Analysis: Mobile Security Opportunities For Good Guys And Bad Guys

McAfee Unveils Mobile Security Blueprint
New Android Vulnerabilities Discovered
Trend Micro Unveils Android-based Security
Startup Lookout Mobile Security Scores $40 Million In VC Funding

The common thread through all those stories is, of course, the growing risk posed to mobile information technology, and what looks to be the beginning of a rush to plug holes that threaten data security like never before.

From our vantage point in the CRN Test Center, there are three significant trends emerging that will force solution providers to map out their strategy for protecting customers:

- With smart phones and tablets, the volume of data created at the source – to be uploaded or shared with an enterprise – is growing exponentially as more apps every day enable scanning, photography, video, audio, Point-of-Sale and more. This means that limiting the use of tablets and smart phones will put an enterprise at a competitive disadvantage, but failing to secure those devices will put an entire business at risk;

- While the amount of money flowing into mobile app and hardware development is growing significantly, there’s little evidence that IT budgets for security are growing in kind. That means that solution providers, as well as device manufacturers, will be confronted with expanding responsibility for keeping tablets, smart phones and enterprises safe from malicious code, shoddy practices and more – but in an economical way;

id
unit-1659132512259
type
Sponsored post

- Device manufacturers have begun to deal with the issue of providing a safe software ecosystem for mobile devices, even if it is moving slowly. Toshiba and Lenovo, for example, are providing online stores with quality-vetted apps to provide an extra measure of comfort for enterprises. This is a good start, but over time much more will need to be accomplished and it might be nice to see these companies begin some sort of a cooperative effort for battling hackers and purveyors of malicious code.

For now, the opportunity for hackers and those dealing in malicious code is significant: the window is fairly wide open to create havoc on mobile platforms – particularly Android, which has become to hackers like light to moths. Their chances to commit economic and technical mischief, or worse, remain frightening.

The opportunity for the good guys, though, is to work with enterprises on ensuring all the traditional best practices are maintained, to drive expertise in data security to more areas of the enterprise and to work with best-of-breed technology providers