News Feed Item

Research and Markets: "Hardening" Android: Building Security into the Core of Mobile

Research and Markets (http://www.researchandmarkets.com/research/jx2vls/hardening) has announced the addition of the ""Hardening" Android: Building Security into the Core of Mobile" report to their offering.

The use cases of mobile devices result in different risk than traditional PCs. The availability of Internet-based application stores provides uniquely mobile conduits for mobile malware, with Android malware being the favored mobile attack vector. Research by the United States Computer Emergency Readiness Team (US-CERT) confirms that the majority of known mobile threats target Android devices.

Overview of Mobile Security

Mobile security cannot be viewed through the same lens or paradigm as personal computer (PC) security. The PC market began as general purpose computing platforms. Due to the evolution of the PC market, the operating system (OS) and the ecosystem of applications that run on the OS are independent. The PC application ecosystem is fundamentally open, designed that way from the start. Historically, a PC user would obtain applications from a number of sources, and install those applications, as long as the user had the proper permissions.

Mobile, due to its evolution from tightly controlled platform, is different. For mobile devices, which are defined here as smartphones and tablets, applications are generally provisioned from an application store such as Google Play or Apple iTunes. The mobile device, the mobile device OS, and the mobile device application store are tightly coupled. As a result, mobile device security cannot be discussed without discussing the application store(s) that provision applications to the device.

What is a Threat in the Mobile World?

Malicious or compromised applications are the most significant attack vector for mobile devices, making application and application store management especially germane to mobile security. In its 3Q 2013 Mobile Threat Report, F-Secure Labs classifies mobile threats into two categories based on their potential for damaging the user's device or data: Malware' and Potentially Unwanted Application' (PUA). See Figure 1 below. A key takeaway from the F-Secure Lab mobile threat classification is that mobile threats are application centric.

Key Topics Covered:

  1. Overview of Mobile Security
  2. What is a Threat in the Mobile World?
  3. Contrasting Android and iOS
  4. Android Application Stores
  5. Rooting and OS Settings to Access Alternative Market
  6. Third Party App Stores
  7. When Mobile Threats Are Not Black and White
  8. Good Security Hygiene Practices for Android .
  9. Leveraging Hardware Technology to Improve Android Security
  10. The Foundation of SecurityA Root of Trust
  11. Mobile Challenges with Roots of Trust
  12. Roots of Trust in Android
  13. Companies Leading Innovation
  14. ARM TrustZone
  15. Qualcomm
  16. SecureMSM
  17. StudioAccess Technology
  18. Enterprise and BYOD security
  19. Samsung.
  20. Device & Data Security
  21. Container Usability
  22. Easy Enrollment
  23. Cloud-based Mobile Device Control
  24. Centrify for Samsung KNOX
  25. Intel
  26. Intel Identity Protection Technology (IPT)
  27. Intel Device Protection Technology (DPT) for Android
  28. Boeing
  29. Blackphone
  30. The Last Word

For more information visit http://www.researchandmarkets.com/research/jx2vls/hardening

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
DXWorldEXPO LLC announced today that Dez Blanchfield joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Dez is a strategic leader in business and digital transformation with 25 years of experience in the IT and telecommunications industries developing strategies and implementing business initiatives. He has a breadth of expertise spanning technologies such as cloud computing, big data and analytics, cognitive computing, m...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
There is a huge demand for responsive, real-time mobile and web experiences, but current architectural patterns do not easily accommodate applications that respond to events in real time. Common solutions using message queues or HTTP long-polling quickly lead to resiliency, scalability and development velocity challenges. In his session at 21st Cloud Expo, Ryland Degnan, a Senior Software Engineer on the Netflix Edge Platform team, will discuss how by leveraging a reactive stream-based protocol,...
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
"NetApp is known as a data management leader but we do a lot more than just data management on-prem with the data centers of our customers. We're also big in the hybrid cloud," explained Wes Talbert, Principal Architect at NetApp, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.