HackDig : Dig high-quality web security articles for hacker

Threat protection and EMM: What the relationship means for CIOs

2015-09-25 08:05

Good security relies on strong relationships. The security industry wants to work with hackers, to learn from them and understand their modes of thinking. Security professionals want to share information to ensure everyone understands the broad scope of threats and what they can do to corporate data. Similarly, security technologies want to connect together to deliver new depths of protection.

This is especially the case in the mobile industry. There is no silver bullet to mobile security. It takes specialization — experts working together — to ensure the bases are covered.

Threat protection and enterprise mobility management solutions play together perfectly in this way in that both help enterprises see and manage the risks associated with mobility so that employees are empowered to embrace it.

External risks

Threat protection is the product segment that most deeply addresses external threats. On a high-level, it provides protection against app-based threats, highlights sideloaded and risky apps, detects advanced jailbroken/rooted devices (especially those jailbreaks/roots that obfuscate themselves to evade MDM), and can help IT managers set up custom policies.

External threats need to be assessed based on their risk to the enterprise, and threat protection can surface this information, identify risk level, and suggest proper recourse based on the enterprise’s policies. For example, the recent XcodeGhost iOS malware was published to the Apple App Store, hidden in a number of apps built by legitimate developers who weren’t aware of the malicious code’s presence. Threat protection would flag this high-risk, but hidden malware to enterprises and explain why it is a threat.

Once identified, EMM products can help bring protection full circle. For example, while threat protection would alert IT managers to the compromised device and the type of malware present, IT managers could then use MDM to quarantine the device from the network until the threat is resolved.

Internal risks

EMM does a good job of helping IT managers deal with the variety of internal risks, especially when employees bring their personal devices into the workplace. It also gives enterprises a safe way to distribute approved- and homegrown-apps.

If a scenario arises in which corporate data is at risk, EMM solutions help enterprises revoke devices’ access. For example, an employee may lose their device (and, thereby, potentially put at risk the corporate data accessible through that device). IT managers can quickly cut off that device’s access to email and other services in order to protect the data.

The benefits to these solutions working together — specializing in different kinds of threats and remediations — help enterprises cover a much broader range of security scenarios. Together, EMM and threat protection provide the defense-in-depth approach needed to manage both internal and external risks.

Want to learn more about why you should care about mobile security? Click here.

Source: /mme-noitcetorp-taerht/42/90/5102/golb/moc.tuokool.golb

Read:3220 | Comments:0 | Tags:Enterprise Mobile Security EMM MDM Threat protection IOS

“Threat protection and EMM: What the relationship means for CIOs”0 Comments

Submit A Comment



Blog :

Verification Code:


Share high-quality web security related articles with you:)


Tag Cloud