SlideShare a Scribd company logo
Mobile Device Security
Crafting a mobile device strategy that fits your organization’s
                   needs while protecting information assets
Mobile Device Trends
 Smartphone shipments in 2012 are projected to be at
  around 631 million units, up from 468 million in 2011

 Tablet sales in 2012 are expected to nearly double last
  year’s tally of 60 million, at 119 million units

 Apple’s iPad platform is expected to account for 60% of
  those tablet sales

 PC hegemony over the market as the primary computing
  device in business is being challenged
Frequently forgotten factoids
about mobile devices
 They’re little computers; processor, memory and
  storage, just like the desktop or laptop PC in your office

 A would-be thief is more likely to steal a smartphone or
  tablet than a laptop

 If your device is stolen, and lacks both a passcode/PIN
  and data encryption, whatever’s on the device might as
  well be posted on Facebook

 Without a means to remotely manage a device, you
  have NO recourse in protecting/erasing sensitive data,
  should the device be lost or stolen
Mobile Device Security:
Key Considerations
 Will my company furnish the devices, or will we allow
  BYOD (Bring Your Own Device)? What about both?

 Where will sensitive data reside? On the server(s) or on
  the device itself?

 How is the information accessed?
Company-furnished devices
 Cost for cellular service and repair/replacement of
  lost/damaged phones is generally borne by the company

 Makes sense for organizations that publish the mobile
  phone number of these devices in the phonebook, on
  websites or in marketing materials

 Be as draconian as you’d like in managing these devices
  (they’re property of the company). No Facebook,
  Twitter, YouTube, etc.; just business. Erase at will if
  necessary.
BYOD (Bring Your Own Device)
 employees use their personal smartphones/tablets to
  access email and applications, which they're already
  familiar with (little to no training)

 employees bear the cost of service and
  repair/replacement when necessary

 a more measured approach to governing the encryption
  of information stored on the device, and the recourse
  with which to protect the data should the device
  become lost or stolen
BYOD cont’d
Example: An employee uses his/her personal device to
access company email, where sensitive information
sometimes crosses. Whereas a company-provided device
could be erased without question, an employee's BYOD
likely has personal contacts, personal email, music, etc. A
mobile device strategy should outline clear boundaries as
to how far a company can go to protect its data. In this
case, a mobile device policy could be designed in such a
way, that only the company email access for that device is
revoked, and the data removed, with no impact to other
apps/services on the device.
Company-furnished device versus
BYOD conclusion
 Different levels of device management can be applied
  to both classifications of device, whether you want to
  completely lock the device down, or you want the user
  to freely use the device as he/she wishes, as long as the
  device meets security requirements
Where the data resides
 Server: This is always preferable to any sensitive
  information residing on the device. Risks of data
  compromise are mitigated through PIN/password
  enforcement, and revocation of access to applications,
  services and data can be easily revoked on the server.
  More on this later.
 Device: We strongly discourage saving sensitive
  information on mobile devices, but if it can't be
  avoided, more stringent password/PIN requirements and
  encryption, coupled with the ability to erase the device
  in the event it's lost or stolen, protects against losses on
  this front.
How the information is accessed
 Email: Through mobile device management, we can encrypt
  data as it's stored on the device, revoke email access when
  warranted, and protect access to the device with passcodes
  or PINs.

 Desktop applications: Using technologies such as Citrix
  XenApp or Microsoft RemoteApp/Remote Desktop, we can
  provide secure access to programs and data residing on the
  server, without any of that information actually being stored
  on the mobile device. This is the preferred method for
  accessing your line-of-business apps. The actual processing of
  data resides on the server at all times, and you're simply
  viewing/interacting with it on your tablet or smartphone.
How the information is accessed
cont’d
 Web applications/webclips look and act like apps, but
  are really websites that are optimized for viewing on
  your mobile device. Similar to the Citrix/Terminal
  Services method for accessing apps and data, the data
  does not get stored on the mobile device, but instead
  just viewed. Transactions still take place on the server.
Wrap-up
Though the rapid adoption of mobile devices had initially
provided flexibility and opportunities for businesses, it's
also opened up businesses to old fashioned computer
security risks, just on a newer class of devices. The
methodology for securely incorporating these devices,
whether company-owned or personally owned, is taking
shape and should become a part of your overall IT
strategy, in the same way you'd secure a desktop or laptop
computer.

