Yishay Yovel directs IBM Security

The Return of the Wild West: Securing Enterprise Mobile Applications Against Evolving Threats

To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile. The framework proposed in this document looks at the device, the data, the application and the transaction as components of single continuum that must be secured to minimize the business risk associated with mobility. The appropriate mobile security framework will enable enterprises to reap the productivity gains and enhance employee satisfaction while limiting the exposure to their critical information and business assets.

This trend, while positively impacting the user experience, can reduce the ability of the IT department to confidently secure access to data on enterprise systems.The Emerging Mobile Application “Wild West”

Mobile applications, available through online app marketplaces such as Apple’s App Store, Google’s Play Store and third-party marketplaces, are the dominant form of delivering value to users worldwide. Organizations have embraced mobile applications as a way to improve employees’ productivity and align with their new agile and mobile lifestyle.

At the same time, many companies are increasingly adopting Bring-Your-Own-Device (BYOD) policies to allow employees to meld their personal and professional lives into a single mobile experience. This trend, while positively impacting the user experience, can reduce the ability of the IT department to confidently secure access to data on enterprise systems.

Because of this, it is no longer possible to make assumptions about the underlying security of the mobile device, or the application mix being used on that device. This unknown territory, the so-called “Mobile Wild West,” makes securing the application and its execution an increasingly difficult task.

What follows is a framework to address the creation, deployment and execution of secure mobile applications – thus reducing the business exposure associated with enterprise mobility.

Secure the Code: Building a Secure Application

Mobile malware often taps vulnerabilities or bugs, in the design and coding of mobile applications they target. Once exploited, these vulnerabilities cause unintended behaviors which are used to take over and tamper with the application execution.

Even before vulnerability is exploited, attackers can obtain a public copy of an application and reverse engineer it. Popular applications are repackaged into “rogue apps” containing malicious code and are posted on third-party app stores to lure and trick unsuspecting users to install them and compromise their devices.

Enterprises should look for tools to aid their developers to detect and close security vulnerabilities and then harden their applications against reverse engineering and tampering. However, “consumer apps” still represent a threat as they may not undergo the appropriate hardening process. And as rogue applications, malware and enterprise apps share the same device, the threat is tangible.

Secure the Device: Detecting Compromised and Vulnerable Run-Time Environment

As secure the application is, its security relies on the underlying device security. Jailbroken or rooted devices, or the presence of rogue applications, can represent an execution risk that may be allowed for certain enterprise apps but not for others.

Enterprises should look into ways to dynamically gauge the security of the underlying device. First, the mobile app sandbox (that is prevalent in modern mobile operating system design) must be intact. Rooting or jailbreaking the device breaks the underlying security model and it is highly recommended to restrict these devices from accessing enterprise data. Furthermore, jailbreak technology is evolving rapidly to evade detection – coping with these mechanisms is essential to keeping up with these threats.

Mobile malware, though, doesn’t always rely on the device being jailbroken. Excessive use of permissions to the mobile applications (which are granted by the user, often by default) can provide malware and rogue applications access to basic services (i.e., SMS) used to facilitate fraudulent activities. 

Enterprises should consider up-to-date intelligence sources and application reputation services to track the tidal wave of applications - and their associated risk - as they enter mobile app stores on a daily basis. Using this data, application capabilities could be enabled or disabled based on the device risk profile.

Secure the Data:  Preventing Data Theft and Leakage

When mobile applications access enterprise data, documents and unstructured information are often stored on the device. If the device is lost, or when data is shared with non-enterprise applications, the potential for data loss is heightened.

Many enterprises are already looking into “remote wipe” capabilities to address stolen or lost devices. Mobile data encryption can be used to secure data within the application sandbox against malware and other forms of criminal access. To control application data sharing on the device, individual data elements should be encrypted and controlled. 

Secure the Transaction: Controlling the Execution of High Risk Mobile Transactions

Because mobile applications enable users to transact with enterprise services on the go, the risk tolerance for transactions will vary. For example, reading HR-related content may be deemed low-risk vs. the approval of a large payment to a new supplier.

Organizations should adapt an approach of risk-aware transaction execution that restricts client-side functionality based on policies that consider mobile risk factors such as device security attributes, user location, the security of the network connection, and so on. 

Even when client-side transactions are allowed, enterprise applications can leverage an enterprise mobile risk engine to correlate risk factors such as IP velocity (access to the same account from two locations that are far apart, over a short period of time), user access patterns and data access profile. This approach extends the enterprise’s ability to detect and respond to complex attacks that can span multiple interaction channels and seemingly unrelated security events.

Conclusion

To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile. The framework proposed in this document looks at the device, the data, the application and the transaction as components of single continuum that must be secured to minimize the business risk associated with mobility. The appropriate mobile security framework will enable enterprises to reap the productivity gains and enhance employee satisfaction while limiting the exposure to their critical information and business assets. 

Featured

  • The Key to Wellbeing in the Office

    A few years ago, all we saw in the news was the ‘great resignation.’ Now we have another ‘great’ to deal with. According to CBRE, 2023 was the start of the ‘great return’ as office workers returned to their normal offices after working from home. The data shows that two-thirds of all U.S office buildings were more than 90% leased as of Q2 2023. Read Now

  • Failed Cybersecurity Controls Costing U.S. Businesses $30 Billion Yearly

    Panaseer recently released ControlWatch and the Continuous Controls Battle: Panaseer 2025 Security Leaders Report examining the cost of cybersecurity control failures and the impact of growing personal liability for security failings on security leaders. The report analyzes the findings of a survey of 400 security decision makers (SDMs) across the US and UK. It shows that security leaders feel under increasing pressure to provide assurances around cybersecurity, exposing them to greater personal risk – yet many lack the data and resources to accurately report and close cybersecurity gaps. Read Now

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3