Theres Not An App For ThatMobile Security Ditches The Device Agent

102 24
Its not easy getting 10,000 people, all with different mobile phones and operating systems, to install a software agent, says Adrian Broeke, VP of IT Security, discussing the last time the company rolled out a Mobile Security initiative. At least with cats you dont have calls to the IT help desk.

Installing an agent, or a small piece of software on a smartphone, was a key ingredient in many mobile device management (MDM) solutions. Now, security teams are looking for less intrusive ways to achieve similar results without having to put a software footprint, and maintain it up to date, across thousands of handsets with different operating systems and quirks.

By all accounts, the BYOD or bring your own device movement is in full swing. About 3 out of 4 American workers bring a mobile device to work and use it to accomplish part of their job. That means corporate data is being put onto these unmanaged mobile devices, or more likely put into cloud services which are accessed by apps on the mobile device.

When you look at mobile usage, 86% of what people do on the phone is in an app, not a web browser, says Broeke. In fact, many phones like those running Apple iOS dont allow the end user to access the file system at all. That means any data on the phone is accessed through the apps, and is increasingly being stored in the cloud.

The widespread availability of 4G high speed internet on mobile is making it even easier to store data in the cloud. Many employees report they use their phones for many kinds of work, ranging from salespeople accessing sales contacts via Salesforce 1, a mobile app for the companys IT procured Salesforce.com system. But employees are also using a wide range of other types of apps.

Many of those apps are not approved or vetted by the IT security team, and some do not meet the security needs of the company. Thats why they have moved to a new form of agentless mobile security that inspects all cloud traffic and enforces encryption and access control policies across cloud services.
Subscribe to our newsletter
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
You can unsubscribe at any time

Leave A Reply

Your email address will not be published.