3.5 Secure Mobile Solutions

Mobile Networks

Cellular network

Bluetooth - high speed communicated over short distance

RFID - access badge, inventory/assembly line tracking - uses Radar technology, RF powers the tag, ID is transmitted back

NFC - two way wireless communication - apple pay


Mobile Device Management

MDM (mobile device manager) - manage company-owned and user-owned mobile devices - centralized management of the mobile devices - set policies on apps, data, camera - control the remote device, the entire device or a partition

MCM - mobile content management - secure access to data - protect data from outsiders - data on mobile devices can be protected with Data Loss Prevention (DLP)

Remote wipe - remove all data from your mobile device, even if you lost the device

Geofencing - restrict or allow features when the device is in particular area

Biometrics - you are the authentication factor, easy to circumvent

Containerization - creating separate areas and partitions for private and other purposes - you both will have private information area and corporate-data area

FDE (full device encryption) - scramble all of the data on the mobile device, but always have the decryption key


Mobile Device Security

MicroSD HSM - hardware security module now in a microSD card form - provides security services, encryption, key generation, digital signature, authentication - secure storage, protect private keys, cryptocurrency storage

Unified endpoint management (UEM) - comprehensive approach to securing and controlling desktop computers, laptops, smartphones, and tablets in a connected, coherent manner from a single console

Mobile application management (MAM) - provision, update, and remove apps which keep every device running at the correct version


Mobile Device Enforcement

Rooting/jailbreaking = gaining access to the OS of the mobile device, you need to install a custom firmware to achieve this - you circumvent security features

USB OTG (on-the-go) = connecting mobile devices directly together


Mobile Deployment Models

BYOD - bring your own device - difficult to secure, need to meet the company's requirements

COPE - corporate owned, personally enabled - company buys the device, organization keeps full control of the device

CYOD - choose your own device

VDI/VMI - virtual desktop infrastructure/virtual mobile infrastructure - applications are separated from the mobile device - data is separated from the mobile device - data is stored securely, centralized

Last updated

Was this helpful?