The Mobile Security Fight Has Found A New Direction

Contributor: Jason Koestenblatt
Posted: 01/24/2018
Image: 
EME JMR Callback Art

Enterprise mobility: The foundation in which many organizations are now conducting business, putting technology at the top of the list when it comes to strategy and road mapping the future.

Mobile security: The most important piece to the enterprise mobility puzzle.

The two, of course, are not mutually exclusive. In fact, you can’t have one without the other.

So in the last decade, mobility – while not proliferating as quickly as some would like – is still a main pillar for enterprise success, there’s no questioning that. Along with it comes new threat vectors, additional touch points for malicious intent brought forth by hackers, and an unlocked front door to the enterprise’s most prized asset: confidential data and information.

Solution providers hopped aboard the security train more out of necessity than willful product launches, and created tools like Enterprise Mobility Management (EMM) suites, Mobile Device Management (MDM) capabilities, and other pieces that could drill down to singular applications and management of those. But as with any technology solution, there continues to be an evolvement, and the mobile security world is having a transformational moment.

Interested in learning more about this topic?
EME JMR Art
Securing Mobility With Next Generation Authentication
Enterprise mobility has one necessity: security. Protecting devices and data has a new path set before it.

That moment is gearing toward Next Generation Authentication, which includes native device capabilities like biometrics, single sign-on, and even behavioral authentication practices.

This shift is outlined in a recent market report, titled "Securing Mobility With Next Generation Authentication," which can be downloaded by clicking here. In the report, Aetna’s Senior Director of Global Security Innovation, Brian Heemsoth, said, “The most basic reason we have smartphones with collaboration tools at work is to be efficiently productive. But there’s a hindrance in the amount of security controls that must be put in place. Having email on your phone is great, but having to type a nine-digit passcode to access it isn’t.”

Further, recent predictions showed all smartphones manufactured by the year 2020 would have biometric capabilities, giving enterprises a wider scope of opportunity and possibility, rather than having to chase down equipment and hardware only being developed for custom purposes.

But how is this move to new technologies going to impact my employees’ workflows? How much disruption will there be, and is it even worth it? Those are just some of the questions mobile administrators and security professionals alike are asking themselves. And there are simple answers: yes, it is necessary.

“Certainly, NGA is a necessary move for enterprise mobility,” said Michela Menting, Digital Security Research Director with ABI Research. “I think there is a perception that such technologies, much like others in the security space, are a hindrance to users and disrupt usability of a tool (whether business or personal). While it is true that some authentication technologies do, there is constant effort in the space to streamline operability and security. But the most important element to consider is that those security interruptions are there for a reason, and many tend to forget that. (Conversely) The digital risks are great, and increase every day.”

Mobile security is one of the absolutes in technology. Cloud can or cannot be used, depending on enterprise choice; same goes for innovations such as artificial intelligence and IoT. But mobile security is a necessity, not an option.

Learn more in the full, downloadable report, here

Jason Koestenblatt
Contributor: Jason Koestenblatt