CS1705
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
mobile management<br />
tethering their mobile device when<br />
they're in the office, because they want<br />
to go to websites that are blocked on<br />
the corporate gateway." This is once<br />
again opening up security issues for<br />
businesses, he warns.<br />
"Both the enterprise and the end user<br />
have an interest in making sure their<br />
sensitive mobile data is secure. But end<br />
users also don't want to feel like a 'Big<br />
Brother' is watching their every move<br />
on their BYOD devices; which is why a<br />
solution that simultaneously protects end<br />
user privacy, without compromising<br />
business-critical reporting, traffic control<br />
or device management, is so important,"<br />
adds Covington.<br />
KEY ATTACK POINTS<br />
Michael Shaulov, head of mobility<br />
solutions, Check Point, believes there<br />
are five major categories of attack and<br />
vulnerabilities that organisations need to<br />
protect their mobile fleets against, which<br />
demand multiple mobile security<br />
capabilities.<br />
The first is system vulnerabilities. "Each<br />
version of a mobile operating system will<br />
contain vulnerabilities that criminals can<br />
use to launch attacks. Devices need<br />
to be continually analysed to uncover<br />
vulnerabilities and the behaviours that<br />
cyber criminals use to attack them. When<br />
a threat is identified, the solution must<br />
automatically mitigate any risk until the<br />
threat is eliminated," he states.<br />
Next comes root access and<br />
configuration channels. "Root access<br />
enables a wide range of customisations<br />
and configurations, and gives criminals<br />
greater access, which exposes devices<br />
and data to risk," Shaulov points out.<br />
"Criminals can even bypass MDMs using<br />
relatively simple techniques, so it's<br />
necessary to monitor all configuration<br />
changes and use behavioural analysis to<br />
detect unexpected system behaviour."<br />
Then there are repackaged and fake<br />
apps. "Malicious apps can take complete<br />
control of mobile devices. It is remarkably<br />
easy for criminals to reverse-engineer<br />
popular apps or to create seemingly<br />
authentic copies of existing ones. In turn,<br />
these apps can be used to gain remote<br />
access to the device or download<br />
malicious payloads. Apps' installation<br />
processes should be monitored and run<br />
in a quarantined 'sandbox' environment<br />
to analyse their behaviour."<br />
Fourth on his list are Trojans and<br />
malware. "An app's code is huge and<br />
complex, making it difficult to identify<br />
a Trojan's malicious activity. A security<br />
solution should capture apps and<br />
automatically reverse-engineer them,<br />
enabling analysis that identifies<br />
suspicious patterns and behaviours."<br />
Fifth, Man-in the-middle attacks. "Manin-the-middle<br />
attacks can eavesdrop,<br />
intercept and alter traffic between two<br />
devices," he says. "Enterprises need<br />
behavioural analysis that can detect<br />
rogue hotspots and malicious network<br />
behaviour and conditions, and<br />
automatically disable suspicious networks<br />
to keep devices and data safe."<br />
Finally, he advises that this system of<br />
mobile security components must work<br />
together cohesively to identify a wide<br />
variety of threats, protect data and<br />
address employee privacy concerns,<br />
rather than being a loosely-integrated<br />
mix of point products. "The solutions<br />
have to be able to analyse behaviour<br />
across all possible vectors for indicators<br />
of attack, to keep mobile devices safe."<br />
SECURITY HEADACHE<br />
According to Mark Noctor, VP EMEA at<br />
Arxan Technologies, "a mobile-ready<br />
workforce can deliver some powerful<br />
advantages, in terms of flexibility and<br />
Dave Williams, 3M: another factor to<br />
consider is the 'low tech' one of prying<br />
eyes.<br />
Michael Covington, Wandera: both the<br />
enterprise and the end user have an<br />
interest in making sure their sensitive<br />
mobile data is secure.<br />
www.computingsecurity.co.uk @CSMagAndAwards May/June 2017 computing security<br />
27