How to Avoid the Achilles’ Heel of Your Mobile Security


By Chen Landau - Mar-03-2016

Taking in the security buffet that is the RSA Conference is a real eye-opening experience into the tremendous effort and resources that is put into securing the technologies we need to move forward as businesses and customers.
At the Nubo exhibit, we’ve been listening to many stories from security and mobility professionals at different levels about their sore spot – the Achilles’ heel if you will, of their enterprise data security and how this limits their ability to move forward with their greater enterprise strategy. But there’s been a running theme that ties these weak points together, and it’s very much a four-letter word to CISO’s, CIO’s, and IT professionals. You guessed it: B-Y-O-D.
While most enterprises have already accepted BYOD as a necessity for their future growth, most are far from comfortable with how well-positioned they are to deal with the plethora of vulnerabilities, malware and attacks that target their mobile endpoints. Since joining the enterprise ecosystem, employee smartphones and tablets have fast become the weakest link in enterprise security. These current-day mobile computers have become the home for security risks. These risks exploit device OS vulnerabilities, malicious and malware-infested consumer apps, and the unsecured networks they connect to every day, just to name a few examples. Where does that leave your company’s attempts to secure all of the devices and apps in your network? Doesn’t feel very, well, secure does it?
Over 70 percent of enterprises recently admitted in a survey by Ponemon they believe they incurred a data breach because of insecure mobile devices. A recent scan by security firm Webroot of over 20 million apps from app stores reported that more than half were risky if not malicious.
Concerning? Extremely. Surprising? Hardly. Neither is the BYOD reality that you can’t fully protect data on devices that you don’t own. The myth of Achilles’ heel is real, and it lives in the smartphones, tablets and apps of your enterprise mobility program!
So how can your organization go out essentially in to battle against mobile threats day in, day out with greater security? Leave Achilles off of the battlefield! Corporate data is far too valuable and sensitive to leave inside your weakest endpoint.
It’s that motivation that helped us develop Virtual Mobile Infrastructure (VMI) – leave zero data on mobile devices. Keep apps remote where you have full control over your environment, and where you can reinforce and patch your network against vulnerabilities. Under VMI your apps are transferred as a display only to your employees’ devices, but a highly mobile-centric remote display protocol will make them feel as if they’re working with native apps on the device.
MDM (Mobile Device Management) or MAM (Mobile Application Management) approaches use multiple protocols (one for each app). VMI uses just one flat protocol, this greatly reduces attack points that hackers will no doubt try to breach.
It’s been great seeing the reaction of people working with the Nubo player live here at RSA, and seeing their reaction to the combinations of maximum security and native user experience that is available today.
Try Nubo out for yourself on your handheld and let us know what you think at!