sb-au logo
Story image

The cost of securing BYOD with mobile agents - Bitglass

25 Oct 2019

Article by Bitglass APJ vice president Dave Shephard

The rapid growth of enterprise mobility and a growing reliance on bring your own device (BYOD) means that most enterprises have to deal with the challenge of securing corporate data in the cloud.

Clearly, there is a balance to be struck between employee privacy, mobility, usability, and corporate security.

While control and visibility are normally synonymous with data protection, these factors can have unintended side effects when it comes to mobile security.

In a bid to gain visibility and control over the mobile devices connecting to their enterprise networks, many firms have turned to mobile device management (MDM) tools.

At first glance, this may seem like the right approach, however there are many downsides.

MDM solutions require the installation of an agent on to each personal device, whether that device is owned by an employee or by the firm.

The installation of agent-based MDM tools on mobile devices creates a new and unexpected challenge around the issue of end-user privacy and data protection.

Most employees understand that by enabling MDM software on their personal devices, they are surrendering control over the data to their employer.

What most people and businesses do not realise is the extent to which this is the case.

In a week-long experiment, my company set out to test the extent to which MDM could be used to monitor and control users’ smartphones and tablets without their knowledge.

Everyone participating in the trial gave permission for the IT team to push MDM certificates to their devices, a practice commonly used to route data through the corporate network via a VPN or global proxy.

In just seven days, the MDM software gathered a range of information about employees’ interests, activities, identity, and relationships.

So here’s a review of what information was accessed during the experiment:

  • By routing traffic through a global proxy, testers were able to capture employee browsing activity. Access to their web history meant that everything was visible - from Amazon product searches to sensitive healthcare queries, and even political affiliations and interests.
     
  • Researchers were able to break SSL encryption, using a global proxy and a trusted certificate. By re-routing SSL-based traffic unencrypted, access was gained to users’ personal email inboxes, social networking accounts and banking information. In other words, all secure logins were exposed as usernames and passwords used to log into sensitive accounts were transmitted to the server in plain text.
     
  • Researchers were able to monitor outbound and inbound private communications using MDM extended to third-party apps – even on iOS, where some believe app sandboxing limits employer visibility into user behaviour. That meant it was possible to intercept personal communications sent through apps such as Gmail or Facebook Messenger and take an inventory of all the apps installed on an employee’s device.
     
  • Most employees were aware that administrators can easily track managed devices via GPS, but few realised this data could be used to monitor their behaviour. The research team was able to force the GPS to remain active in the background without notifying the user, also draining the battery power in the process.
    In this way, researchers could review the location and out-of-work habits of employees – where they went after work, where they travelled on weekends, how frequently they visited the supermarket, and more.
     
  • MDM’s remote wipe capabilities represent a particular concern to employees, many of whom store personal contacts, notes, and other data on their devices. The MDM also allowed the research team to restrict backups, making a restore from iCloud or similar service impossible, leaving employees little recourse when trying to retrieve lost data.
     
  • Finally, the team was able to use MDM to restrict core device functionality to lock down and secure devices, limiting user access to the camera, apps like FaceTime on iOS, and basic features like copy and paste.

Clearly, companies need to review their approach to BYOD security and make it clear as to what data they are collecting and how it is being stored.

A security solution like MDM fails to respect user privacy and should not be a common security practice.

For this reason, organisations should look to take a different approach to the BYOD security challenge.

Just like MDM or MAM solutions, agentless BYOD software can also ensure total compliance with a range of regulations, while giving full visibility and audit capabilities into business data.

Agentless solutions provide control over the flow of data to the device without the challenges around user experience and the logistics of deploying the agent.

With agentless solutions being data-centric in nature, they also give employees the freedom to access corporate data from any device, without the intrusive privacy implications of MDM.

Download image
Ultimate security: The best authentication just got better
Cloud applications can hold sensitive data, and top-notch authentication is key. But having separate tools for separate applications can be cumbersome - here's how to overcome that.More
Story image
Gartner recognises Pulse Secure for Zero Trust Network Access solution
In the market guide, Gartner states that ZTNA augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate. More
Story image
Businesses move to cloud-based security solutions in a bid to support remote working
Cloud-based security tools are becoming increasingly popular following the rise in remote working during COVID-19, including a marked increase in businesses using such tools to protect of corporate financial information.More
Story image
BYOD security in remote work era still riddled with issues
Bitglass’ 2020 BYOD Report suggests that BYOD and personal device security in organisations still leave much to be desired, even as more organisations adopt flexible BYOD arrangements.More
Story image
Prevasio unveils threat analysis sandbox for containers
New SaaS solution aims to prevent breaches by automating dynamic threat analysis for docker containers.More
Story image
Not enough being done to combat email fraud in A/NZ - report
New research from SMX has revealed neither private companies nor government agencies have done enough to stamp out phishing and spoofing campaigns throughout Australia and New Zealand.More