Welcome!

News Feed Item

Gigaom Research Reveals Organizations are Unprepared for Security Incidents Involving Mobile Malware and Data Leakage



Huge growth of mobile devices, data and BYOD initiatives create demand for
integrated mobile security, visibility and incident readiness


Singapore, July 16, 2014 - (ACN Newswire) - AccessData, the leader in incident resolution solutions, and Gigaom Research, recently released a report on the growing complexities of mobile security and the limitations of "preventive, policy-driven" solutions that are not designed to detect and respond to mobile security incidents that bypass defenses. The report "Mobile security and incident readiness: preparing for threats" advises InfoSec teams to expand their rapid incident detection and response capabilities to mobile devices that have access to sensitive data.

"In speaking with the various organizations, we found that many rely too heavily on their mobile device and mobile application management systems to handle mobile security," said Michael Finneran, author of the report. "The preventive controls MDM offers are important, yet with the increase in mobile incidents, complicated by the sheer volume and diversity of devices and terabytes of data, security solutions with visibility and capabilities to detect and resolve incidents are in dire need."

Key findings show that:

- Security teams lack the tools and knowledge to detect mobile device security incidents and to proactively investigate and resolve those incidents before major damage is done.

- A significant percentage of organizations are taking virtually no steps to ensure that mobile devices (company issued and BYOD) with access to corporate data are indeed secure. A recent InformationWeek survey found 46 percent required BYOD users to run an MDM client on their mobile devices while 43 percent trusted users to follow published security guidelines.

- Even fewer have procedures in place to launch a meaningful response should a security incident involving mobile devices occur.

- Even experienced forensic examiners are challenged in extracting data from mobile devices. Data investigations extend beyond the early days of emails, SMS messages and call logs to analyze hidden or stolen data in applications, volatile data, multi-media and geolocation.

"Our customers tell us their biggest challenge is the limitations of mobile solutions, from the collection of data on all company devices, to the analysis of mobile data which takes a great deal of time and resources," said Lee Reiber, VP of mobile forensics at AccessData. "Our advice is for companies to implement security plans and enterprise technologies that incorporate proactive mobile prevention, detection and response, to gain greater visibility and control of their mobile data and devices."

Key Recommendations

- Proactive planning for incident readiness on mobile devices should be done as a part of the development of mobile security plans and policies.

- Look for advanced security tools with deep mobile device visibility that proactively collect and store key information over time which is useful for detecting security incidents, understanding the root cause and scoping the full extent of what happened.

- Integrate mobile device visibility including access to call logs and data with the automation of mobile threat identification, analysis and resolution.
With the dramatic increase in threats affecting mobile devices such as data leakage, mobile malware, insider threats and hacker compromises, enterprises need to look beyond current MDM/MAM solutions and invest in strengthening their mobile device rapid detection and response capabilities.

Additional Resources

Gigaom Report - "Mobile security and incident readiness: preparing for threats" - http://bit.ly/1smRieS

About Gigaom Research

Gigaom Research provides timely, in-depth analysis of emerging technologies for individual and corporate subscribers. Our network of 200+ independent analysts provides new content daily that bridges the gap between breaking news and long-range research. Please visit http://research.gigaom.com.

About AccessData

AccessData Group makes the world's most advanced and intuitive incident resolution solutions. AccessData technology delivers real-time insight, analysis, response and resolution of data incidents, including cyber threats, insider threats, mobile and BYOD risk, GRC (Governance Risk & Compliance) and eDiscovery events. Over 130,000 users in corporations, law enforcement, government agencies, and law firms around the world rely on AccessData software to protect them against the risks present in today's environment of continuous compromise. For more information, please visit http://accessdata.com.

Source: AccessData

Contact:
Judy Kaneko
AccessData
+1.408.769.1673
[email protected]

Asia Pacific 
EASTWEST PR for AccessData 
+65.6222.0306 
[email protected]




Copyright 2014 ACN Newswire. All rights reserved.

More Stories By ACN Newswire

Copyright 2008 ACN Newswire. All rights reserved. Republication or redistribution of ACN Newswire content is expressly prohibited without the prior written consent of ACN Newswire. ACN Newswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
As the rapid adoption of containers continues, companies are finding that they lack the operational tools to understand the behavior of applications deployed in these containers, and how to identify issues in their application infrastructure. For example, how are multiple containers within an application impacting each other’s performance? If an application’s service is degraded, which container is to blame? In the case of an application outage, what was the root cause of the outage?
SYS-CON Events announced today that DatacenterDynamics has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY. DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
SYS-CON Events announced today TMCnet has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Technology Marketing Corporation (TMC) is the world's leading business-to-business and integrated marketing media company, servicing niche markets within the com...
Between the mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at 18th Cloud Expo, Charles Kendrick, CTO & Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how business and devel...
Unless you don’t use the internet, don’t live in California, or haven’t been paying attention to the recent news… you should be aware that self-driving cars are on their way to becoming a reality. I have seen them – they are real. If you believe in the future reality of self-driving cars, then continue reading on. If you don’t believe in the future possibilities, then I am not sure what to do to convince you other than discuss the very real changes that will roll out with the consumer producti...
If there is anything we have learned by now, is that every business paves their own unique path for releasing software- every pipeline, implementation and practices are a bit different, and DevOps comes in all shapes and sizes. Software delivery practices are often comprised of set of several complementing (or even competing) methodologies – such as leveraging Agile, DevOps and even a mix of ITIL, to create the combination that’s most suitable for your organization and that maximize your busines...
In the rush to compete in the digital age, a successful digital transformation is essential, but many organizations are setting themselves up for failure. There’s a common misconception that the process is just about technology, but it’s not. It’s about your business. It shouldn’t be treated as an isolated IT project; it should be driven by business needs with the committed involvement of a range of stakeholders.
Struggling to keep up with increasing application demand? Learn how Platform as a Service (PaaS) can streamline application development processes and make resource management easy.
New Relic, Inc. has announced a set of new features across the New Relic Software Analytics Cloud that offer IT operations teams increased visibility, and the ability to diagnose and resolve performance problems quickly. The new features further IT operations teams’ ability to leverage data and analytics, as well as drive collaboration and a common, shared understanding between teams. Software teams are under pressure to resolve performance issues quickly and improve availability, as the comple...
The IoT has the potential to create a renaissance of manufacturing in the US and elsewhere. In his session at 18th Cloud Expo, Florent Solt, CTO and chief architect of Netvibes, will discuss how the expected exponential increase in the amount of data that will be processed, transported, stored, and accessed means there will be a huge demand for smart technologies to deliver it. Florent Solt is the CTO and chief architect of Netvibes. Prior to joining Netvibes in 2007, he co-founded Rift Technol...
SYS-CON Events announced today that Enzu, a leading provider of cloud hosting solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to foc...
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
Join IBM June 8 at 18th Cloud Expo at the Javits Center in New York City, NY, and learn how to innovate like a startup and scale for the enterprise. You need to deliver quality applications faster and cheaper, attract and retain customers with an engaging experience across devices, and seamlessly integrate your enterprise systems. And you can't take 12 months to do it.
This is not a small hotel event. It is also not a big vendor party where politicians and entertainers are more important than real content. This is Cloud Expo, the world's longest-running conference and exhibition focused on Cloud Computing and all that it entails. If you want serious presentations and valuable insight about Cloud Computing for three straight days, then register now for Cloud Expo.