top of page
  • Staff

The Importance of Mobile Threat Management

Mobile is changing the IT security landscape for organizations looking to protect their corporate information. With the growing increase of remote working and bring-your-own-device (BYOD), cyber criminals are increasingly experimenting with mobile operating systems as a new platform for attack. Recent attacks targeting iOS were XcodeGhost and YiSpecter, and targeting Android were StageFright and Quadrooter.

Currently, the go-to for mobile security is Mobile Device Management (MDM), which, while good, is not enough to protect your corporate data and mitigate risk. MDM focuses more on device configuration – meaning it can configure policies to enforce security, but the technology itself generally lacks the advanced security features that are required to proactively tackle mobile threats in this increasingly complex environment.

In order to mitigate these advanced mobile risks, Gartner has published its “Market Guide for Mobile Threat Defense Solutions.” Mobile Threat Defense (MTD) solutions “protect mobile platforms by addressing threats to devices, OSs, networks and apps.”

Defining Mobile Threat Defense Strategy

So, the question is, what is Mobile Threat Intelligence and why should I care. Let’s take a look at how Gartner has defined Mobile Threat Defense.

“The MTD solutions market is made up of products that protect organizations from threats on mobile platforms, including iOS, Android, and Windows 10 Mobile. MTD solutions provide security at one or more of these four levels:

Device behavioral anomalies — MTD tools provide behavioral anomaly detection by tracking expected and acceptable use patterns.

Vulnerability assessments — MTD tools inspect devices for configuration weaknesses that will lead to malware execution.

Network security — MTD tools monitor network traffic and disable suspicious connections to and from mobile devices.

App scans — MTD tools identify “leaky” apps (meaning apps that can put enterprise data at risk) and malicious apps, through reputation scanning and code analysis.”

These four levels of security clearly define how MTD protects enterprise data on mobile devices for organizations. As mobile continues to grow and provide even more uses it’s important to understand how each of these levels leave you vulnerable and how to protect against it.

Why Implement a Mobile Threat Defense Strategy?

The biggest weakness in mobile security we currently see is that organizations don’t have the intelligence to understand what vulnerabilities they face. In other words, there’s a lack of visibility into the mobile threats. Having an MDM does not mean mobile security, and “as mobile attack techniques become more practical and realistic (for example, the Stagefright vulnerability exploit, the iOS malicious profile and XcodeGhost), enterprises will be required to more quickly “step up their game” in terms of security. Malware, malicious Wi-Fi, jailbreaking, OS vulnerabilities, and leaky apps all make the list of mobile security challenges that many organizations have zero visibility into, or protection against.

Better Mobile Security provides MTD to proactively protect BYOD and corporate-owned mobile devices against known and unknown, zero-day mobile threats. Companies need to implement MDM/EMMs to provide more control and visibility as to what happens on employee and corporate-owned devices, and the ability to correlate those events with they are occurring.

For example:

Security administrators would be able to identify rogue Wi-Fi access points and immediately prevent employees from connecting to them to stop hackers from re-routing sensitive company information. Without MTD, your organization is unable to see which employees are connecting to rogue Wi-Fi outside your company perimeter. Consider if this was one of your top executives and the amount of company data on his/her device. For organizations that access a lot of high privacy data such as finance, healthcare, retail and law firms, it’s important to take a close look at MTD in order to prevent advanced mobile threats before damage can be done.

We identify multiple mobile security suppliers for our clients that are designed to source MDM options or that can integrate with current MDMs to create a seamless process to deploy the MTD agent through an MDM. With zero impact on user experience and no tracking of personal information, your employees will find no disruptions in productivity. In Gartner’s words, “EMM and MTD are better together.” You can now benefit from the synchronous harmony of both solutions ensuring your devices are configured and compliant with MDM and safely protected from malware, rogue networks, and other advanced mobile attacks with MTD.


Looking for more relevant solutions like this one for your organization? From cutting-edge cyber-security trends to adaptive network solutions and all the high-value services we offer in-between, you’ll find what you need at Netari Global Communications.

For more information about mobile security or other services, complete our Contact Form or give us a call at (813) 343-0440.

Cyberthreat Real Time Map:

#mobilesecurity #threatmanagement #threatintelligence

11 views0 comments