If you’re struggling to put together the ideal mobile threat defense solution for your enterprise, don’t worry: you’re not alone, and I’ll share some information that will help clarify what you need and how to deliver it. For context, though, let’s start with a little history: when mobile devices started to proliferate enterprises, the market’s first response was Mobile Device Management (MDM) software, which primarily let enterprises manage the device itself with capabilities like policies, app catalogues, pre-defined WI-FI settings, remote wiping and locking.
As time went on, enterprises realized they needed more than device-level management, and MDM began to evolve into something bigger: Enterprise Mobility Management (EMM). This new breed of solution extended the management reach from just the device into things like the application and information level, introducing capabilities like app wrappers, app access control, geo-fencing, and oversight and control of content (like copy and paste restrictions).
Once again, however, mobile devices continued to evolve, and as they’ve grown in popularity and functionality, they’ve become increasingly popular targets for attackers. As such, an additional solution has emerged: Mobile Threat Defense (MTD).
As Gartner states in their recent report, When and How to Go Beyond EMM to Ensure Secure Enterprise Mobility, “MTD solutions provide security at three levels — the device (through behavioral anomaly detection and vulnerability assessments), the app (through reputation scanning and code analysis) and the network (through monitoring network traffic and automatically disabling suspicious networks from mobile devices).”
I know, that’s a lot of acronyms, but that’s where we stand today: two solutions that provide two unique sets of capabilities to provide a comprehensive mobile architecture to enterprises. While EMM provides the management and enablement capabilities, MTD provides the proactive mobile security capabilities.
Regardless of which EMM solution you may already be using, Skycure Mobile Threat Defense solution works well alongside each one. The most popular EMM solutions offer three primary areas of functionality:
- Mobile Device Management (MDM), where enterprises perform core management of the devices themselves, including policy enforcement, from a single management console.
- Mobile Application Management (MAM), where enterprises manage access and connectivity at the app level, keeping employees functional and productive on any device.
- Mobile Content Management (MCM), where enterprises control the access, distribution and synchronization of data, both on the device and in your datacenter.
EMM solutions, at their core, empower productivity for end users on mobile devices and enforce policies to keep organizations (and data) safe. Think of the EMM (specifically the MDM component) as “the locks on the door” and it’s policies determine who has keys.
As we all know, locks on the doors are great. For most cases, that’ll be sufficient to keep the right people in and the wrong people out. But, what about the determined thief who cases the joint to find the weak windows, or knows how to pick locks or steal keys from unsuspecting workers. For those scenarios, we seek additional protection, perhaps an armed guard and a neighborhood watch, a system that has intelligence and the ability to observe and respond to suspicious or malicious behavior. That’s exactly where Skycure’s mobile threat defense solution comes in – to extend and compliment the capabilities of the EMM solution.
Skycure’s multi-layered solution has functions integrated across the device itself, the apps, and the network, thus providing additional security protections across all mobile attack vectors, which include:
- Malicious Apps, making sure that only legitimate, safe applications run on end user’s mobile devices, and preventing things like repackaged apps, spyware, ransomware, and keyloggers.
- Network-based Attacks, making sure that wireless networks are secure and respect trusted communications, which prevent things like man-in-the-middle attacks, SSL decryption, SSL stripping, content manipulation, and ARP spoofing.
- Vulnerability Exploits, making sure that a mobile device’s software is up to date with all of the latest security patches, and monitoring for configuration vulnerabilities and breaches in system integrity, preventing attackers from deploying things like iOS malicious profiles, Stagefright exploits, rooting and jailbreaking, and accessibility clickjacking.
Skycure is able to provide real-time intelligence about the risks and threats to the mobile device. In addition to responding immediately to protect itself and the corporate data the device has access to, Skycure is able to share that information with the EMM so it is able to make smarter decisions about applying and enforcing policies. For example, if the risk level of a device increases, due to the successful installation of a malicious profile, Skycure will determine that the device is not in compliance with the company’s policy. This will be communicated to the EMM, which will apply the appropriate policy, which may include blocking access to Exchange and other services from that device. Note the user may still access email from a different device, since it is the device and not the user that is compromised in this case. Skycure provides the user with detailed information about the risk and how to remove it, and as soon as the risk has been removed, the EMM will be notified to restore full access.
In short, a complete enterprise mobility solution today involves both components: EMM and MTD. So Skycure integrated with EMM delivers a comprehensive architecture for complete and secure enterprise mobility, as illustrated below:
With this combination, you deploy a solution that spans rollout, management, maintenance, monitoring, and comprehensive security – thereby providing the depth and breadth that enterprise IT and CISOs need. Mobile management and security isn’t going to get any easier- it’s going to continue to evolve. As such, CISOs should focus on deploying a robust, dynamic mobile architecture now, so that their devices, users, and data will be protected properly well into the future. Today, that architecture should include both EMM and MTD.
If you’d like more information on Skycure and EMMs, be sure to check out our customer testimonial video from one of our customers, RNDC or watch the video below on how Skycure compliments EMM.