What steps should the IT department take to prevent spyware on mobile devices?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Corporations need to look at some form of mobile device management product. These deliver over-the-air distribution of applications, data and configuration settings for a wide range of mobile devices. These tools make it a lot easier for administrators to keep devices configured securely and free of spyware. Another approach is to create an enterprise app store. This enables employees to get apps from one location. Administrators can fully risk-assess the apps they make available in the store. That's a great way to prevent spyware from getting on bring-your-own devices.
Also, it's important to look at mobile devices that offer container or workspace technologies that provide a dual persona on the device. Mobile vendors like Apple, BlackBerry and Samsung already offer this type of workspace separation in their products. This reduces the chance of spyware being installed that can actually access enterprise data, because the users can keep their personal apps; they're well separated and sandboxed away from the enterprise apps and the enterprise data.
Cybersecurity is every CIO's problem
The benefits of intelligence-driven security
Make security programs a competitive gain
Webcast: Security controls that prevent modern cyberthreats
Dig Deeper on Security and risk management for Small Business
Michael Cobb, Application Security asks:
What is your top defense against spyware on mobile devices?
2 ResponsesJoin the Discussion
Related Q&A from Michael Cobb
An old Java vulnerability was discovered to have been ineffectually patched. Expert Michael Cobb explains how this happened and what can be done to ...continue reading
Google's Certificate Transparency tool publicly logs certificates issued by CAs. Expert Michael Cobb explains how the log viewer works to improve ...continue reading
Crowning the most secure web browser is difficult, with research often turning up biased results. Expert Michael Cobb explains how to make a choice ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.