Mobile devices such as smart phones and tablets have been called “the weak link of security” for enterprise networks, and for good reason. While any one of these handheld devices is more powerful than the computers NASA used to put man on the moon in the 1960’s, it still isn’t powerful enough to run the continuous security controls that are commonplace on networks and PC platforms. The limited processing power and battery life of smart devices prohibit the local use of security tools such as web filtering, content filtering and sophisticated forms of anti-virus and anti-malware screening.
Many organizations that allow BYOD on their network are truly fretting about mobile security. Two of the most common approaches to security today are mobile device management (MDM) and containerization, or keeping business activity separate from personal activity on a user’s device.
MDM is not so much about security as it is about enforcing policies and being able to do remote wipes if necessary. MDM typically
doesn’t provide URL filtering to keep people from going to bad websites where they can pick up malware, or content filtering
to prevent sensitive data leakage.