{"id":4236,"date":"2013-12-09T05:00:48","date_gmt":"2013-12-09T13:00:48","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=4236"},"modified":"2013-12-06T09:45:05","modified_gmt":"2013-12-06T17:45:05","slug":"2014-predictions-mobile-security","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2013\/12\/2014-predictions-mobile-security\/","title":{"rendered":"2014 Predictions: Mobile Security"},"content":{"rendered":"<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:59%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-4209 lozad\" alt=\"PAN_PredictionsCyberSecurityLogo-01\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-500x295.jpg\" width=\"500\" height=\"295\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-500x295.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-230x135.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-510x300.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/12\/PAN_PredictionsCyberSecurityLogo-01-67x40.jpg 67w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>It was a watershed year for mobile malware, with many high-profile organizations being <a href=\"http:\/\/www.securityweek.com\/security-wise-its-tough-time-be-online-news-site\" rel=\"nofollow,noopener\"  target=\"_blank\">hacked<\/a>. To continue our series on 2014 predictions, we asked our mobility experts for their thoughts on <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/mobility\/\" target=\"_blank\">key mobile security<\/a> topics we think you\u2019ll be hearing more about in the new year.\u00a0<!--more--><\/p>\n<p><b>1. The Mobile OS Ecosystem is Too Big for Patchwork Protection<\/b><\/p>\n<p>Many in the security industry cut their teeth on securing Windows-based devices, and it\u2019s logical that they would make assumptions about how to secure iOS and Android devices based on their experiences securing Windows.<\/p>\n<p>But the mobile ecosystem is much more complicated and far-reaching than Windows. Too much of what\u2019s being described as mobile security is based on buying add-ons for different devices running different operating systems \u2013 a scattershot model doomed to fail. Rather than focus on securing individual devices, organizations need to look for security solutions that <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/03\/addressing-mobility-challenges-with-the-next-generation-firewall\/\" target=\"_blank\">extend next-generation firewall policies across the full range of mobility use cases<\/a>, independent of OS.<\/p>\n<p><b>2. Mobile Security Issues Turn Security Admins\u2019 Attention Outside the Firewall<\/b><\/p>\n<p>Still too many \"mobile security\" solutions protect a user\u2019s mobile device while they're behind the corporate firewall but don't enforce mobile security policy when users are outside it \u2013 an increasingly shortsighted approach. <a href=\"http:\/\/www.reuters.com\/article\/2013\/02\/15\/net-us-usa-social-facebook-idUSBRE91E16O20130215\" rel=\"nofollow,noopener\"  target=\"_blank\">Facebook was hacked<\/a> earlier this year, for example, when employees connected to a mobile developer\u2019s compromised website, downloaded malware and then introduced it to Facebook\u2019s internal servers when they were back behind the firewall. Expect to hear similar stories in 2014, and hopefully a shifting debate on how to solve these challenges.<\/p>\n<p><b>3. \u201cLock it Down\u201d Just Won\u2019t Play<\/b><\/p>\n<p>Many organizations still take a \"lock it down\" approach to mobile security and have put policies into effect that are so strict they eliminate the productivity and flexibility benefits of BYOD. But the mushrooming popularity of smartphones and tablets means users will find a way to use them on networks whether admins like it or not. In 2014, a majority of organizations will finally turn away from the \u201clock it down\u201d approach in favor of a mobile security model that gives users some breathing room while preserving the secure enterprise network.<\/p>\n<p><i>For more on current mobile security topics, check out <\/i><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/brian\/\" target=\"_blank\"><i>Brian Tokuyoshi\u2019s ongoing mobility series.<\/i><\/a><i><\/i><\/p>\n<p>- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -<\/p>\n<p><strong>Don't forget to read our other\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/2014-predictions\/\" target=\"_blank\">2014 predictions<\/a>:\u00a0<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/isabelledumont\/\" target=\"_blank\">Isabelle Dumont<\/a>\u00a0on\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/2014-predictions-cybersecurity-trends\/\" target=\"_blank\">cybersecurity trends<\/a>\u00a0<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/wade\/\" target=\"_blank\">Wade Williamson<\/a>\u00a0on\u00a0<a href=\"http:\/\/bit.ly\/1dQjgtw\" rel=\"nofollow,noopener\"  \" target=\"_blank\">APTs and the threat landscape<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/matt\/\" target=\"_blank\">Matt Keil<\/a> on <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2013\/12\/2014-predictions-firewall\/\" target=\"_blank\">firewalls<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It was a watershed year for mobile malware, with many high-profile organizations being hacked. To continue our series on 2014 predictions, we asked our mobility experts for their thoughts on key mobile &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[76,229],"tags":[233,1815,74,234,235],"coauthors":[],"class_list":["post-4236","post","type-post","status-publish","format-standard","hentry","category-mobility","category-predictions","tag-2014-predictions","tag-firewall","tag-malware","tag-mobile","tag-patchwork"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4236"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4236\/revisions"}],"predecessor-version":[{"id":4242,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4236\/revisions\/4242"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4236"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=4236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}