Addressing Mobile Threats: Effective Detection and Response
sponsored by ArcSight, an HP Company

Mobile threats can take on many forms including malware, distributed denial of service attacks (DDoS), and fraud. While these attacks aren't new, their ability to leverage mobile devices is. The use of mobile devices continues to grow and they are increasingly an indispensable part of both personal and professional life. Because of this trend, criminals are discovering a greater number of targets than they previously had when their sole focus was on traditional computer systems.

Many mobile communication providers are unprepared to address these threats. While there is much discussion as to where security should be implemented -- at the mobile device, within individual organizations, or within the mobile solution provider's cloud -- most experts agree that to be effective, much of the security must be in the cloud, although a layered approach is certainly the best in a perfect world. Thus, the notion of security services provided by mobile communication providers is becoming top-of-mind as customers demand better security solutions for their mobile devices.

This paper focuses on a few of the most problematic mobile threats and provides tips and hints for how to handle them. Read on to learn more.

(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
Available Resources from ArcSight, an HP Company
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement