A wide range of mobile devices—from BlackBerrys and Droids to iPhones and Tablets—are invading the workplace. Front-line employees as well as senior management now demand the freedom to bring their own devices to work and interact with corporate networks and data. However, the security risks that come with those mobile devices typically go unchecked by traditional security management processes and vulnerability management products—even as malware on smartphones and tablets continues to increase at rapid rates.

In some cases, IT security managers may simply be unaware of the threats that exist in this environment. In other cases, attacks may occur through mobile devices, but IT has no way to determine the occurrence of an attack or the source of the attack. In both situations, IT security teams are struggling to understand the true extent of their mobile security risk.

And, for those IT security pros that are keenly aware of mobile device security threats, many have struggled to find a simple solution to discover weaknesses within their mobile environment. In short, so few solutions have existed to help detect mobile vulnerabilities.

But, make no mistake about it; leaving mobile security out of your overall integrated security strategy opens your network to breaches, data loss, intellectual property theft, and regulatory compliance issues. With the use of smartphones and tablets on the corporate networks rising sharply, preemptive measures are needed. This whitepaper introduces three steps that mid-size and large enterprises can take immediately to find mobile device vulnerabilities and minimize the risk.

Mobile Device Security:

Just as Critical as Security for Desktops, Servers, and Networks

Mobile devices are becoming more prevalent in the workplace. According to recent reports, more than 80 percent of employees now use personal smartphones for work-related purposes. And according to other research, the creation of malware for smartphones and tablets was up 273 percent in the first half of 2011.

These situations create major security challenges for IT managers, and the extent of the IT security problem will only increase over time. According to Gartner, enterprises are forced to accommodate consumer devices because employees now insist on having just one device for both business and personal use. This makes mobile security an even greater challenge for IT security managers as they struggle to understand and minimize the security risks that come with these devices.