Jakub Jirsk - Fotolia
As the mobile threat landscape continues to diversify, IT is constantly fighting to keep one step ahead. But AI in mobile security systems could help in the future.
Currently, the average time to detect and remediate a data breach of corporate systems is three to six months. This is unacceptable from a data security perspective, because in that time frame, most companies can lose enough information to never be able to recover.
In the future, AI in mobile security systems primarily offered as cloud-based services will bolster most discoveries, remediations and preventions of security breaches. The ability to monitor and learn from a vast array of devices -- not just ones installed at a particular organization -- and to then turn that learning into actionable intelligence to block and remediate at the individual user or device level will be critical to protect mobile workers.
Organizations that want to protect their mobile workers should look at AI in mobile security systems that can monitor the actions users and devices take. IT needs to actively monitor networks, data access, locations associated with users, profiles and permissions. Cloud-based intelligence that aggregates anonymized data across millions of devices and discovers malware and potential breaches will be the normal security capability in the next one to three years, although not all current security vendors will be able to effectively make the transition.
An individual app on each device that compares signatures of known bad actors is no longer valid protection in the age of zero-day infiltrations and sophisticated phishing attacks. With AI-fueled security for mobile, small stubs of code that operate at the OS layer will monitor each transaction on the device and learn over time what actions are safe and which are not. If a user tries to load a new app, the cloud-based security service must approve it to ensure it is not malevolent.
Users will also need approval to open certain types of files, because many attachments may include malware. Finally, network-attached devices will have monitors to ensure the network is safe.
The ultimate goal of AI-assisted security is to monitor behaviors instead of code signatures. Now, these capabilities exist in products from vendors such as Zimperium, Lookout and Appthority. AI in mobile security sounds like it will add significant overhead and reduced performance on the device. But, in most cases, the user won't even notice.
Dig Deeper on Enterprise mobile security
Related Q&A from Jack Gold
The Knox Service Plugin helps Samsung smartphone admins roll out security features through EMM tools more quickly. The program lowers the programming... Continue Reading
Project Mainline promises to make the Android update process more segmented. This new structure allows IT to push out critical updates without ... Continue Reading
IT should learn the benefits of Apple Business Manager to decide if the program's configuration and monitoring services are a worthwhile supplement ... Continue Reading