https://www.engineeringnews.co.za

Protecting mobile devices from malicious content

MOBILE DEVICE AGENT A behavioural risk agent assesses computing payloads of applications, network chatter and content-delivery channels

CORPORATE CONTROL Companies can view statistics, risks and attacks and analyses of all the devices on their networks, and can interrogate the intention of malware to identify threats

11th September 2015

By: Schalk Burger

Creamer Media Senior Deputy Editor

  

Font size: - +

Cybersecurity and protection company Check Point has released a mobile threat-prevention system to protect business information contained in mobile devices from cyberattacks, says Check Point Security Technologies mobility product management head Michael Shaulov.

Shaulov is an entrepreneur who founded mobile cybersecurity company Lacoon, which was wholly acquired by Check Point. The mobile threat prevention system protects devices from malware, from attacks and exploits when connecting to public WiFi hot spots and also scans all file attachments for malicious content.

“The aim is to protect mobile devices from all attack vectors, and the predominant attack vector is not only public WiFi, but mobile applications (apps) that users download and install from reputable app stores and third-party app stores.”

Further attack vectors include multimedia messaging service messages and portable document format documents. The system protects against content sent to the devices that is designed to exploit the devices, he notes.

The mobile threat-prevention solution can detect and protect against threats from all these vectors because it uses a behavioural risk engine consisting of algorithms that assess applications, network chatter and all content-delivery channels, such as multimedia messages, to determine whether a device is infected, vulnerable, compromised or secure.

The solution requires that mobile devices have a low-resource app to run the algorithms, while further algorithms operate within the overarching cloud system through which devices communicate information to the enterprise and store company and workflow information.

“Once we detect that a device is compromised, we can remotely trigger a remediation process on the device and assist the user in removing the threat or in mitigating it.”

The solution relies on close integration with mobile device management vendors’ systems, which enables it to apply policies on the mobile devices, such as disconnecting compromised devices from corporate emails or prohibiting the device from accessing or opening corporate documents, Shaulov explains.

The system is available for Android and iOS mobile operating systems, and the Check Point mobile product division, under Shaulov, is examining the development of the system for devices using the Windows Mobile operating system.

One of the design criteria of the system was that it does not impact too severely on users’ devices, says Shaulov: “The mobile app agent uses limited resources on the mobile devices, and typically consumes less than 2% of battery life over 24 hours and requires negligible amounts of bandwidth to communicate.”

It is also built with stringent privacy mechanisms and does not collect personal information of users. All information sent to the cloud for management and administration is anonymised on the device prior to transmission, he adds.

The cloud portion of the system enables corporate users to view statistics and analyses across all the devices on their networks, as well as risks and attacks. It also enables users to drill down and interrogate the intention of malware, for example whether malware tried to activate a device’s camera or access contact lists, in analysing threats to an enterprise.

Edited by Martin Zhuwakinyu
Creamer Media Senior Deputy Editor

Comments

Showroom

Rittal
Rittal

Rittal is a world leading provider of top-quality integrated systems for enclosures, power distribution, climate control, IT infrastructure and...

VISIT SHOWROOM 
Rio-Carb
Rio-Carb

Our Easy Access Chute concept was developed to reduce the risks related to liner maintenance. Currently, replacing wear liners require that...

VISIT SHOWROOM 

Latest Multimedia

sponsored by

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION







sq:0.508 0.77s - 164pq - 2rq
Subscribe Now