A report by the Aberdeen group* pointed out that mobile “application security-related incidents have a high probability of occurrence” and security concerns around mobile applications are likely to “jump to the top of the list” in the near future.

It is true that organizations scrambling to develop mobile applications, in the face of increased competition, outsource the development of their mobile applications to small boutique software developers. The boutique shops have little or no appreciation of enterprise security. The area of their focus is different. As a result, organizations do not get mobile applications that are hacker proof or secure. A rethink on application development and security management is urgent. Organizations must understand that traditional approaches to good software development should not be overridden in the effort to get the application up and running. The gap between awareness and action needs to be bridged!

Cloud backup services that offer mobile connectivity services as part of their offering are more tuned in to the application security needs of the customers they service.  They have established guidelines for secure coding of mobile applications and relevant processes for validating compliance. They are constantly on the watch for exploitable mobile application vulnerabilities, so that their customers can embrace mobility with none of its attendant problems.

Cloud backup services are focused on developing secure plug-ins for different mobile operating systems and create the right eco-system for mobile applications that will run on that operating system. Users can download the required Cloud backup application interface plug-in and gain access to the enterprise information. The application plug-in development process uses the latest HTML or MEAP or a hybrid approach, and takes into consideration specific mobile device features such as screen size or existence of GPS to deliver quality user experience.

Mobile applications developed by Cloud backup service providers do not allow the mobile application access the back end business data repositories without authorization and authentication. Administrators must identify the mobile user and assign enterprise policy driven rights and permissions to enable access to the central organizational database in the Cloud. This process integrates the mobile workforce into the organization’s computing network and enforces on these end points the security policies that are implemented across the enterprise. Security threats are abstracted from the mobile device to the Cloud server where detection is more robustly configured.

Securstore provides secure desktop, laptop and mobile Cloud backups to enterprises. Having difficulty with data mobility and protection? Let us help you. Please contact us for a free, no obligation consultation.

[*] http://www.aberdeen.com/Aberdeen-Library/7616/RA-enterprise-mobility-management.aspx