Dive Brief:
-
Security experts recommend companies integrate threat intelligence with their mobile device management platforms in order to improve mobile security.
-
Threat intelligence can give an enterprise quick intel into which apps should not be allowed on their network.
- Companies also need to take into account the unique problems BYOD brings to threat intelligence.
Dive Insight:
Ensuring an expedient response to rising mobile-centric cyber security threats is critical, yet when companies look at mobile device management solutions, they tend to focus on integration and capabilities and not enough on the basics, say security experts. Basic items like logs and threat type can provide key intelligence about dangerous and malicious apps and enable companies to upgrade their mobile threat defenses.
Experts suggest companies take a holistic approach to threat intelligence, as it only makes sense when it’s applied across the entire infrastructure. Enterprises should look across the entire IT spectrum, they suggest, including servers, databases and applications to see how mobile interactions are happening and then apply threat intelligence to as broad a base as possible.