Safeguard mobile devices

September 2009 Products & Solutions

Companies must pay close attention to the new security risks that mobile devices such as smartphones are prone to, and ensure that they have the right measures in place to protect the enterprise.

Many companies in South Africa are starting to roll out mobile devices to boost the productivity of their mobile workers. However, the lure of empowering employees and making them more efficient (for example, BlackBerry smartphone users save an average of 60 minutes a day, according to Ipsos Reid) should be balanced with the need to secure the information that can be accessed on them.

One threat that is growing in significance as more users count on smartphones for business applications is mobile malware. Just like PC viruses, malicious code has the potential to run undetected on a smartphone and wreak havoc within a corporate network.

Malware protection

Viruses, Trojans, worms, and spyware – collectively referred to as malicious software or malware for short – can be calibrated to load themselves onto vulnerable smartphones with poor security, and run without user knowledge or action. Once they have burrowed their way into a smartphone, malware programs can cripple the device by effectively using all its available memory. A more dangerous malicious program could transmit itself across the wireless network, bypassing some of the corporate network security systems, and potentially damage or infiltrate other components of the corporate network.

Most enterprises count on realtime anti-virus scanning software to prevent the transmission and proliferation of malware on computers. However, smartphones are a different kettle of fish in so far as they are constrained by finite memory, processing power, and battery life. This means that the standard computer network approach of detecting malware using a large, frequently updated, local database or a constant connection to an online database has to be tailored.

Alternative approaches

A superior approach to protect against malware on smartphones is to proactively prevent loading or running unauthorised code. This can give system administrators the ability to perform the following actions:

* Specify exactly which applications – trusted, corporate-approved applications only – are permitted on the device.

* Prevent third-party applications from using persistent storage on the device.

* Determine which resources, such as e-mail, phone, and device encryption key and certificate store, third-party applications can access on the device.

* Restrict the types of connections, such as network connections inside the firewall that a third-party application running on the device can establish.

* Block all third-party applications from loading onto and running on the device.

Attachment viewing and malware

E-mail attachments that users open on smartphones can contain viruses and other malware. Proactive solutions using a malware-detecting attachment service employ renditions rather than supporting native files. In this scenario, the user can still view and manipulate the data, but the file is not opened natively on the device itself.

This measure is designed to prevent malicious applications from accessing data on the device. If a wireless solution includes a remote, protected server to perform attachment-related actions, the attachment-processing server can still be vulnerable to attack from viruses and other malware. However, it is easier for the IT department to manage and update software on this server rather than on a smartphone, which can help prevent these attacks – plus the server is not constrained by processing power or battery life.

Role of a firewall

The corporate firewall is a critical component in protecting an organisation’s data and can guard against attack or malicious use. Ensuring that data sent to and from a smartphone is housed within a firewall can safeguard corporate information as encryption technology can be employed for protection in transit, eliminating the opportunity for tampering or corruption. It is also advisable to ensure that the connection over the wireless network is secure to maintain confidentiality, authenticity and integrity of the data transmitted.

To protect their mobile devices and networks from malware, CIOs should invest in mobile solutions that have security baked into the devices and supporting infrastructure. These security features built into the solution need to be as unobtrusive as possible so that they don’t detract from the ease of use of the device or the end-user’s efficiency and productivity.

It is critically important to look for solutions that give network administrators the ability to centrally set and manage policies, such as which applications users may install on their smartphones. Mobile devices such as smartphones are integral parts of many enterprises’ business processes, and should be secured with as much care as PCs and the corporate network.

Deon Liebenberg, regional director for Sub Sahara Africa at Research In Motion (RIM)
Deon Liebenberg, regional director for Sub Sahara Africa at Research In Motion (RIM)

For more information contact Deon Liebenberg, RIM, +27 (0)82 990 4777, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...
Putting security in gear
Asset Management Products & Solutions
The inaugural Securex Cape Town 2025 will showcase a number of companies focused on vehicle and fleet security on South Africa’s dangerous and often crime-infested roads.

Read more...
Managing assets and clear communication
Asset Management Products & Solutions
Communication is essential for security management as well as efficient asset control. A few companies at Securex Cape Town 2025 might have the solution you are looking for.

Read more...
Drones and a hint of access control
Surveillance Products & Solutions
Drones are an indispensable tool for security operations, with more functionality and capabilities than ever. Securex Cape Town 2025 will naturally have drone service providers available to light the way for interested parties.

Read more...
Advanced time & attendance solutions
Technews Publishing Access Control & Identity Management Products & Solutions
From biometric devices to a powerful mobile app, you will see how businesses of all sizes save time, cut costs, and improve productivity with BioSyn.

Read more...
See crime stopped in seconds
Products & Solutions Security Services & Risk Management
Fog Bandit, a leader in security fog, is bringing its instant crime-stopping technology to Securex Cape Town 2025. Experience the innovation trusted worldwide to protect retailers, warehouses, and high-value sites.

Read more...
Electrical fire safety in lithium-ion battery rooms
Fire & Safety Residential Estate (Industry) Products & Solutions
Pratliperl is a non-combustible, ultra-lightweight aggregate that can be mixed with cement and applied as a plaster or screed to walls, floors, and ceilings. When applied at just 30 mm thickness, it delivers a two-hour fire rating.

Read more...
The first choice for electric fence management
Stafix Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) Products & Solutions
In South Africa, over 500 housing estates use JVA Perimeter Patrol, making it a widely used Electric Fence Management providing seamless integration with alarms, CCTV, VMS, access control and control room third-party software.

Read more...
New JVA MBxL energiser range
Stafix Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) Products & Solutions
The latest MBxL energisers stand out for their simplicity, allowing you to push the “On” button and have the unit tick away, or to configure it through our virtual keypad (VKP).

Read more...
Secure, long-distance thermal from Keenfinity
Products & Solutions Surveillance Residential Estate (Industry)
The DINION thermal 8100i camera is a bullet thermal camera built for mission-critical applications, prioritising long-distance monitoring and reliable perimeter intrusion detection with built-in Intelligent Video Analytics (IVA) Pro Perimeter video analytics.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.