July 23, 2015 | Written by: Neeraj Sripuram
Share this post:
In the consumer driven economy the power of data and its impact on customer engagement is prevalently well known. What is lesser known, is its parallel universe of enterprise data security, where the loss of data plays into the Billions of Dollars, and is a CIO’s biggest obstacle. This could be a mobile device that has a keyboard add on that might be compromising user credentials, and typed in data, or any other forms there of. The most common reasons for such an incident or occurrence can be attributed to the three reasons below:
#1. The Mobile OS is managed and manufactured by company X
#2. The smartphone company Y builds a wrapper on top of the core mobile OS
#3. The wrapper then uses Third Party add-ons to enable new keyboard features
In an Enterprise setting, the process involved in going mobile have the choice of “mobile OS” in front and center of the decision making process. So you may ask, what should I be looking at when I make this choice?
Some easy rule of thumb features a mobile OS should have included are:
System Security that prevents the lowest levels of software from being tampered and enables the OS to running only on validated mobile devices
Encryption and Security of bio-metric data that is enabled by the use of finger print scanners. The algorithms and storage there of on the hardware of the device v/s software, and how that data is used by the apps
The use of Hardware security features that work in tandem with the software built into the DMA [Direct Memory Access] path between the flash storage and the main memory for file encryption
Nifty and encrypted handling of Passwords, along with tools to generate unpredictable passwords.
Runtime process security, that makes sure one app doesn’t compromise data with other apps intentionally or un-intentionally.
And many more…
While the above list is not exhaustive, as an enterprise that would like to go mobile, and transform its important to understand the real “under the hood” implications of the mobile OS to empower your enterprise, and making the right choice can sometimes be simplified using the above criteria, to keep your Intellectual Property safe, and also your employees worry free.