Skycure gives BYOD and enterprise users powerful new mobile threat defense capabilities to proactively identify and stop advanced cyber attacks attempting to exploit the Four Horsemen of Mobile Security.
As mobile web traffic finally eclipsed total desktop web traffic early last year, two mobile truths are characterizing the tipping point for enterprises:
Mobile Truth #1: Cyber threats are all-pervasive. As enterprise mobility has evolved with smarter, more context-aware and automated services and apps, hackers have also evolved. Cyber attackers leave no stone unturned when it comes to trying new ways to steal sensitive data. Consequently, enterprises can no longer treat cyber attacks as “incidents” requiring all-or-nothing approaches to remediation, i.e. shutting down company smart phones and other devices. Besides, BYOD users are not particularly keen on allowing their employers to take over their devices.
Mobile Truth #2: Downtime is no longer tolerated. Clearly, enterprises are rethinking how to protect devices and remediate cyber threats without slashing into critical user enablement. Also, BYOD users with “dual personas,” conducting personal and business tasks on the same devices, are not receptive to all-or-nothing mobile security approaches such as containerization and VPN tunneling—both impinging on user privacy.
Responding to the Mobile Truths
Traditionally, enterprises have settled on reactive mobile security. Today, enterprises can easily transform their EMM by integrating their MobileIron deployment with a mobile threat defense (MTD) solution. It all starts by downloading and running a non-invasive, always-on app such as Skycure (available on both iOS and Android), the world’s leader in MTD. Skycure, like a guardian angel for devices, actively identifies and protects devices from attacks before they can wreak havoc by feeding real-time monitoring data to MobileIron.
Want to learn how you can easily add Skycure advanced mobile threat defense to your MobileIron? Join James Plouffe, Solution Architect, Business Development at MobileIron and Varun Kohli, Vice President, Marketing at Skycure in this live webinar.
Free Webinar: “How to Add Advanced Threat Detection to Your MDM”
Date: June 4, 2015
Time: 10AM (PT)/1PM (ET)
The Four Horsemen of Mobile Security
An essential aspect of MTD is to provide multi-level security, protecting the Four Threat Vectors of Mobility as follows:
- Device/Physical Threats: MDM and EMM solutions are a great way to manage devices, enforce passcodes, remotely wipe them in case of a compromise and enforce a rich set of BYOD, security and compliance policies. MTD helps EMM/MDM solutions by adding active threat detection and risk-based mobile management to protect devices against advanced threats.
- Network Threats: Mobile devices connect to 10 to 100-fold more networks than traditional PCs. Attacks such as traffic redirection, decryption and MiTM (Man-in-the-Middle) can steal sensitive information by exploiting vulnerabilities in WiFi networks—sometimes attacking devices with WiFi deactivated. Device owners may not realize that even if their WiFi is turned off, their devices may still join a malicious network and leak sensitive corporate information.
- Malware: Enterprises find it hard to monitor apps and protect devices from malicious downloads, especially, in regards to apps downloaded from third-party app stores outside of iTunes or Google Play. It is difficult, if not impossible, to enforce mobile security policies regarding downloading apps on employees’ BYO devices. Even company-owned devices are subject to “shadow IT,” the downloading of apps that employees require for productivity.
- Vulnerabilities: Given the pace of mobile innovation and low barrier to entry for creating a mobile app, both apps and operating systems are full of vulnerabilities. In the recent past, Skycure researchers have discovered and disclosed a multitude of these vulnerabilities such as “No iOS Zone”, Malicious Profiles, Invisible Malicious Profiles, and LinkedOut. Devices without the most up-to-date versions of OS and apps are naked to attackers, who can search out such devices.
Register Today: “How to Add Advanced Threat Detection to Your MDM”
Date: June 4, 2015
Time: 10AM (PT)/1PM (ET)