Concerned about recent PAN-OS and other firewall/VPN CVEs? Take advantage of Zscaler’s special offer today

Blog Zscaler

Recevez les dernières mises à jour du blog de Zscaler dans votre boîte de réception

S'abonner
Produits et solutions

Mobile Security Isn't as Simple as Allow or Deny

image
S IYER
juin 13, 2013 - 2 Min de lecture

Last week, Zscaler announced its Mobile Security Solution, so I wanted to continue to focus on mobile security this week.

Increasingly, information security teams are being tasked with securing mobile devices and mitigating the risk of third-party applications accessing and sharing personal information on their employees’ devices. As a result, information security teams continue to look for scalable and efficient ways to manage mobility and the risks.

Enterprises continue to look for scalable and efficient ways to manage mobility and the risks of publicly available third-party apps on their employees' devices. Restricting app usage by specifying denylists and allowlists provides a coarse-grained control attempting to manage the risks. However, administrators cannot be expected to keep up with malicious or risky apps fast enough to keep the denylist up to date. Also, restricting employees to run a small set of allowed apps severely impacts user productivity, and is especially infeasible to implement on employee-owned (BYOD) devices. Besides, bad apps often masquerade as well-known apps, especially paid ones, to attract unsuspecting users.

Enterprises should look to find solutions that take actions based on the behavior of apps over the network rather than simply their names. Apps exhibiting risky, suspicious or malicious behavior can be identified by inspecting network traffic and should be appropriately curbed from leaking sensitive data. Network-based and cloud-based traffic inspection technologies scale more efficiently than blocking and allowing apps by name.

form submtited
Merci d'avoir lu l'article

Cet article a-t-il été utile ?

dots pattern

Recevez les dernières mises à jour du blog de Zscaler dans votre boîte de réception

En envoyant le formulaire, vous acceptez notre politique de confidentialité.