123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

There’s Not An App For That – Mobile Security Ditches The Device Agent

Profile Picture
By Author: Skyhighnetworks
Total Articles: 54
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

“It’s not easy getting 10,000 people, all with different mobile phones and operating systems, to install a software agent,” says Adrian Broeke, VP of IT Security, discussing the last time the company rolled out a Mobile Security initiative. “At least with cats you don’t have calls to the IT help desk.”

Installing an agent, or a small piece of software on a smartphone, was a key ingredient in many mobile device management (MDM) solutions. Now, security teams are looking for less intrusive ways to achieve similar results without having to put a software footprint, and maintain it up to date, across thousands of handsets with different operating systems and quirks.

By all accounts, the BYOD or bring your own device movement is in full swing. About 3 out of 4 American workers bring a mobile device to work and use it to accomplish part of their job. That means corporate data is being put onto these unmanaged mobile devices, or more likely put into cloud services which are accessed by apps on the mobile device.

“When you look at mobile ...
... usage, 86% of what people do on the phone is in an app, not a web browser,” says Broeke. In fact, many phones like those running Apple iOS don’t allow the end user to access the file system at all. That means any data on the phone is accessed through the apps, and is increasingly being stored in the cloud.

The widespread availability of 4G high speed internet on mobile is making it even easier to store data in the cloud. Many employees report they use their phones for many kinds of work, ranging from salespeople accessing sales contacts via Salesforce 1, a mobile app for the company’s IT procured Salesforce.com system. But employees are also using a wide range of other types of apps.

Many of those apps are not approved or vetted by the IT security team, and some do not meet the security needs of the company. That’s why they have moved to a new form of agentless mobile security that inspects all cloud traffic and enforces encryption and access control policies across cloud services.

Author :
Skyhigh Networks, the Cloud Security Services company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com/mobile-security/ or follow us on Twitter@skyhighnetworks.

Total Views: 353Word Count: 459See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: