Welcome!

News Feed Item

Research and Markets: "Hardening" Android: Building Security into the Core of Mobile

Research and Markets (http://www.researchandmarkets.com/research/jx2vls/hardening) has announced the addition of the ""Hardening" Android: Building Security into the Core of Mobile" report to their offering.

The use cases of mobile devices result in different risk than traditional PCs. The availability of Internet-based application stores provides uniquely mobile conduits for mobile malware, with Android malware being the favored mobile attack vector. Research by the United States Computer Emergency Readiness Team (US-CERT) confirms that the majority of known mobile threats target Android devices.

Overview of Mobile Security

Mobile security cannot be viewed through the same lens or paradigm as personal computer (PC) security. The PC market began as general purpose computing platforms. Due to the evolution of the PC market, the operating system (OS) and the ecosystem of applications that run on the OS are independent. The PC application ecosystem is fundamentally open, designed that way from the start. Historically, a PC user would obtain applications from a number of sources, and install those applications, as long as the user had the proper permissions.

Mobile, due to its evolution from tightly controlled platform, is different. For mobile devices, which are defined here as smartphones and tablets, applications are generally provisioned from an application store such as Google Play or Apple iTunes. The mobile device, the mobile device OS, and the mobile device application store are tightly coupled. As a result, mobile device security cannot be discussed without discussing the application store(s) that provision applications to the device.

What is a Threat in the Mobile World?

Malicious or compromised applications are the most significant attack vector for mobile devices, making application and application store management especially germane to mobile security. In its 3Q 2013 Mobile Threat Report, F-Secure Labs classifies mobile threats into two categories based on their potential for damaging the user's device or data: Malware' and Potentially Unwanted Application' (PUA). See Figure 1 below. A key takeaway from the F-Secure Lab mobile threat classification is that mobile threats are application centric.

Key Topics Covered:

  1. Overview of Mobile Security
  2. What is a Threat in the Mobile World?
  3. Contrasting Android and iOS
  4. Android Application Stores
  5. Rooting and OS Settings to Access Alternative Market
  6. Third Party App Stores
  7. When Mobile Threats Are Not Black and White
  8. Good Security Hygiene Practices for Android .
  9. Leveraging Hardware Technology to Improve Android Security
  10. The Foundation of SecurityA Root of Trust
  11. Mobile Challenges with Roots of Trust
  12. Roots of Trust in Android
  13. Companies Leading Innovation
  14. ARM TrustZone
  15. Qualcomm
  16. SecureMSM
  17. StudioAccess Technology
  18. Enterprise and BYOD security
  19. Samsung.
  20. Device & Data Security
  21. Container Usability
  22. Easy Enrollment
  23. Cloud-based Mobile Device Control
  24. Centrify for Samsung KNOX
  25. Intel
  26. Intel Identity Protection Technology (IPT)
  27. Intel Device Protection Technology (DPT) for Android
  28. Boeing
  29. Blackphone
  30. The Last Word

For more information visit http://www.researchandmarkets.com/research/jx2vls/hardening

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"At the keynote this morning we spoke about the value proposition of Nutanix, of having a DevOps culture and a mindset, and the business outcomes of achieving agility and scale, which everybody here is trying to accomplish," noted Mark Lavi, DevOps Solution Architect at Nutanix, in this SYS-CON.tv interview at @DevOpsSummit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"We're here to tell the world about our cloud-scale infrastructure that we have at Juniper combined with the world-class security that we put into the cloud," explained Lisa Guess, VP of Systems Engineering at Juniper Networks, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
Consumers increasingly expect their electronic "things" to be connected to smart phones, tablets and the Internet. When that thing happens to be a medical device, the risks and benefits of connectivity must be carefully weighed. Once the decision is made that connecting the device is beneficial, medical device manufacturers must design their products to maintain patient safety and prevent compromised personal health information in the face of cybersecurity threats. In his session at @ThingsExpo...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
SYS-CON Events announced today that Grape Up will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company specializing in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market across the U.S. and Europe, Grape Up works with a variety of customers from emergi...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
SYS-CON Events announced today that Massive Networks will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Massive Networks mission is simple. To help your business operate seamlessly with fast, reliable, and secure internet and network solutions. Improve your customer's experience with outstanding connections to your cloud.
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...
Everything run by electricity will eventually be connected to the Internet. Get ahead of the Internet of Things revolution and join Akvelon expert and IoT industry leader, Sergey Grebnov, in his session at @ThingsExpo, for an educational dive into the world of managing your home, workplace and all the devices they contain with the power of machine-based AI and intelligent Bot services for a completely streamlined experience.
Because IoT devices are deployed in mission-critical environments more than ever before, it’s increasingly imperative they be truly smart. IoT sensors simply stockpiling data isn’t useful. IoT must be artificially and naturally intelligent in order to provide more value In his session at @ThingsExpo, John Crupi, Vice President and Engineering System Architect at Greenwave Systems, will discuss how IoT artificial intelligence (AI) can be carried out via edge analytics and machine learning techn...
FinTechs use the cloud to operate at the speed and scale of digital financial activity, but are often hindered by the complexity of managing security and compliance in the cloud. In his session at 20th Cloud Expo, Sesh Murthy, co-founder and CTO of Cloud Raxak, showed how proactive and automated cloud security enables FinTechs to leverage the cloud to achieve their business goals. Through business-driven cloud security, FinTechs can speed time-to-market, diminish risk and costs, maintain continu...