Things To Know Online

April 5th, 2013

Posted on April 5th, 2013, 3:17

With the attacks on mobile devices rising, enterprises must cautiously estimate the potential risks and advantages of resorting to a mobile platform. Each mobile operating system is set up for a selected group of audience, i.e. corporate users or consumers. The platforms designed for consumers are operational and security trade-offs to attain usability and simplicity, whilst the ones designed for corporate users offer lesser risk to an enterprise’s environment when incorporated owing to the inherent security controls embedded in the systems.

Mobile Application security

The highly expanding mobile device market and their open programming platforms provide corporations with essential scopes to communicate with the consumers and clients. These features assist creative innovations that are not possible through the conventional PC application. However, the size and computing power restrictions have compelled organizations to redesign their internet presence and offer mobile users with a browsing experience like that of a PC.  As the developers continue to redesign the websites and come up with mobile applications, they are required to consider the probable mobile security risks, data thefts and mitigate them.

Companies specializing in risk management frameworks have come up with advanced mobile security services that help to secure the mobile applications, App stores, payment service products, mobile devices and USSD apps. The services they offer include:

Mobile Application Security -   Investigates and remedies vulnerabilities in the mobile application by penetration testing, reverse engineering secure code review and security testing.

Mobile Application Store Security - Evaluates internal Apps, external Apps, malicious patterns verifications, secure code review, device OS and dependant Telco’s component’s security assessment.

Mobile Payment and Banking Security - Used for evaluation of mobile payment and banking applications, reverse engineering, secure code review, payment gateways and application API/interfaces’ security assessment.

USSD/DSTK Application Security - Evaluates USSD Gateways, USSD/DSTK Applications, USSD Application Server Frameworks, USSD log analysis, secure code review, USSD based payment application’s PCI-DSS and payment forum’s compliance pre-audit.

Enterprise Mobile Data Management Services - Assists end users in enterprise data fragmentation i.e. access control for business application usage and crucial business data, data storage encryption, mobile content management and verification of fragmented data.

Mobile Device Security - The service provider conducts a mobile device security configuration review (anti-virus, secure access control, browser and application’s security and security manager’s customized security settings) and prepares customized device security regulations along with user awareness programs. It also conducts security evaluation of the mobile platform and OS (iOS, Android, Blackberry, Symbian, and J2ME)

Today mobile security service providers with their design methodology for mobile applications and expertise in cryptography not only allow the end users to secure data storage and implement protocols but also minimize the software re-engineering and compliance expenses.

Read more on - Information Risk Management, identity access management

By Josephmax, in: General