BYOD Security Is Critical For Business

The prevalence of bring-your-own-device culture in the corporate world means workers can be more productive and connected. But as hackers hone their skills at breaking into cell phones, the sprawling range of devices offers tempting targets for crime and espionage.

In response, a new market segment is emerging within the cyber-security field that involves companies that detect and mitigate attacks on mobile devices.

In a recent research report, Gartner dubbed this new field "mobile threat defense," and described a range of services, including scanning for risky apps and threatening WiFi networks, that the firms are offering.

Since more workers now use their personal devices for work purposes, the firms' services often involve supplying a security app for employees to install on their iOS or Android phone.

Patrick Hevesi, the author of the Gartner report, told Fortune that cyber-security companies are still working to develop a full suite of services, but FireEye, Lookout, and Better Mobile are early leaders in mobile threat defense field.

The task of protecting mobile devices is more difficult than a traditional enterprise environment, says Roy Tuvey, CEO of security firm Wandera, because employees exercise more control, and because it's not practical to safeguard everyone's phone within a virtual corporate network.

But he says there's an upside in that it's harder for attackers to take over or steal data from mobile devices due to their layered architecture.

As for the threats directed at mobile phones, they come in two types, says Santosh Krishnan, the chief product officer of Lookout. First, there are carefully targeted attacks aimed at a high value individual within a company in which the attacker might use email phishing to take control over the entire phone. The other type amounts to more scattershot attacks in which attackers may distribute a malware-laden app in the hopes of stealing data.

Meanwhile, companies that want to increase their "mobile threat defense" are faced with the familiar problem of a growing roster of vendors that might be offering overlapping protections.

According to Gartner's Hevesi, the best option they have for now is to integrate the new threat tools alongside any existing mobile management service they may be using.

In the future, he predicts, some of the stand-alone security companies will be integrated into larger firms' product offerings.

Fortune:         Critical Cybersecurity Protocols To Implement

Three Step Pogram: Pre-Breach Remedies To Contain The Costs Of A Cyber Attack:

 

« Tech Billionaires Give $20m For Artificial Intelligence Research
Is The World On The Verge Of A Cyber War? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

Proact IT Group

Proact IT Group

Proact is Europe's leading independent data centre and Cloud services enabler. We deliver flexible, accessible and secure IT solutions and services.

Neurosoft

Neurosoft

Neursoft is a fully integrated ICT company with Software Development, System Integration and Information Technology Security capabilities.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

ramsac

ramsac

ramsac provide secure, resilient IT management, cybersecurity, 24 hour support and IT strategy to businesses in London and the South East.

Policy Monitor

Policy Monitor

Policy Monitor is a cyber security company founded by experts with extensive experience in operational and risk management.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

Acumenis

Acumenis

At Acumenis, we help organisations of all sizes to manage information security effectively. Our key services are penetration testing, ISO 27001 implementations, and security

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.

PlanNet 21 Communications

PlanNet 21 Communications

PlanNet 21 Communications is Ireland most specialised technology solution provider.

PrimeSSL

PrimeSSL

PrimeSSL, a leading Certificate Authority (CA) backed by the trusted Sectigo Root, delivers affordable and user-friendly SSL/TLS certificate solutions.

TrustFour

TrustFour

TrustFour is a pioneer in workload and non-human identity security, providing innovative solutions for compliance, remediation, post quantum resiliency, and advanced threat defense.

Shieldworkz

Shieldworkz

Shieldworkz secure Operational Technology environments and protect businesses with best-in-class professional services and cyber security solutions.

Arksentry

Arksentry

ArkSentry is a modern penetration testing platform powered by highly vetted security experts. We make pentests easier, faster, and more affordable with powerful integrations built for today.