• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechThe Mobile Executive

Mobile Security Turns Into Big Business for Cyber Firms

By
Jeff John Roberts
Jeff John Roberts
Editor, Finance and Crypto
Down Arrow Button Icon
By
Jeff John Roberts
Jeff John Roberts
Editor, Finance and Crypto
Down Arrow Button Icon
January 6, 2017, 4:02 PM ET
NTT Docomo Inc. President Kaoru Kato Unveils New Smartphones
Models hold Fujitsu Ltd. Arrows, from left, Sharp Corp. Aquos Zeta, Sony Corp. Xperia Z3 and Xperia Z3 Compact smartphones during a news conference unveiling NTT Docomo Inc.'s new smartphone models in Tokyo, Japan, on Tuesday, Sept. 30, 21014. NTT Docomo, Japan's largest mobile phone company, introduced 16 mobile devices for winter and spring today. Photographer: Tomohiro Ohsumi/Bloomberg via Getty ImagesPhotograph by Tomohiro Oshumi — Getty Images

The prevalence of bring-your-own-device culture in the corporate world means workers can be more productive and connected. But as hackers hone their skills at breaking into cell phones, the sprawling range of devices prevents a tempting target for crime and espionage.

In response, a new market segment is emerging within the cyber-security field that involves companies that detect and mitigate attacks on mobile devices. In a recent research report, Gartner dubbed this new field “mobile threat defense,” and described a range of services—including scanning for risky apps and threatening WiFi networks—that the firms are offering.

Since more workers now use their personal devices for work purposes, the firms’ services often involve supplying a security app for employees to install on their iOS or Android phone.

Patrick Hevesi, the author of the Gartner report, told Coins2Day that cyber-security companies are still working to develop a full suite of services, but named FireEye (FEYE), Lookout, and Better Mobile as early leaders in mobile threat defense field.

Get Data Sheet, Coins2Day’s technology newsletter.

The task of protecting mobile devices is more difficult than a traditional enterprise environment, says Roy Tuvey, CEO of security firm Wandera, because employees exercise more control, and because it’s not practical to safeguard everyone’s phone within a virtual corporate network. But he says there’s an upside in that it’s harder for attackers to take over or steal data from mobile devices due to their layered architecture.

As for the threats directed at mobile phones, they come in two types, says Santosh Krishnan, the chief product officer of Lookout. First, there are carefully targeted attacks aimed at a high value individual within a company in which the attacker might use email phishing to take control over the entire phone. The other type amounts to more scattershot attacks in which attackers may distribute a malware-laden app in the hopes of stealing data.

Meanwhile, companies that want to increase their “mobile threat defense” are faced with the familiar problem of a growing roster of vendors that might be offering overlapping protections. According to Gartner’s Hevesi, the best option they have for now is to integrate the new threat tools alongside any existing mobile management service they may be using. In the future, he predicts, some of the stand-alone security companies will be integrated into larger firms’ product offerings.

About the Author
By Jeff John RobertsEditor, Finance and Crypto
LinkedIn iconTwitter icon

Jeff John Roberts is the Finance and Crypto editor at Coins2Day, overseeing coverage of the blockchain and how technology is changing finance.

See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.