“It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used…”
Gartner Market Guide for Mobile Threat Defense Solutions, John Girard, Dionisio Zumerle, 28 July 2016
Mobile Threat Defense (MTD) solutions protect mobile platforms by detecting threats to devices, operating systems, the networks they use and apps on the device. Each of these vectors is vulnerable to a variety of attack methods. However, some MTD solution providers like Zimperium cover all facets on the device in a single platform.
Many of the MTD solutions will complement existing Enterprise Mobility Management (EMM) solutions that manage the device and data access inside and outside of the enterprise. EMM solutions like AirWatch, MobileIron, XenMobile or BlackBerry manage compliance rules for devices, but depend on MTD to activate compliance rules for cyber threats on the managed devices.
Gartner’s “Market Guide for Mobile Threat Defense Solutions”provides an overview of the market with necessary details to evaluate and make the best decision on how to secure corporate or BYO devices. Here are a few things to keep in mind:
- Device behavioral anomalies — MTD tools provide behavioral anomaly detection by tracking expected and acceptable use patterns.
- Vulnerability assessments — MTD tools inspect devices for configuration weaknesses that will lead to malware execution.
- Network security — MTD tools monitor network traffic and disable suspicious connections to and from mobile devices.
App scans — MTD tools identify “leaky” apps (meaning apps that can put enterprise data at risk) and malicious apps, through reputation scanning and code analysis.
Computing time on mobile creates vulnerabilities and risks to the enterprise. In order to make the most informed decision about how to manage those risks, it’s important to understand the following:
- Mobile is Your Greatest Cyber Vulnerability – Why? Because you are likely not protecting mobile devices from cyber attacks like the rest of your IT infrastructure.
- The Mobile Threat is Real — One Zimperium customer recorded critical threats on 6.2% of its devices in 4 months. This customer previously assumed mobile attacks weren’t happening until they discovered of a rogue access point installed by a spy.
- Real-Time Detection Mitigates Business Risks and Threats — Today’s approach for mobile cybersecurity needs to be real-time, proactive and coupled with the high expectation for privacy.
- Protect the Apps You Develop — To encompass the full security exposure of mobile, you need to consider the apps you are producing for your consumers and partners as well.
- Close the Mobile CyberSecurity Gap —The conversation you start now could go a long way toward reducing your organization’s risks of mobile attacks.
For more information, download Zimperium’s “5 Facts Every Executive Should Know About Mobile Security.”
Gartner subscribers can also download “Market Guide for Mobile Threat Defense Solutions.”