IBM Worklight is a mobile application platform that enables you to develop, deploy, and manage mobile applications. Security is always a top priority when using mobile devices for business, and Worklight can help. Here are 5 things to know:
1. One in every 20 mobile devices will be lost or stolen
If you provide access to data about your business through a mobile device, you need to be concerned about security. Mobile devices have a habit of being lost or stolen – 1 in every 20 according to a study by Juniper Networks. If the access to the device or the data is not effectively controlled, the data stored on the device can be compromised. IBM Worklight can help protect your business data.
2. Critical flaws in apps can be addressed immediately
Imagine a security vulnerability is found in your app. You've figured out how to fix the problem, but how can you get the fix out to users of the app as quickly as possible? If your app is hosted in a public app store you'll need to submit the app update to that app store and wait for them to approve and publish it. And then you'll need the users of your app to go to the app store and apply that update. The whole process could take weeks. But not if you're using Worklight. The Worklight direct update feature can automatically update hybrid applications by directly pushing the update to the mobile device, bypassing the app store update process.
3. You can keep everyone on the same, most secure, version of an app
You've deployed your mobile app to thousands of users. Over time you've deployed multiple versions of that app. Supporting each of those versions can soon become a maintenance nightmare. With Worklight's remote disable feature you can ensure all your users are only using the latest version of your app, containing the latest security enhancements. Access to previous versions of the app are automatically, and remotely, disabled.
4. Encrypt user data when its stored on a mobile device
Enterprises go to great lengths to ensure their corporate data is encrypted and securely stored on their enterprise servers. But what about data that is accessed, transferred, and stored locally in a mobile app? Worklight is able to protect sensitive information from malware attacks and device theft. AES256 and PCKS#5 encryption is used to secure data stored on the mobile device. Worklight supports Encrypted Offline Cache and JSONStore for encrypting offline data.
5. Take advantage of existing authentication mechanisms
Adopting authentication mechanisms and protocols already in use by your enterprise in your mobile apps helps to reduce cost and limit vulnerabilities from introducing new security technologies. By integrating Worklight with IBM Security Access Manager for Cloud and Mobile you can take advantage of a single infrastructure to deliver centralized management of user privileges for all Worklight mobile apps.
For more information on securing your mobile apps using Worklight, see the IBM Redbooks publication:
Securing Your Mobile Business with IBM Worklight.
Martin Keen is an IBM Redbooks Project Leader. He works with technical experts to create books, guides, blogs, and videos. Follow Martin on Twitter at @MartinRTP.