What steps should the IT department take to prevent spyware on mobile devices?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Corporations need to look at some form of mobile device management product. These deliver over-the-air distribution of applications, data and configuration settings for a wide range of mobile devices. These tools make it a lot easier for administrators to keep devices configured securely and free of spyware. Another approach is to create an enterprise app store. This enables employees to get apps from one location. Administrators can fully risk-assess the apps they make available in the store. That's a great way to prevent spyware from getting on bring-your-own devices.
Also, it's important to look at mobile devices that offer container or workspace technologies that provide a dual persona on the device. Mobile vendors like Apple, BlackBerry and Samsung already offer this type of workspace separation in their products. This reduces the chance of spyware being installed that can actually access enterprise data, because the users can keep their personal apps; they're well separated and sandboxed away from the enterprise apps and the enterprise data.
Cybersecurity is every CIO's problem
The benefits of intelligence-driven security
Make security programs a competitive gain
Webcast: Security controls that prevent modern cyberthreats
Dig Deeper on Security and risk management for Small Business
Michael Cobb, Application Security asks:
What is your top defense against spyware on mobile devices?
2 ResponsesJoin the Discussion
Related Q&A from Michael Cobb
What is BGP hijacking or IP hijacking and how do cybercriminals pull off the attacks? Expert Michael Cobb explains how enterprises can mitigate these...continue reading
Is the Dell eDellRoot security threat a serious problem and, if so, can it be prevented with self-signed root certificate authorities? Expert Michael...continue reading
What does FIPS 140-2 Level 2 certification for devices cover? Expert Michael Cobb explains the FIPS 140-2 security standard and how vendors use it in...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.