BYOD Security Is Critical For Business

The prevalence of bring-your-own-device culture in the corporate world means workers can be more productive and connected. But as hackers hone their skills at breaking into cell phones, the sprawling range of devices offers tempting targets for crime and espionage.

In response, a new market segment is emerging within the cyber-security field that involves companies that detect and mitigate attacks on mobile devices.

In a recent research report, Gartner dubbed this new field "mobile threat defense," and described a range of services, including scanning for risky apps and threatening WiFi networks, that the firms are offering.

Since more workers now use their personal devices for work purposes, the firms' services often involve supplying a security app for employees to install on their iOS or Android phone.

Patrick Hevesi, the author of the Gartner report, told Fortune that cyber-security companies are still working to develop a full suite of services, but FireEye, Lookout, and Better Mobile are early leaders in mobile threat defense field.

The task of protecting mobile devices is more difficult than a traditional enterprise environment, says Roy Tuvey, CEO of security firm Wandera, because employees exercise more control, and because it's not practical to safeguard everyone's phone within a virtual corporate network.

But he says there's an upside in that it's harder for attackers to take over or steal data from mobile devices due to their layered architecture.

As for the threats directed at mobile phones, they come in two types, says Santosh Krishnan, the chief product officer of Lookout. First, there are carefully targeted attacks aimed at a high value individual within a company in which the attacker might use email phishing to take control over the entire phone. The other type amounts to more scattershot attacks in which attackers may distribute a malware-laden app in the hopes of stealing data.

Meanwhile, companies that want to increase their "mobile threat defense" are faced with the familiar problem of a growing roster of vendors that might be offering overlapping protections.

According to Gartner's Hevesi, the best option they have for now is to integrate the new threat tools alongside any existing mobile management service they may be using.

In the future, he predicts, some of the stand-alone security companies will be integrated into larger firms' product offerings.

Fortune:         Critical Cybersecurity Protocols To Implement

Three Step Pogram: Pre-Breach Remedies To Contain The Costs Of A Cyber Attack:

 

« Tech Billionaires Give $20m For Artificial Intelligence Research
Is The World On The Verge Of A Cyber War? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

Fidus Information Security

Fidus Information Security

Fidus is a team of security professionals providing Penetration Testing and Cyber Security Consulting services throughout the UK and worldwide.

Unitrends

Unitrends

Unitrends helps IT pros do more with less by providing an all-in-one enterprise backup and continuity solution.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

Multitel

Multitel

Multitel is an independent research centre. We develop and integrate emerging technologies into the industrial fabric at the regional and international levels.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

Cybertech Nepal

Cybertech Nepal

Cybertech Nepal is committed to provide high-quality cyber security solutions, including server assessment and hardening, forensics and malware analysis, end-point threat analysis, and VAPT.

Resemble AI

Resemble AI

Resemble AI is an innovator in Generative Voice AI technology and tools to combat AI fraud including audio watermarking and deepfake detection.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

Tranchulus

Tranchulus

Tranchulus are a global provider of offensive and defensive cyber solutions, information security assessment, compliance and managed security services.

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.