23.05.2017 Views

CS1705

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

mobile management<br />

tethering their mobile device when<br />

they're in the office, because they want<br />

to go to websites that are blocked on<br />

the corporate gateway." This is once<br />

again opening up security issues for<br />

businesses, he warns.<br />

"Both the enterprise and the end user<br />

have an interest in making sure their<br />

sensitive mobile data is secure. But end<br />

users also don't want to feel like a 'Big<br />

Brother' is watching their every move<br />

on their BYOD devices; which is why a<br />

solution that simultaneously protects end<br />

user privacy, without compromising<br />

business-critical reporting, traffic control<br />

or device management, is so important,"<br />

adds Covington.<br />

KEY ATTACK POINTS<br />

Michael Shaulov, head of mobility<br />

solutions, Check Point, believes there<br />

are five major categories of attack and<br />

vulnerabilities that organisations need to<br />

protect their mobile fleets against, which<br />

demand multiple mobile security<br />

capabilities.<br />

The first is system vulnerabilities. "Each<br />

version of a mobile operating system will<br />

contain vulnerabilities that criminals can<br />

use to launch attacks. Devices need<br />

to be continually analysed to uncover<br />

vulnerabilities and the behaviours that<br />

cyber criminals use to attack them. When<br />

a threat is identified, the solution must<br />

automatically mitigate any risk until the<br />

threat is eliminated," he states.<br />

Next comes root access and<br />

configuration channels. "Root access<br />

enables a wide range of customisations<br />

and configurations, and gives criminals<br />

greater access, which exposes devices<br />

and data to risk," Shaulov points out.<br />

"Criminals can even bypass MDMs using<br />

relatively simple techniques, so it's<br />

necessary to monitor all configuration<br />

changes and use behavioural analysis to<br />

detect unexpected system behaviour."<br />

Then there are repackaged and fake<br />

apps. "Malicious apps can take complete<br />

control of mobile devices. It is remarkably<br />

easy for criminals to reverse-engineer<br />

popular apps or to create seemingly<br />

authentic copies of existing ones. In turn,<br />

these apps can be used to gain remote<br />

access to the device or download<br />

malicious payloads. Apps' installation<br />

processes should be monitored and run<br />

in a quarantined 'sandbox' environment<br />

to analyse their behaviour."<br />

Fourth on his list are Trojans and<br />

malware. "An app's code is huge and<br />

complex, making it difficult to identify<br />

a Trojan's malicious activity. A security<br />

solution should capture apps and<br />

automatically reverse-engineer them,<br />

enabling analysis that identifies<br />

suspicious patterns and behaviours."<br />

Fifth, Man-in the-middle attacks. "Manin-the-middle<br />

attacks can eavesdrop,<br />

intercept and alter traffic between two<br />

devices," he says. "Enterprises need<br />

behavioural analysis that can detect<br />

rogue hotspots and malicious network<br />

behaviour and conditions, and<br />

automatically disable suspicious networks<br />

to keep devices and data safe."<br />

Finally, he advises that this system of<br />

mobile security components must work<br />

together cohesively to identify a wide<br />

variety of threats, protect data and<br />

address employee privacy concerns,<br />

rather than being a loosely-integrated<br />

mix of point products. "The solutions<br />

have to be able to analyse behaviour<br />

across all possible vectors for indicators<br />

of attack, to keep mobile devices safe."<br />

SECURITY HEADACHE<br />

According to Mark Noctor, VP EMEA at<br />

Arxan Technologies, "a mobile-ready<br />

workforce can deliver some powerful<br />

advantages, in terms of flexibility and<br />

Dave Williams, 3M: another factor to<br />

consider is the 'low tech' one of prying<br />

eyes.<br />

Michael Covington, Wandera: both the<br />

enterprise and the end user have an<br />

interest in making sure their sensitive<br />

mobile data is secure.<br />

www.computingsecurity.co.uk @CSMagAndAwards May/June 2017 computing security<br />

27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!