In today’s world where business transactions are increasingly executed conducted on mobile platforms, security of mobile devices and data present on them is more critical than ever before. There are broadly three practices which work together to make this possible.

Mobile Device Management

Mobile Device Management (MDM) consists of ensuring the following:

  • Uniform, compliant deployment, and updating/patching of mobile devices across the organisation
  • Maintaining pre-approved configurations (device settings, application access, user profiles, accounts) across all devices
  • Detecting non-compliant activities and generating automated responses/solutions
  • Data loss prevention in case of theft or unauthorised access
  • Containerisation of corporate data to keep it separate from personal data. This is especially vital with BYOD (Bring Your Own Device) becoming more common.
  • De-enrolling and/or remotely wiping stolen devices to prevent corporate data from falling into wrong hands
  • Detailed, rich reporting for compliance audits by other enterprise applications/systems

Mobile Application Fraud Prevention

Users accessing services on mobile platforms primarily focus on ease of use. Increasing mobile usage introduces a need for a solution that will protect the users on an on-device and on-account level. It is also important to ensure that user convenience and comfort is not sacrificed for security.

Some of the technologies that keep you safe from fraud on mobile are:

  • Anti-phishing and protection from fake banking apps
  • Data protection
  • Protection from financial malware
  • Behavioural analysis
  • Device and environment analysis

Mobile Security Management

Mobile Security Management (MSM) takes a holistic approach to lock down corporate and confidential data/applications on mobile devices. At the same time, it remains transparent to users and needs minimal/zero participation from them. At a broad level, MSM consists of:

  • Assessing device/behavioural anomalies
  • Assessment of device/application vulnerabilities
  • Maintaining network and application security

Some of the user-visible components of MSM are:

  • Anti-malware and web protection
  • Call/SMS filtering
  • Application management
  • App/data wrapping (containerisation)
  • Anti-theft policies/actions
  • App deployment through approved portals only
  • Predefined device settings and security policies

Solution implemented using: