mobile security concerns that most companies have. The mobile security landscape is relatively safe. As a result, most corporate security measures comprise typical enterprise mobility management (EMM) configurations, such as encryption, VPNs, passcodes, remote wipe commands, data-sharing controls and ensuring that devices aren''t rooted or jailbroken. Mobile threat detection tools differ in that they are designed to actively discover security issues. There are three typical approaches that these products may use individually or in combination: Ensuring device integrity. On-device agents can monitor the integrity of the device by probing as many APIs and aspects of the device as possible, looking for any changes of state, configuration or behavior that may indicate a compromise. Network monitoring. An agent app can actively send and receive traffic, monitoring for signs of network-based attacks. App scanning. An agent app or mobile ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Sears Home Services needed to find a better way for its technicians to collaborate on complex repairs. GoToAssist Seeit has boosted worker productivity and customer service.
Slack Enterprise Grid puts the emphasis on large organizations by giving IT a central location to deploy and customize settings for multiple teams at once.
EMM configurations can help safeguard the enterprise from attacks, but mobile threat detection tools take a different approach to actively pinpoint security issues.
Mobile technology has changed the business world forever. Four IT pros discuss how it's informed their work and personal lives today and will continue to do so in the future.
News in this issue
Web apps, virtualization and desktop as a service are just a few of the application delivery methods IT can choose. Admins should stay flexible when sorting through the options.
Columns in this issue
IT admins have to decide between delivering full virtual desktops or virtual apps. Once they decide that, there's still the question of choosing on-premises or cloud-based.
Mobile users demand data access anytime, anywhere, and organizations are pressed to provide it. Don't forget about the third-party systems that allow this access in the first place.