Cyber Security is top of mind for all enterprises looking to transform their businesses by making employees more productive through the adoption of mobile technologies. Productivity is great but security must be present.

As Cyber Security Month 2016 comes to a close I wanted to highlight a few of the top stories for 2016 and how they relate to Citrix XenMobile Enterprise Mobility Management solutions.

Top stories for Android

One of the biggest mobile security headlines for Android in the past year was the widespread vulnerability of devices via commonly used workflows and apps such as SMS.

The most widely known virus in this category is known as Stagefright. Stagefright is particularly scary, excuse the pun, because unlike many sophisticated hacking methodologies Stagefright is able to gain device control simply through the SMS functionalities of the device. Once the user clicks on an infected SMS message the hacker can easily access the device data.

With more and more users using personal devices in the workplace, the chances of data leakage can be quite high. In a recent study it was estimated that 9 out of 10 businesses fell victim to at least one hacking incident in the past year.

How can we combat frequent mobile device vulnerabilities and how can we do better?

Google made a big contribution to the mobile security effort last year by debuting a monthly cadence of Android security updates. These monthly updates helped to rapidly defuse some of the latest and greatest attacks such as Quadrooter.

Another trend that’s working in the favor of Android enterprise adoption is the simple fact that Android has a large worldwide market share of business users. A recent report by IDC estimates that as much as 84% of the global device market is Android. As a result, enterprise developers are increasing their focus on the Android platform and its open eco-system. A good example of this is the rapid growth of the anti-virus/malware mobile apps for Android from vendors such as BitFender, Norton, Avast and others.

Furthermore, Google continues to promote the Android for Work security solution which provides additional layers of security at no cost for those using personal devices for business.

All of these efforts, in aggregate, have helped to legitimize Android as a viable and cost-effective option for the enterprise, but there are still challenges associated with getting security updates to the device in a fragmented Android market.

How can Citrix XenMobile EMM solutions provide the highest levels of security for Android environments?

XenMobile security attributes go above and beyond device and operating system level controls in Android environments:

These attributes include:

  • Strong FIPS-compliant application level encryption for data-at-rest, data-in-transit and data-in-use.
  • Over 65 Mobile Application Management (MAM) policies that operate completely independent of device layer security.
  • Technology partnerships allow XenMobile to support and manage Android for Work and Samsung KNOX enabled devices.

Combining the built in Android security improvements of 2016 with the complete mobile security offering from XenMobile allows enterprise IT to feel confident when delivering corporate resources to Android devices.

Top Stories for iOS

The biggest headline for iOS this year was the dispute between Apple and the FBI. The key question here was whether or not the United States government can compel manufacturers to unlock devices whose contents are encrypted.

Here’s the problem. Apple currently doesn’t have the ability the break the strong encryption capabilities of an iOS device. That’s a good thing right? Given that Apple, as far as we know, can’t break the encryption the government was asking Apple to write new software that would allow authorities to bypass the encryption and unlock the device whenever necessary. Apple declined the request to write this backdoor functionality into the iOS code.

How does the iOS controversy relate to XenMobile?

XenMobile supports both Mobile Device Management (MDM) and Mobile Application Management (MAM). Device-level encryption, the type the government would like to bypass, is just as it sounds. It happens at the device level and is a function of the operating system (iOS). It can be turned on/off using MDM.

XenMobile supports device level encryption but also supports our own application level encryption.  This application level encryption provides an additional layer of FIPS compliant encryption for data-in-use, data-at-rest and data-in-transit.

So, whether or not there are mandates in the future for Apple to write a backdoor into their encrypted devices, those using XenMobile for enterprise mobility management will still employ a second line of encrypted defense.

Moving forward

Without a doubt, 2017 will bring new threats, viruses and vulnerabilities to our favorite mobile devices and operating systems.

XenMobile Enterprise Mobility Management allows our customers to offer a consistent set of security polices across all operating systems and devices types.

Gartner ShareFile Banner