What steps should the IT department take to prevent spyware on mobile devices?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Corporations need to look at some form of mobile device management product. These deliver over-the-air distribution of applications, data and configuration settings for a wide range of mobile devices. These tools make it a lot easier for administrators to keep devices configured securely and free of spyware. Another approach is to create an enterprise app store. This enables employees to get apps from one location. Administrators can fully risk-assess the apps they make available in the store. That's a great way to prevent spyware from getting on bring-your-own devices.
Also, it's important to look at mobile devices that offer container or workspace technologies that provide a dual persona on the device. Mobile vendors like Apple, BlackBerry and Samsung already offer this type of workspace separation in their products. This reduces the chance of spyware being installed that can actually access enterprise data, because the users can keep their personal apps; they're well separated and sandboxed away from the enterprise apps and the enterprise data.
Cybersecurity is every CIO's problem
The benefits of intelligence-driven security
Make security programs a competitive gain
Webcast: Security controls that prevent modern cyberthreats
Dig Deeper on Security and risk management for Small Business
Michael Cobb, Application Security asks:
What is your top defense against spyware on mobile devices?
2 ResponsesJoin the Discussion
Related Q&A from Michael Cobb
Open source NoSQL MongoDB database faced 30,000 insecure instances. Expert Michael Cobb explains the misconfiguration that led to this, and how to ...continue reading
A new Veracode report offers details on common mobile application security risks. Expert Michael Cobb explains these flaws, and what developers can ...continue reading
Juniper firewall products were found to have two backdoor vulnerabilities. Expert Michael Cobb explains how a cryptographic algorithm and hardcoded ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.