Enterprise mobile security tools may not protect BYOD

 

Connecting state and local government leaders

In a Black Hat presentation, a security consultant explained how existing EMS solutions could often be ineffective, even on standard, non-jailbroken personal devices.

For employees, bring-your-own-device workplace policies can increase efficiency and improve remote work capabilities. For the organization, BYOD can reduce equipment costs, but it can also open the enterprise up to all sorts of new exploits and breaches.

VantagePoint Senior Security Consultant Vincent Tan discusses the efficacy of software that protects personal mobile devices used in the workplace.
Photo by Richard C. Hoffman

In his recent Black Hat conference presentation, Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions, VantagePoint Senior Security Consultant Vincent Tan discussed the growth of BYOD and the software that protects personal mobile devices used in the workplace, as well as emerging techniques to better secure these devices and ultimately enterprise networks and data.

Just a few years ago, many agencies were on the fence about employees using their own smartphones, tablets or laptops for work, or they disallowed it all together. But now, more organizations are setting BYOD policies that permit or even encourage people to use their personal computing devices to increase productivity, allow for the easier remote access and work-from-home capabilities, and reduce the organization's IT costs related to buying, outfitting, maintaining, updating and fixing the laptops and smartphones issued to employees. This trend is expected to cause the global market for BYOD and enterprise mobility solutions that support it to quadruple in size over the next four years, jumping to $284 billion worldwide by 2019.

“Mobile devices are a little different in terms of attack surface than your traditional laptop computer,” Tan said. “Everything is moving to these platforms now.” With the Internet of Thing spurring IP access to all manner of equipment and industrial systems, a growing number of enterprise access points will quickly be controlled through mobile or non-conventional devices, he said. That makes it imperative that those devices be secured.

“BYOD software is used by some of the largest organizations and governments around the world,” Tan said. “Barclays, Walmart, AT&T, Vodafone, United States Department of Homeland Security, United States Army, Australian Department of Environment and numerous other organizations, big and small, all over the world.”

These enterprise mobile security (EMS) products promise to deliver data, device and communications security for enterprises at the application, network and operating system layers, Tan said. They aim to solve a host of data, loss and network privacy concerns, as well as the possibility of jailbreaking or rooting devices, which would typically make them more susceptible to breaches and exploits.

In his presentation, Tan used  Swizzler, a tool that allows mobile app penetration testers to bypass the protections that EMS solutions implement, to show how existing EMS solutions could often be ineffective, even on standard, non-jailbroken devices. In some cases, he said, these solutions could even expose an organization to unexpected risks.

Using the Good Technology EMS suite as an example, Tan said such solutions were somewhat limited (or could by bypassed) because of how they used various security mechanisms, including application screenshot caching, antistatic and antidynamic analysis, injection detection, antidebugging and jailbreak or root detection. In addition, Tan’s penetration testing revealed issues with the EMS solution itself, including how it implements binary protections and intranet access.

While Tan did not discourage IT security professionals from embracing the BYOD trend, he underscored the importance of understanding the potential risk that comes with bringing personal devices into the enterprise -- even if the enterprise is using security solutions. “Whether you are a CXO, an administrator or a user,” Tan said, “you can't afford not to understand the risks associated with BYOD.”

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.