In addition to network access control technologies designed to control access to corporate network resources, businesses are considering mobile device management technologies to oversee BYOD and are even looking at virtualization technology to satisfy laptop and mobile device risks, West Coast Technology's Hoblin said.
"It's finally becoming an increased awareness for most organizations," Hoblin said. "Up until now, they've been less willing to spend money to solve these issues."
Google's Ludwig also pointed out in the blog the software maker's support of security researchers via the Pwn2Own Mobile security competition at the PacSec Applied Security conference held last month in Tokyo. No exploits were used against Android, Ludwig wrote, but providing devices to hacking contests helps bolster security and gives engineers a way to test device security controls against new threats and bypass techniques, he said.
Businesses have to decide how to address mobile threats based on their security posture, said Tony Giandomenico, director of business solutions at Honolulu-based managed security services provider Referentia Systems Inc. Firms dealing with more sensitive information or those involved with critical infrastructure might restrict mobile devices from accessing internal resources. Other firms allow open access, Giandomenico said.
"We're entering that stage where businesses are beginning to execute against a mobility strategy," he told CRN in a recent interview. "Every business will have a unique way of dealing with mobile threats."
PUBLISHED DEC. 3, 2013