Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security
The 5 Questions Modern Organizations Are Asking
Whitepaper
Executive Summary
The modern organization has recognized the need to embrace
mobile devices in the workplace. Some have fully implemented
security concerns.
put at risk
Forrester Research, Building The Business Case For A Bring-Your-Own-Device (BYOD) Program, Michele Pelino, December 2014
CSO Online, CSOs 2015 Mobile Security Survival Guide, George V. Hulme, January 2015
lookout.com
Whitepaper
Risky apps
At first glance, it might be tempting to consider any app that
accesses your employees contact data to be risky, but would
you consider the LinkedIn app risky because it requires access
to contacts? Maybe not, but what about the aggressive piece of
adware that lives on your CEOs device, which sends contact
and browser history data to an unknown server in Russia?
Malicious apps
Recently, NSA Director Adm. Michael Rogers warned of
increasing cyberattacks on mobile devices as a coming trend 3.
But why would an attacker choose a mobile device as the attack
surface into your organization among the many options? The
answer is nicely summarized in CSOs 2015 Mobile Security
Survival Guide: malware is getting better and attackers are
targeting mobile more because thats where the data resides. 4
We also know that mobile platforms are inherently application-
Focus on Visibility
A risky app is in the eye of the beholder, but at the very least
you need visibility into the apps on your network and their
Wall Street Journal, NSA Director Warns of Dramatic Cyberattack in Next Decade, Siobhan Gorman, November 2014
CSO Online, CSOs 2015 Mobile Security Survival Guide, George V. Hulme, January 2015
Gartner, How Digital Business Reshapes Mobile Security, Dionisio Zumerle, Nathan Hill, February 2015
lookout.com
3
2
Whitepaper
vetted by Apple.
Play Store and App Store are considered sideloaded apps and
are inherently risky due to the simple fact that they bypass the
Focus on Visibility
Apple in particular has a great reputation for keeping the App
Store free of malware, but theres an emerging threat vector
for sideloaded apps on iOS that does not require jailbreak:
apps that abuse enterprise provisioning profiles.
Companies increasingly build and distribute custom iOS apps
Gartner, Protecting Mobile Devices Against Malware and Potentially Unwanted Applications, Patrick Hevesi, Mario de Boer, March 2015
lookout.com
Whitepaper
How many iOS and Android devices on our network have been
jailbroken or rooted?
It is generally well understood by security professionals that
if a devices underlying operating system is compromised, then
its game over. Any software-based attempts to protect the data
on the device can be rendered useless, including data containers
and anti-malware solutions. A couple quick definitions:
iOS jailbreaking: The process of removing hardware
restrictions on the operating system (breaking the device
out of its jail) by modifying iOS system kernels to allow file
Prevalence
Estimates on the prevalence of this behavior vary by platform,
but recent studies suggest around 8% of iOS devices are
jailbroken7, and upwards of 27% of Android devices.8
Technical Risks
bloatware
Daily Tech, WireLurker Malware May Have Infected 100,000+ iPhones, No Jailbreak Required, Jason Mick, November 2014
Know Your Mobile, How To Root Your Android Phone, Richard Goodwin, February 2015
lookout.com
Whitepaper
Focus on Visibility
For many organizations, MDMs and containers are important
layers in their mobile security stack. However, many CISOs
recognize the gaps that need to be filled so the organization
can have visibility into advanced mobile malware and
jailbroken/rooted devices.
Critical Gaps
Jailbreak/Root Detection As we discussed in the last
section, if a device has been jailbroken or rooted then your
existing security investments can be rendered ineffective.
Risks
MDM Protection
Lost device
App distribution
Policy violations
Data leakage
Jailbreaking
and rooting
Malicious apps
X No Protection
Forrester Research, TechRadarTM: Enterprise Mobile Security, Q4 2014, Tyler Shields, November 2014
10
CSO Online, CSOs 2015 Mobile Security Survival Guide, George V. Hulme, January 2015
11
Gartner, How Digital Business Reshapes Mobile Security, Dionisio Zumerle, Nathan Hill, February 2015
X None
! Limited Protection
Protected
lookout.com
Whitepaper
user data. 14
Focus on Visibility
Modern organizations recognize that user experience is
designed for.12
12
Gartner, How Digital Business Reshapes Mobile Security, Dionisio Zumerle, Nathan Hill, February 2015
13
Forrester Research, TechRadarTM: Enterprise Mobile Security, Q4 2014, Tyler Shields, November 2014
14
Gartner, Cool Vendors in Security Infrastructure Protection, 2015, Ray Wagner, Joseph Feiman, Avivah Litan, Neil MacDonald, Lawrence Orans, Peter
Firstbrook, John Girard, Dionisio Zumerle, April 2015
lookout.com
Whitepaper
access to the bank vault was becoming easier via air ducts
and pipes? At the very least youd want that bank to install
Heres another way to think about it. If your local bank only
Visit lookout.com/mobile-threat-protection
Or contact us at [email protected]
lookout.com