TMCnet News
One in Ten Enterprises Have at Least One Compromised DeviceMOUNTAIN VIEW, Calif., Nov. 3, 2015 /PRNewswire/ -- As employees choose smartphones and tablets to do work, mobile apps become critical business tools. With recent mobile attacks such as XcodeGhost, Stagefright, Key Raider, and YiSpecter, an unprecedented amount of mobile business data has been put at risk. MobileIron today released new statistics on the "State of App Security," including insights about how companies are using and protecting mobile apps. "As more business processes are mobilized, hackers look to mobile apps to capitalize on enterprises' inability to prevent and detect mobile threats," said Mike Raggo, Director of Security Research at MobileIron. "To protect sensitive data against the threats of tomorrow, enterprises need to rethink their security approach for a fundamentally different mobile architecture."
Apps are gaining ground The top third-party apps that are currently deployable across MobileIron's customer base include:
MobileIron customers have also deployed more than 300,000 apps that were built in-house for employee use. Top blacklisted consumer apps
Mobile apps are at risk The challenge with mobile devices and apps is that the user -- and not the IT administrator -- is generally in control. Devices fall out of compliance for a variety of reasons. For example, a device will fall out of compliance if the user jailbreaks or roots their device, if the device is running an old version of the operating system that IT is no longer supporting, or if the user installed an app that IT has blacklisted. MobileIron has found that:
In these scenarios, traditional security technologies can't take the necessary actions to protect corporate data, but MobileIron can. When a device falls out of compliance, MobileIron automatically takes actions to protect corporate information, such as sending an alert to the user, blocking the device and apps from accessing corporate resources, or even wiping all corporate email and apps. "Today's organizations have far too many disparate security technologies that are rarely fully integrated with each other. Even when integrated, they rarely include information about mobile devices and apps," Raggo continued. "The good news for companies using an enterprise mobility management solution is that they have the information they need about the state of mobile devices and apps to protect corporate information." Top reasons devices fall out of compliance These are the top reasons that devices fall out of compliance with corporate policies:
Time to rethink mobile security "Companies that rely on legacy security technologies without a presence on a mobile device or those that only use ActiveSync to manage mobile devices are very vulnerable to breach," said Raggo. "Companies using an EMM solution can rely on several proactive and reactive countermeasures, including the ability to detect risky apps and behaviors, quarantine devices, and perform selective wipes, among others." About MobileIron Logo - http://photos.prnewswire.com/prnh/20140923/147891 To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/one-in-ten-enterprises-have-at-least-one-compromised-device-300170872.html SOURCE MobileIron |