More Related Content

PPTX
How can EMM help with GDPR compliance?
PPT
What is IRM? bright talk
PPTX
mobile application security
PPTX
Data protection and security
PPTX
Mobile database security threats
PDF
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
PDF
3 data leak possibilities that are easy to overlook
PPT
Data Protection Presentation
How can EMM help with GDPR compliance?
What is IRM? bright talk
mobile application security
Data protection and security
Mobile database security threats
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
3 data leak possibilities that are easy to overlook
Data Protection Presentation

What's hot (19)

PDF
Mobile Device Policy Template
PPTX
Eight principles of consumer data privacy
PDF
BYOD / Mobile-Device Security Guidelines for CxO's
PPTX
Data security strategies and drivers
PPT
Ecommerce Security
DOCX
Managing data security and privacy in call centres ankur gupta
PPTX
Secure Your Mobile Content!
PDF
Seven deadly threats and vulnerabilities in cloud
PDF
Good Security Whitepaper
DOCX
The CIA Triad - Assurance on Information Security
PPTX
PDF
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
PDF
Cybersecurity: A Manufacturers Guide by Clearnetwork
PDF
PingPal infodeck: How to survive BYOD and mobile networks
PPTX
Information & Cyber Security Risk
PDF
Mobile Security
PDF
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
PDF
Wearable Technology for Enhanced Security.
Mobile Device Policy Template
Eight principles of consumer data privacy
BYOD / Mobile-Device Security Guidelines for CxO's
Data security strategies and drivers
Ecommerce Security
Managing data security and privacy in call centres ankur gupta
Secure Your Mobile Content!
Seven deadly threats and vulnerabilities in cloud
Good Security Whitepaper
The CIA Triad - Assurance on Information Security
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
Cybersecurity: A Manufacturers Guide by Clearnetwork
PingPal infodeck: How to survive BYOD and mobile networks
Information & Cyber Security Risk
Mobile Security
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
Wearable Technology for Enhanced Security.
Ad

Similar to Mobile Device Security (20)

PDF
Cloud backup-for-endpoint-devices
PDF
Maa s360 10command_ebook-bangalore[1]
PDF
Maa s360 10command_ebook-bangalore
PDF
BYOD - Bring Your Own Device
PDF
Ten Commandments of BYOD
PDF
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
PDF
Integrating Enterprise Mobility - an Assessment WHITE PAPER
PPTX
Enterprise Mobility Management
PDF
best coffee beans in the world, americano
PPT
Backstopp Mobile Slides
PDF
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
PPTX
Mobile Phone & Tablet Support
PDF
Mobile Device Management Service: Yamana
PDF
880 st011
PDF
Tablet Access to Business Applications
PDF
Web version-ab cs-book-bangalore
PDF
Web version-ab cs-book-bangalore
PDF
Mobility, Security and the Enterprise: The Equation to Solve
PDF
BH SA A4 Brochure
PPT
OC CIO Roundtable BYOD
Cloud backup-for-endpoint-devices
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore
BYOD - Bring Your Own Device
Ten Commandments of BYOD
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Enterprise Mobility Management
best coffee beans in the world, americano
Backstopp Mobile Slides
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
Mobile Phone & Tablet Support
Mobile Device Management Service: Yamana
880 st011
Tablet Access to Business Applications
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
Mobility, Security and the Enterprise: The Equation to Solve
BH SA A4 Brochure
OC CIO Roundtable BYOD
Ad

More from nexxtep (6)

PPTX
Password Management Tips
PPTX
5-Step Email Marketing Plan
PDF
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
PPTX
10 Tips and Tricks Every iPhone and iPad User Should Know
PDF
The Modern Office
PPTX
iPhone and iPad Tips and Tricks
Password Management Tips
5-Step Email Marketing Plan
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
10 Tips and Tricks Every iPhone and iPad User Should Know
The Modern Office
iPhone and iPad Tips and Tricks

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Cloud computing and distributed systems.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
A Presentation on Artificial Intelligence
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
NewMind AI Weekly Chronicles - August'25 Week I
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
Cloud computing and distributed systems.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Monthly Chronicles - July 2025
Digital-Transformation-Roadmap-for-Companies.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf
Big Data Technologies - Introduction.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Unlocking AI with Model Context Protocol (MCP)
A Presentation on Artificial Intelligence

