Safeguard mobile devices

September 2009 Products & Solutions

Companies must pay close attention to the new security risks that mobile devices such as smartphones are prone to, and ensure that they have the right measures in place to protect the enterprise.

Many companies in South Africa are starting to roll out mobile devices to boost the productivity of their mobile workers. However, the lure of empowering employees and making them more efficient (for example, BlackBerry smartphone users save an average of 60 minutes a day, according to Ipsos Reid) should be balanced with the need to secure the information that can be accessed on them.

One threat that is growing in significance as more users count on smartphones for business applications is mobile malware. Just like PC viruses, malicious code has the potential to run undetected on a smartphone and wreak havoc within a corporate network.

Malware protection

Viruses, Trojans, worms, and spyware – collectively referred to as malicious software or malware for short – can be calibrated to load themselves onto vulnerable smartphones with poor security, and run without user knowledge or action. Once they have burrowed their way into a smartphone, malware programs can cripple the device by effectively using all its available memory. A more dangerous malicious program could transmit itself across the wireless network, bypassing some of the corporate network security systems, and potentially damage or infiltrate other components of the corporate network.

Most enterprises count on realtime anti-virus scanning software to prevent the transmission and proliferation of malware on computers. However, smartphones are a different kettle of fish in so far as they are constrained by finite memory, processing power, and battery life. This means that the standard computer network approach of detecting malware using a large, frequently updated, local database or a constant connection to an online database has to be tailored.

Alternative approaches

A superior approach to protect against malware on smartphones is to proactively prevent loading or running unauthorised code. This can give system administrators the ability to perform the following actions:

* Specify exactly which applications – trusted, corporate-approved applications only – are permitted on the device.

* Prevent third-party applications from using persistent storage on the device.

* Determine which resources, such as e-mail, phone, and device encryption key and certificate store, third-party applications can access on the device.

* Restrict the types of connections, such as network connections inside the firewall that a third-party application running on the device can establish.

* Block all third-party applications from loading onto and running on the device.

Attachment viewing and malware

E-mail attachments that users open on smartphones can contain viruses and other malware. Proactive solutions using a malware-detecting attachment service employ renditions rather than supporting native files. In this scenario, the user can still view and manipulate the data, but the file is not opened natively on the device itself.

This measure is designed to prevent malicious applications from accessing data on the device. If a wireless solution includes a remote, protected server to perform attachment-related actions, the attachment-processing server can still be vulnerable to attack from viruses and other malware. However, it is easier for the IT department to manage and update software on this server rather than on a smartphone, which can help prevent these attacks – plus the server is not constrained by processing power or battery life.

Role of a firewall

The corporate firewall is a critical component in protecting an organisation’s data and can guard against attack or malicious use. Ensuring that data sent to and from a smartphone is housed within a firewall can safeguard corporate information as encryption technology can be employed for protection in transit, eliminating the opportunity for tampering or corruption. It is also advisable to ensure that the connection over the wireless network is secure to maintain confidentiality, authenticity and integrity of the data transmitted.

To protect their mobile devices and networks from malware, CIOs should invest in mobile solutions that have security baked into the devices and supporting infrastructure. These security features built into the solution need to be as unobtrusive as possible so that they don’t detract from the ease of use of the device or the end-user’s efficiency and productivity.

It is critically important to look for solutions that give network administrators the ability to centrally set and manage policies, such as which applications users may install on their smartphones. Mobile devices such as smartphones are integral parts of many enterprises’ business processes, and should be secured with as much care as PCs and the corporate network.

Deon Liebenberg, regional director for Sub Sahara Africa at Research In Motion (RIM)
Deon Liebenberg, regional director for Sub Sahara Africa at Research In Motion (RIM)

For more information contact Deon Liebenberg, RIM, +27 (0)82 990 4777, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Streamlining security operations in the financial industry
Secutel Technologies Products & Solutions
In the banking and financial industry, false alarms can lead to significant financial implications and operational disruptions for security companies. Unnecessary responses to high-risk commercial sites with valuable assets can result in costly mistakes and inefficiencies.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Save energy with Paxton’s Net2 Access Control
Paxton Power Management Products & Solutions
Paxton offers access control systems that can help save building energy by utilising smart features. This not only has a positive environmental impact but, importantly, helps save businesses money.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
International access manufacturer sets up shop in SA
Technews Publishing Access Control & Identity Management News & Events Products & Solutions
The South African security market can always use some good news, and this year, STid has obliged by formally entering the South African market, setting up its main office in the Boomgate Experience Centre in Roodepoort, Johannesburg.

Read more...
Hik-Connect for Teams released
Hikvision South Africa Products & Solutions Surveillance
Hikvision has released an update for its security management platform; Hik-Connect for Teams not only meets the specific needs of individual users, but also caters to various medium-sized businesses (SMBs) and multi-site management scenarios.

Read more...
Revolutionise your security with integrated solutions
Secutel Technologies Products & Solutions Surveillance
By merging the capabilities of SecuVue and Secutraq, Secutel has forged a robust system empowering users to fine-tune analytics and harness facial recognition, pose detection, and XFS, among other features.

Read more...
Effective access control
Flow Systems Access Control & Identity Management Products & Solutions
Flow Systems has introduced its new Extra Heavy Duty Industrial Rising Vehicle Barrier, which provides a high level of protection. It is a traditional-looking control barrier with the benefits of high-level physical protection.

Read more...
SafeQuip introduces lithium fire extinguishers
Fire & Safety Products & Solutions
With the use of Lithium batteries increasing in many types of portable devices and battery storage solutions, SafeQuip, in partnership with AVD Lithex, is introducing a fire extinguisher aimed at suppressing and extinguishing, and also preventing re-ignition of lithium fires.

Read more...