Hackers are unleashing an increasing volume of threats specifically targeting mobile devices. In 2014, the number of attacks against Android devices was 4 times greater than in 2013. While the majority of attacks focused on Android devices, there’s now a growing volume of cyber threats targeting iPhones & iPads. Because iOS devices are so popular, cybercriminals are devoting more effort to compromising their security. Even connecting an iPhone to a Mac – to charge its battery – can result in malicious threats passing from Mac to iPhone.
If we add in the growing adoption of BYOD (bring your own device) initiatives, the security risks are multiplied further. With employees’ own mobile devices now carrying a mix of their own personal apps & data – plus corporate data and access passwords – the likelihood of security breaches has greatly increased. Furthermore, because mobile devices are so small, they’re easily lost or stolen – and missing devices can give unauthorized users direct access to corporate systems and data.
Our ‘app wrapping’ containerization technology wraps business apps in special containers on the user’s device. Your apps and data are stored inside the containers – so they’re totally separated from the user’s personal apps and data. You can enforce data encryption for all data inside the containers and you can prevent users copying containerized data and pasting it outside the container. When an employee leaves – taking their BYOD mobile with them – you can delete all containerized apps & data.
Flexible control tools add extra layers of security. Application Control helps you to manage which apps are permitted to install and run on the devices that you allow to access your corporate systems and data. Web Control makes it easy for you to manage how users are permitted to access the Web on their mobile devices. Malicious websites are blocked and you can also block sites that don’t conform to your corporate security or usage policies – such as social media, gambling or adult websites.