During our webinar next week, “A Three-Pronged Approach to Mobile Security,” we’ll be answering questions about mobile security approaches and trends. Here’s a quick look at one of the questions that keeps coming up. Share your own questions on Twitter via the hashtag #3ProngSecurity or here in the comments.
The key question we will address in our webinar is why do you need a three-pronged approach to mobile security that protects your devices, apps and the mobile network?
Typical mobile device management (MDM) solutions protect your mobile device, allowing you to locate, lock or wipe the device in the event it is lost or stolen. What MDM doesn’t do is provide you with insight on which applications are risky. Risky applications aren’t limited to just malware and viruses. Other “safe” applications can pose risk to your users and your company by being overly permissive, or accessing private information. You can learn more about the grey area between safe and unsafe applications in our webinar “Mobile Threats: Beyond Black and White.“
Looking at mobile devices from the network level can help your organization prevent more threats and recognize patterns across multiple mobile devices, providing more complete mobile security. We talked about our network-centric approach in a recent security sidebar video.
We will talk about this topic in depth in next week’s webinar. You can register below. And stay tuned over the next week for more questions.