Rethinking Mobile Security – Why Apps Come First | SecurityWeek.Com
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
1892
post-template-default,single,single-post,postid-1892,single-format-standard,stockholm-core-2.4.4,select-child-theme-ver-1.0.0,select-theme-ver-9.11,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-7.8,vc_responsive

Rethinking Mobile Security – Why Apps Come First | SecurityWeek.Com

Attackers follow users and the popularity of mobile apps in conjunction with the emergence of their security flaws means that mobile is prime to be the next attack vector that threatens corporate data and user privacy.

Sourced through Scoop.it from: www.securityweek.com

Users are no longer accessing data through a single point, like their company issued computer. The modern employee needs access from where they are, from the tool they have access to for the moment, like their laptop, tablet or smartphone. Even through borrowing someone’s web browser. And this is just the beginning. More and more devices will enter the workplace, like wearables, Internet of Things sensors, etc. The old paradigm of securing the device and the connection is not up to par with this new, rapidly changing, environment.

The focus has to change to securing applications that run on multiple devices and platforms. The user must be authenticated in each and every transaction, with authentication method automatically adapting to the digital and physical environment for the moment. For instance, accessing the system from your office computer has a more secure environment and can then have a simpler access control, while accessing the system on a smartphone over a public WiFi at an airport while travelling requires a much more thorough authentication mechanism.

An impossible feat with the EMM and MDM tools commonly used today. We need new inventions and entrepreneurial efforts in this field. And we need it NOW.

See on Scoop.itMobility for enterprise

The post Rethinking Mobile Security – Why Apps Come First | SecurityWeek.Com appeared first on Apptimate.


Source: Apptimate
Rethinking Mobile Security – Why Apps Come First | SecurityWeek.Com