Mobile Device Security

  • 1. Mobile Device Security Crafting a mobile device strategy that fits your organization’s needs while protecting information assets
  • 2. Mobile Device Trends  Smartphone shipments in 2012 are projected to be at around 631 million units, up from 468 million in 2011  Tablet sales in 2012 are expected to nearly double last year’s tally of 60 million, at 119 million units  Apple’s iPad platform is expected to account for 60% of those tablet sales  PC hegemony over the market as the primary computing device in business is being challenged
  • 3. Frequently forgotten factoids about mobile devices  They’re little computers; processor, memory and storage, just like the desktop or laptop PC in your office  A would-be thief is more likely to steal a smartphone or tablet than a laptop  If your device is stolen, and lacks both a passcode/PIN and data encryption, whatever’s on the device might as well be posted on Facebook  Without a means to remotely manage a device, you have NO recourse in protecting/erasing sensitive data, should the device be lost or stolen
  • 4. Mobile Device Security: Key Considerations  Will my company furnish the devices, or will we allow BYOD (Bring Your Own Device)? What about both?  Where will sensitive data reside? On the server(s) or on the device itself?  How is the information accessed?
  • 5. Company-furnished devices  Cost for cellular service and repair/replacement of lost/damaged phones is generally borne by the company  Makes sense for organizations that publish the mobile phone number of these devices in the phonebook, on websites or in marketing materials  Be as draconian as you’d like in managing these devices (they’re property of the company). No Facebook, Twitter, YouTube, etc.; just business. Erase at will if necessary.
  • 6. BYOD (Bring Your Own Device)  employees use their personal smartphones/tablets to access email and applications, which they're already familiar with (little to no training)  employees bear the cost of service and repair/replacement when necessary  a more measured approach to governing the encryption of information stored on the device, and the recourse with which to protect the data should the device become lost or stolen
  • 7. BYOD cont’d Example: An employee uses his/her personal device to access company email, where sensitive information sometimes crosses. Whereas a company-provided device could be erased without question, an employee's BYOD likely has personal contacts, personal email, music, etc. A mobile device strategy should outline clear boundaries as to how far a company can go to protect its data. In this case, a mobile device policy could be designed in such a way, that only the company email access for that device is revoked, and the data removed, with no impact to other apps/services on the device.
  • 8. Company-furnished device versus BYOD conclusion  Different levels of device management can be applied to both classifications of device, whether you want to completely lock the device down, or you want the user to freely use the device as he/she wishes, as long as the device meets security requirements
  • 9. Where the data resides  Server: This is always preferable to any sensitive information residing on the device. Risks of data compromise are mitigated through PIN/password enforcement, and revocation of access to applications, services and data can be easily revoked on the server. More on this later.  Device: We strongly discourage saving sensitive information on mobile devices, but if it can't be avoided, more stringent password/PIN requirements and encryption, coupled with the ability to erase the device in the event it's lost or stolen, protects against losses on this front.
  • 10. How the information is accessed  Email: Through mobile device management, we can encrypt data as it's stored on the device, revoke email access when warranted, and protect access to the device with passcodes or PINs.  Desktop applications: Using technologies such as Citrix XenApp or Microsoft RemoteApp/Remote Desktop, we can provide secure access to programs and data residing on the server, without any of that information actually being stored on the mobile device. This is the preferred method for accessing your line-of-business apps. The actual processing of data resides on the server at all times, and you're simply viewing/interacting with it on your tablet or smartphone.
  • 11. How the information is accessed cont’d  Web applications/webclips look and act like apps, but are really websites that are optimized for viewing on your mobile device. Similar to the Citrix/Terminal Services method for accessing apps and data, the data does not get stored on the mobile device, but instead just viewed. Transactions still take place on the server.
  • 12. Wrap-up Though the rapid adoption of mobile devices had initially provided flexibility and opportunities for businesses, it's also opened up businesses to old fashioned computer security risks, just on a newer class of devices. The methodology for securely incorporating these devices, whether company-owned or personally owned, is taking shape and should become a part of your overall IT strategy, in the same way you'd secure a desktop or laptop computer.