BYOD Security Is Critical For Business

The prevalence of bring-your-own-device culture in the corporate world means workers can be more productive and connected. But as hackers hone their skills at breaking into cell phones, the sprawling range of devices offers tempting targets for crime and espionage.

In response, a new market segment is emerging within the cyber-security field that involves companies that detect and mitigate attacks on mobile devices.

In a recent research report, Gartner dubbed this new field "mobile threat defense," and described a range of services, including scanning for risky apps and threatening WiFi networks, that the firms are offering.

Since more workers now use their personal devices for work purposes, the firms' services often involve supplying a security app for employees to install on their iOS or Android phone.

Patrick Hevesi, the author of the Gartner report, told Fortune that cyber-security companies are still working to develop a full suite of services, but FireEye, Lookout, and Better Mobile are early leaders in mobile threat defense field.

The task of protecting mobile devices is more difficult than a traditional enterprise environment, says Roy Tuvey, CEO of security firm Wandera, because employees exercise more control, and because it's not practical to safeguard everyone's phone within a virtual corporate network.

But he says there's an upside in that it's harder for attackers to take over or steal data from mobile devices due to their layered architecture.

As for the threats directed at mobile phones, they come in two types, says Santosh Krishnan, the chief product officer of Lookout. First, there are carefully targeted attacks aimed at a high value individual within a company in which the attacker might use email phishing to take control over the entire phone. The other type amounts to more scattershot attacks in which attackers may distribute a malware-laden app in the hopes of stealing data.

Meanwhile, companies that want to increase their "mobile threat defense" are faced with the familiar problem of a growing roster of vendors that might be offering overlapping protections.

According to Gartner's Hevesi, the best option they have for now is to integrate the new threat tools alongside any existing mobile management service they may be using.

In the future, he predicts, some of the stand-alone security companies will be integrated into larger firms' product offerings.

Fortune:         Critical Cybersecurity Protocols To Implement

Three Step Pogram: Pre-Breach Remedies To Contain The Costs Of A Cyber Attack:

 

« Tech Billionaires Give $20m For Artificial Intelligence Research
Is The World On The Verge Of A Cyber War? »

Directory of Suppliers

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

IntelliGO Networks

IntelliGO Networks

IntelliGO Networks is a cybersecurity company focused on Managed Detection and Response (MDR).

GlobalSequr

GlobalSequr

GlobalSequr is an IT security consulting firm. We have a goal of demystifying the complexity of IT security.

Sirentec

Sirentec

Sirentec provides best of breed software for Digital Forensics, eDiscovery, and Incident Response Case Management.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

Vicarious

Vicarious

Vicarious identify the vulnerabilities in the software without involving the vendor and protect it before the hackers take advantage of it, even in compiled applications.

Fidus Information Security

Fidus Information Security

Fidus is a team of security professionals providing Penetration Testing and Cyber Security Consulting services throughout the UK and worldwide.