Overview

Mobile security or mobile phone security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal information now stored on smartphones.

More and more users and businesses use smartphones as communication tools but also as a means of planning and organizing their work and private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company.

All smartphones, as computers, are preferred targets of attacks. These attacks exploit weaknesses related to smartphones that can come from means of communication like SMS, MMS, wifi networks, and GSM. There are also attacks that exploit software vulnerabilities from both the web browser and operating system. Finally, there are forms of malicious software that rely on the weak knowledge of average users.

Different security counter-measures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end users. There are good practices to be observed at all levels, from design to use, through the development of operating systems, software layers, and downloadable apps.

The Benefits of Mobile Security Solutions

  • Mobile security is needed for compliance.
  • Mobile security solves a major and persistent data security problem.
  • Mobile security gives you a chance to recover your lost mobile device.
  • Mobile security gives you ‘peace of mind’ because you’re ready for disaster.

Mobile Security Solutions

MobileIron
Citrix Endpoint Management
Forcepoint Mobile Security
Blackberry Mobile Security

MobileIron stands out from other MDM vendors by providing expanded EMM capabilities to IT organizations that need to secure mobile devices, applications and content. The MobileIron Enterprise Mobility Management (EMM) solution is a mobile security platform secures data-at-rest on mobile devices, in applications, and in cloud storage, as well as data-in-motion as it moves between corporate networks, devices, and storage repositories.

 

Citrix Endpoint Management goes beyond basic unified endpoint management and delivers unified experience management giving users the ability to access all their apps and files. IT has the ability to manage any device including desktops, laptops, smartphones, tablets and IoT across a number of platforms including iOS, Android, Windows, Chrome OS, and macOS.

Your workforce relies on their iOS and Android devices to stay productive even when they’re on the move. To protect your critical data, you need assurance that their mobile device use remains secure.

Forcepoint Mobile Security delivers this capability for your organization. Forcepoint Mobile Security works with your mobile device manager (MDM) to provide protection to mobile devices. Its data-aware defenses protect against malware, phishing, malicious links and the theft of intellectual property.

This expansion module extends your Web security policies to mobile devices when they are used outside your corporate network on wireless networks. Forcepoint Advanced Classification Engine (ACE), the technology that powers all Forcepoint security solutions, provides real-time identification of threats.

Learn More.

There are phones that say they are secure and then there are phones that live and breathe security. Phones with BlackBerry® software or apps don’t just tack on security, it’s built-in. BlackBerry is trusted by thousands of companies and governments around the world to securely enable business on mobile.

Learn More.