What steps should the IT department take to prevent spyware on mobile devices?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Corporations need to look at some form of mobile device management product. These deliver over-the-air distribution of applications, data and configuration settings for a wide range of mobile devices. These tools make it a lot easier for administrators to keep devices configured securely and free of spyware. Another approach is to create an enterprise app store. This enables employees to get apps from one location. Administrators can fully risk-assess the apps they make available in the store. That's a great way to prevent spyware from getting on bring-your-own devices.
Also, it's important to look at mobile devices that offer container or workspace technologies that provide a dual persona on the device. Mobile vendors like Apple, BlackBerry and Samsung already offer this type of workspace separation in their products. This reduces the chance of spyware being installed that can actually access enterprise data, because the users can keep their personal apps; they're well separated and sandboxed away from the enterprise apps and the enterprise data.
Cybersecurity is every CIO's problem
The benefits of intelligence-driven security
Make security programs a competitive gain
Webcast: Security controls that prevent modern cyberthreats
Michael Cobb, Application Security asks:
What is your top defense against spyware on mobile devices?
2 ResponsesJoin the Discussion
Related Q&A from Michael Cobb
Geofencing technology creates a virtual fence on employee devices, adding a crucial extra layer of security. But do privacy concerns negate the ...continue reading
Third-party DNS providers claim to improve browsing times and speeds, but are they a secure enterprise option? Expert Michael Cobb explains.continue reading
Wearable technology is infiltrating the enterprise, much like BYOD has. Expert Michael Cobb discusses the security concerns of wearables and outlines...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.