{"id":11225,"date":"2015-12-08T05:00:04","date_gmt":"2015-12-08T13:00:04","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=11225"},"modified":"2015-12-09T09:22:48","modified_gmt":"2015-12-09T17:22:48","slug":"mobile-security-variations-on-a-theme","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/12\/mobile-security-variations-on-a-theme\/","title":{"rendered":"Mobile Security: Variations on a Theme"},"content":{"rendered":"<p>Niccol\u00f2 Paganini\u2019s <a href=\"https:\/\/www.youtube.com\/watch?v=PZ307sM0t-0\" rel=\"nofollow,noopener\"  target=\"_blank\">Caprice No. 24<\/a> in A Minor is a famous and notoriously difficult composition that only the most advanced violinists can play. It\u2019s made up of a theme, along with Paganini\u2019s own variations. But as respectable as it is on its own, it\u2019s been discovered and rediscovered by a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Caprice_No._24_%28Paganini%29#Variations_on_the_theme\" rel=\"nofollow,noopener\"  target=\"_blank\">large number of composers and artists<\/a> over the years for new audiences, many of whom may not have realized they were listening to Paganini in the first place.<\/p>\n<p>Each variation on a theme can provide new insights, because they challenge the audience to hear things that they may not have otherwise noticed. But without knowledge of the original theme, there\u2019s also a chance of missing out on the big picture. In some ways, the discussion around mobile security takes on its own variations of a theme, because many people share common concepts on risk but their priorities on what must be done vary greatly.<!--more--><\/p>\n<p>I\u2019ve had discussions with people who see mobile security as a data at rest issue, namely how to protect and remove data once it reaches the mobile device. That argument may address some of the issues with lost and stolen devices, but it does not address what happens if there is a malicious adversary trying to control the device.<\/p>\n<p>Then there are networking teams who see mobile security as a network blocking issue, namely that they\u2019ll do whatever they can to keep BYOD and unsanctioned devices off their corporate network. That may be a way to keep infected mobile devices out of sight, out of mind, but it doesn\u2019t really make the sanctioned devices any safer to use.<\/p>\n<p>There are also networking teams who see mobile security as being a remote access issue, but as applications move to the cloud, the use case for remote access becomes fuzzy, and the use of standalone VPN appliances even fuzzier.<\/p>\n<p>It\u2019s important to ask whether you\u2019re addressing the problem itself, or a variation of the problem. For example, while each of the problems above are valid in their own right, the bigger issue is that organizations often lack ways to enforce security policies that could prevent improper application traffic and threats from reaching the device in the first place.<\/p>\n<p>These thoughts come to mind as I read through <a href=\"https:\/\/nccoe.nist.gov\/projects\/building_blocks\/mobile_device_security\" rel=\"nofollow,noopener\"  target=\"_blank\">NIST Special Publication 1800-4<\/a>, which outlines the problem in mobile security. Section 4.4.1 discusses threats (including mobile malware) and Section 4.4.2 discusses exploitable vulnerabilities, both of which are at the heart of modern cyberattacks.<\/p>\n<p>At Palo Alto Networks, we believe that prevention is a necessary and critical measure to prevent exploits and malware from reaching the device in the first place. The next-generation security platform provides an integrated approach toward the use of global threat intelligence to stop threats in application traffic. With <a href=\"http:\/\/paloaltonetworks.com\/globalprotect\" target=\"_blank\">GlobalProtect<\/a>, all corporate application traffic is inspected by the next-generation security platform, regardless of where the user is located. This enables the organization to take a prevention-first approach by applying security policy to stop both known and unknown mobile threats.<\/p>\n<p>As mobile security becomes better understood, it is important to develop strategies and frameworks that will help foster broader understanding of the issues at play \u2013 not just one or two variations. Stopping threats won\u2019t come from solving the variations of the theme, but rather by addressing the core of the problem itself. Plan for prevention first in order to strengthen your mobile security strategy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Niccol\u00f2 Paganini\u2019s Caprice No. 24 in A Minor is a famous and notoriously difficult composition that only the most advanced violinists can play. It\u2019s made up of a theme, along with Paganini\u2019s &hellip;<\/p>\n","protected":false},"author":19,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[76,1229],"tags":[77,100],"coauthors":[788],"class_list":["post-11225","post","type-post","status-publish","format-standard","hentry","category-mobility","category-security-platform","tag-byod","tag-globalprotect"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=11225"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11225\/revisions"}],"predecessor-version":[{"id":11355,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/11225\/revisions\/11355"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=11225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=11225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=11225"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=11225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}