celebrex max daily dose

Securing Android a Top Priority When Managing Enterprise Mobile Devices

Wireless Analytics warns that rising Android security risks call for strong mobile device management strategy.

Danvers, MA (PRWEB) July 31, 2012

Wireless Analytics reports the biggest issue facing enterprise wireless management today is security, especially with Android operating systems. With today’s security concerns a mobile device management strategy is key in keeping devices, data and the corporate environment safe from hackers, malware and other malicious attacks.

“The challenge with Android is that it’s a fragmented operating system,” says Wireless Analytics’ Alex Mordach, Senior Software Engineer. “If you think of an iPhone, you can choose 16 or 32 GB and white or black, but it’s all the same phone, the same operating system. With Android, each carrier has many different versions of the operating system—Ice Cream Sandwich, Gingerbread etc.—and each carrier and device has a slightly different variation on those.”

These variations on the Android operating system increase the potential for security breaches making it difficult for enterprises to secure these devices and their own networks. The real challenge lies in protecting corporate devices from nefarious applications that leverage the network tunnels back to an enterprise’s corporate environment. Once the corporate environment is breached, the application can perform any number of malicious attacks or disruptions.

“The hardest part of robbing a safe is breaking in—it’s the same idea,” said Mordach. “If you can get into that corporate network and access that network, you can do all kinds of things.”

Working with a mobile device management company can help keep corporate devices secure. Wireless Analytics partners with MobileIron to lock down mobile devices, including Android. MobileIron is packaged as an easy-to-install server that is up and running in a corporate network in less than a day.

“We leverage MobileIron to a standard set of hooks or APIs that then can tie into the base operating system of Android regardless of operating fragment,” said Mordach. “Our job is to step back and say ‘how do we secure the foundation?’ because when that’s secure everything on top of it is secure as well.”

“Securing enterprise mobile apps, content, and devices is absolutely essential to protecting the corporate environment as a whole,” said Ojas Rege, VP, Strategy, MobileIron. “Only with a secure foundation can mobile IT stop malware and other malicious applications at the point of entry and ensure that all enterprise content is protected, regardless of device and OS.”

“The flexibility and openness of Android is one of the system’s biggest pros for some users, but for security it’s a challenge,” Rege said. “MobileIron provides the most complete Android security by securing data at rest and data in motion so that mobile IT teams can support existing and future versions of Android with confidence.”

About Wireless Analytics, LLC

Wireless Analytics provides outsourced mobility management services such as online visibility and reporting, wireless policy development, cost analysis, procurement, complete help desk services, inventory management, and carrier invoice management. Additionally, Wireless Analytics is a Platinum Partner of MobileIron and offers complete deployment of MobileIron’s MDM solutions for enterprise customers. Wireless Analytics is Safe Harbor certified from the U.S. Department of Commerce, signifying it complies with European Union privacy laws. To learn more, please visit http://www.wirelessanalytics.com.

For the original version on PRWeb visit: http://www.prweb.com/releases/prweb2012/7/prweb9750198.htm

Article source: http://www.newstimes.com/business/press-releases/article/Securing-Android-a-Top-Priority-When-Managing-3748436.php

Posted in Mobile Security Tagged with: , , , , , , , , ,

Leave a Reply

Your email address will not be published. Required fields are marked *


You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>