Yishay Yovel directs IBM Security

The Return of the Wild West: Securing Enterprise Mobile Applications Against Evolving Threats

To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile. The framework proposed in this document looks at the device, the data, the application and the transaction as components of single continuum that must be secured to minimize the business risk associated with mobility. The appropriate mobile security framework will enable enterprises to reap the productivity gains and enhance employee satisfaction while limiting the exposure to their critical information and business assets.

This trend, while positively impacting the user experience, can reduce the ability of the IT department to confidently secure access to data on enterprise systems.The Emerging Mobile Application “Wild West”

Mobile applications, available through online app marketplaces such as Apple’s App Store, Google’s Play Store and third-party marketplaces, are the dominant form of delivering value to users worldwide. Organizations have embraced mobile applications as a way to improve employees’ productivity and align with their new agile and mobile lifestyle.

At the same time, many companies are increasingly adopting Bring-Your-Own-Device (BYOD) policies to allow employees to meld their personal and professional lives into a single mobile experience. This trend, while positively impacting the user experience, can reduce the ability of the IT department to confidently secure access to data on enterprise systems.

Because of this, it is no longer possible to make assumptions about the underlying security of the mobile device, or the application mix being used on that device. This unknown territory, the so-called “Mobile Wild West,” makes securing the application and its execution an increasingly difficult task.

What follows is a framework to address the creation, deployment and execution of secure mobile applications – thus reducing the business exposure associated with enterprise mobility.

Secure the Code: Building a Secure Application

Mobile malware often taps vulnerabilities or bugs, in the design and coding of mobile applications they target. Once exploited, these vulnerabilities cause unintended behaviors which are used to take over and tamper with the application execution.

Even before vulnerability is exploited, attackers can obtain a public copy of an application and reverse engineer it. Popular applications are repackaged into “rogue apps” containing malicious code and are posted on third-party app stores to lure and trick unsuspecting users to install them and compromise their devices.

Enterprises should look for tools to aid their developers to detect and close security vulnerabilities and then harden their applications against reverse engineering and tampering. However, “consumer apps” still represent a threat as they may not undergo the appropriate hardening process. And as rogue applications, malware and enterprise apps share the same device, the threat is tangible.

Secure the Device: Detecting Compromised and Vulnerable Run-Time Environment

As secure the application is, its security relies on the underlying device security. Jailbroken or rooted devices, or the presence of rogue applications, can represent an execution risk that may be allowed for certain enterprise apps but not for others.

Enterprises should look into ways to dynamically gauge the security of the underlying device. First, the mobile app sandbox (that is prevalent in modern mobile operating system design) must be intact. Rooting or jailbreaking the device breaks the underlying security model and it is highly recommended to restrict these devices from accessing enterprise data. Furthermore, jailbreak technology is evolving rapidly to evade detection – coping with these mechanisms is essential to keeping up with these threats.

Mobile malware, though, doesn’t always rely on the device being jailbroken. Excessive use of permissions to the mobile applications (which are granted by the user, often by default) can provide malware and rogue applications access to basic services (i.e., SMS) used to facilitate fraudulent activities. 

Enterprises should consider up-to-date intelligence sources and application reputation services to track the tidal wave of applications - and their associated risk - as they enter mobile app stores on a daily basis. Using this data, application capabilities could be enabled or disabled based on the device risk profile.

Secure the Data:  Preventing Data Theft and Leakage

When mobile applications access enterprise data, documents and unstructured information are often stored on the device. If the device is lost, or when data is shared with non-enterprise applications, the potential for data loss is heightened.

Many enterprises are already looking into “remote wipe” capabilities to address stolen or lost devices. Mobile data encryption can be used to secure data within the application sandbox against malware and other forms of criminal access. To control application data sharing on the device, individual data elements should be encrypted and controlled. 

Secure the Transaction: Controlling the Execution of High Risk Mobile Transactions

Because mobile applications enable users to transact with enterprise services on the go, the risk tolerance for transactions will vary. For example, reading HR-related content may be deemed low-risk vs. the approval of a large payment to a new supplier.

Organizations should adapt an approach of risk-aware transaction execution that restricts client-side functionality based on policies that consider mobile risk factors such as device security attributes, user location, the security of the network connection, and so on. 

Even when client-side transactions are allowed, enterprise applications can leverage an enterprise mobile risk engine to correlate risk factors such as IP velocity (access to the same account from two locations that are far apart, over a short period of time), user access patterns and data access profile. This approach extends the enterprise’s ability to detect and respond to complex attacks that can span multiple interaction channels and seemingly unrelated security events.

Conclusion

To secure the mobile workforce at the age of BYOD, IT security professionals and line-of-business executives must consider how mobility impacts their business risk profile. The framework proposed in this document looks at the device, the data, the application and the transaction as components of single continuum that must be secured to minimize the business risk associated with mobility. The appropriate mobile security framework will enable enterprises to reap the productivity gains and enhance employee satisfaction while limiting the exposure to their critical information and business assets. 

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.