The Pulse Secure Blog

Exploring and Discussing Secure Access Trends and Technologies

What to Expect in 2015

As we enter 2015 and look at what’s ahead for the mobile security industry, everyone here at Pulse Secure is both expecting and driving, big changes. Before I get into that, let me first take a step back and explain the “why” behind this belief…

The proliferation of mobile devices in the corporate setting has increased exponentially over the past five years and shows no signs of fading. The concept of end-users demanding the ability to access corporate resources while also maintaining the freedom of ownership to use their devices as they see fit can create problems for enterprises. As CIOs and IT departments continue to develop a better understanding of what this means for employees and the employer, we predict the following trends will dominate 2015:

  • Move over Mobile Device Management (MDM): Make way for Workspace Management. In 2015, we will see a shift as enterprises try to manage and secure mobile devices via MDM to employing workspaces that secure only portions of the device that access and store corporate data. This shift will reduce tensions between enterprise administrators and device operators over who owns the data. It will also help clarify the abilities that enterprises have to secure data by locking and wiping devices at their discretion.
  • More Malware! To date, there haven’t been any malware developments that would have the ability to impact iOS devices that are chained to the App Store. However, enterprise administrators are not diligent at performing health checks for rooted or jailbroken devices. These devices are constantly trying to penetrate enterprise resources and will remain a leading threat to enterprises.
  • Continued Fragmentation of Android Devices. Any trend post would be incomplete if it did not consider the ongoing fragmentation of Android devices. There is a clear need for an MDM/workspace management suite that can seamlessly and effectively manage both old and new Android releases while accurately detecting rooted Android devices across the spectrum of fragmented devices.
  • Monetizing Threats via SMS and Ad Networks. The exponential growth of SMS Trojans that leverage premium rate services and allow an attacker to take profits will continue as long as there are Android devices that remain fragmented with older releases and don’t have updated SMS protections built in.
  • Apps Will Ask for Permission, Not Forgiveness. As non-malicious developers continue to attempt to monetize their apps by integrating intrusive ad networks, enterprises will need to tweak their approach. More and more applications will be requesting permissions that far exceed the context of the applications and administrators will find themselves having to continually check reputation scores and the devices health.
  • Enterprise Apps Will Skyrocket. Enterprises in various industries, from financial, to medical to insurance, have seen benefited from mobile applications. The continued adoption will lead to innovation in the mobile application ecosystems and we will see even more industries creating applications to enhance productivity.

In 2015, expect to see more mobile capabilities and innovations explored by industry leaders. With new innovations and new technologies, expect the existing giants in the vendor space to continue testing the limits to increase productivity while ensuring the confidentiality, integrity, and availability of data. Personal and private data that has been largely comingled will see real plans formulated to separate and secure portions of devices while allowing users to interact with their devices as they see fit. While all of this innovation is taking place, we must continue to remain vigilant and proactive as to how the attacker community will educate themselves and find perceived weaknesses to steal data, intellectual property and money.