BYOD Security Is Critical For Business

The prevalence of bring-your-own-device culture in the corporate world means workers can be more productive and connected. But as hackers hone their skills at breaking into cell phones, the sprawling range of devices offers tempting targets for crime and espionage.

In response, a new market segment is emerging within the cyber-security field that involves companies that detect and mitigate attacks on mobile devices.

In a recent research report, Gartner dubbed this new field "mobile threat defense," and described a range of services, including scanning for risky apps and threatening WiFi networks, that the firms are offering.

Since more workers now use their personal devices for work purposes, the firms' services often involve supplying a security app for employees to install on their iOS or Android phone.

Patrick Hevesi, the author of the Gartner report, told Fortune that cyber-security companies are still working to develop a full suite of services, but FireEye, Lookout, and Better Mobile are early leaders in mobile threat defense field.

The task of protecting mobile devices is more difficult than a traditional enterprise environment, says Roy Tuvey, CEO of security firm Wandera, because employees exercise more control, and because it's not practical to safeguard everyone's phone within a virtual corporate network.

But he says there's an upside in that it's harder for attackers to take over or steal data from mobile devices due to their layered architecture.

As for the threats directed at mobile phones, they come in two types, says Santosh Krishnan, the chief product officer of Lookout. First, there are carefully targeted attacks aimed at a high value individual within a company in which the attacker might use email phishing to take control over the entire phone. The other type amounts to more scattershot attacks in which attackers may distribute a malware-laden app in the hopes of stealing data.

Meanwhile, companies that want to increase their "mobile threat defense" are faced with the familiar problem of a growing roster of vendors that might be offering overlapping protections.

According to Gartner's Hevesi, the best option they have for now is to integrate the new threat tools alongside any existing mobile management service they may be using.

In the future, he predicts, some of the stand-alone security companies will be integrated into larger firms' product offerings.

Fortune:         Critical Cybersecurity Protocols To Implement

Three Step Pogram: Pre-Breach Remedies To Contain The Costs Of A Cyber Attack:

 

« Tech Billionaires Give $20m For Artificial Intelligence Research
Is The World On The Verge Of A Cyber War? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Acunetix

Acunetix

Acunetix is a leading web vulnerability scanner, widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

Penningtons Manches Cooper

Penningtons Manches Cooper

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

CyberCX

CyberCX

CyberCX provides services from strategic consulting, security testing and training to world-class managed services and engineering solutions.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

BlockAPT

BlockAPT

BlockAPT, empowering you with an advanced, intelligent cyber defence platform. We protect our customers digital assets by unifying operational technologies against advanced persistent threats.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Eleos Labs

Eleos Labs

Eleos Labs' suite of security tools prevent Web3 cyber attacks, reduce economic risks, and protect digital assets.

Thero6

Thero6

Thero6 develop dynamic financial analysis algorithms that help prevent coin collapses and theft of cryptocurrency funds by identifying the transaction absolutely throughout the chain.