This resource is no longer available

Addressing Mobile Threats: Effective Detection and Response

Cover
Mobile threats can take on many forms including malware, distributed denial of service attacks (DDoS), and fraud. While these attacks aren't new, their ability to leverage mobile devices is. The use of mobile devices continues to grow and they are increasingly an indispensable part of both personal and professional life. Because of this trend, criminals are discovering a greater number of targets than they previously had when their sole focus was on traditional computer systems.

Many mobile communication providers are unprepared to address these threats. While there is much discussion as to where security should be implemented -- at the mobile device, within individual organizations, or within the mobile solution provider's cloud -- most experts agree that to be effective, much of the security must be in the cloud, although a layered approach is certainly the best in a perfect world. Thus, the notion of security services provided by mobile communication providers is becoming top-of-mind as customers demand better security solutions for their mobile devices.

This paper focuses on a few of the most problematic mobile threats and provides tips and hints for how to handle them. Read on to learn more.

Vendor:
ArcSight, an HP Company
Posted:
19 Oct 2009
Published
07 Mar 2007
Format:
PDF
Length:
20 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.