Additionally, mobile security must be quick and easy to deploy, without requiring custom code development or burdening IT with provisioning setups. Mobile security also must preserve or enhance the user experience. If all of these requirements are not met, the mobile security approach won't be adopted and won't scale across the enterprise.
What IT specifically needs is a way to quickly and easily apply fine-grained security and policy controls around mobile apps, and in parallel, tailor apps to meet specific security policy requirements. And remember, IT needs to achieve this regardless of the app's source, without modifying the user experience or installing a management client or agent on the device.
Enter The Self-Defending App
The app wrapping approach enables enterprise IT to apply security policies to the binary image of virtually any finished application in an automated and replicable way to create a "self-defending app."
App wrapping injects pre-developed security features into an existing application after the development process is done. IT simply selects the security features they want to add to the app, clicks a button to start the process, and the app wrapping software takes care of the rest. No new coding is necessary. And because the injected code has been pre-developed by security experts, IT can be assured of the highest level of security.
App wrapping results in a consistent security approach across all mobile apps, regardless of where they were originally developed, and IT can know they are safe for enterprise use. App wrapping does not require mobile devices to be managed in any way, making it ideal for use with partners, resellers, customers, distributors and others in the extended enterprise
This approach is highly effective at protecting apps and their data, even if the device itself is compromised. Policies can prevent copying and pasting of corporate data out of applications, encrypting data at rest, or even creating a true per-app VPN tunnel back to the enterprise. Self-defending apps fulfill enterprise security requirements while preserving the integrity of the app, its user experience and device battery life, giving all stakeholders in the organization--management, users and IT-- the confidence to more completely mobilize the entire extended enterprise.
Sign up for CIO Asia eNewsletters.