{"id":90869,"date":"2020-04-07T09:00:13","date_gmt":"2020-04-07T16:00:13","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90869"},"modified":"2023-05-15T23:06:41","modified_gmt":"2023-05-16T06:06:41","slug":"mobile-security-60-percent-problem","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/07\/mobile-security-60-percent-problem\/","title":{"rendered":"Mobile security\u2014the 60 percent problem"},"content":{"rendered":"
This blog post is part of the Microsoft Intelligence Security Association (MISA) guest blog series<\/a>. To learn more about MISA, visit the MISA webpage<\/a>.<\/em><\/p>\n Off the top of your head, what percentage of endpoints in your organization are currently protected?<\/p>\n Something in the 98 percent+ range?<\/p>\n Most enterprises would say having fewer than 2 percent of endpoint devices lacking adequate security would be considered good given the various changes, updates, etc. However, enterprises have traditionally focused security and compliance efforts on traditional computing devices (for example, servers, desktops, and laptops), which represent just 40 percent of the relevant endpoints. The remaining 60 percent of endpoints are mobile devices and are woefully under-protected. That\u2019s a problem.<\/p>\n Mobile devices, both corporate-owned and bring your own device (BYOD), are now the dominant productivity platform in any enterprise organization, with more than 80 percent of daily work performed on a mobile device. These devices operate extensively outside of corporate firewalls, in the hands of users who may not prioritize precautions like vetting Wi-Fi networks or keeping their devices patched and updated. Mobile often represents a wandering corporate data repository.<\/p>\n These factors combine to cause headaches for security teams because, in short, mobile security has a significant gap in most organizations\u2019 endpoint protection strategies.<\/p>\n The lack of protection for (and visibility into) these endpoints introduces significant risk and compliance concerns that show no sign of slowing down. Here are some statistics from Zimperium\u2019s State of Enterprise Mobile Security Report, 2019<\/a>, which contains data from more than 45 million anonymized endpoints<\/strong> from enterprises in a variety of industries and both local and national government agencies from around the world:<\/p>\n The combination of Microsoft’s management and security solutions and Zimperium’s unique on-device mobile device security delivers unequaled protection for managed and unmanaged BYOD devices. Together, Microsoft and Zimperium have delivered numerous innovations for customers in areas such as:<\/p>\nMobile security is more important than ever<\/h3>\n
\n
Microsoft and Zimperium deliver comprehensive mobile security<\/h3>\n
\n
\n<\/strong>Zimperium’s mobile threat defense (MTD) integrates with Microsoft Endpoint Manager<\/a> to offer customers a jointly developed the solution that provides device-risk based app protection<\/a> for unenrolled BYOD devices.<\/li>\n
\n<\/strong>Zimperium offers advanced integration with Microsoft Defender ATP<\/a> for forensic-level threat visibility and hunting.<\/li>\n
\n<\/strong>With this MTD solution integrated with Azure Sentinel<\/a>, security analysts are now able to include mobile threat data in their advanced threat hunting and threat correlation analysis.<\/li>\n
\n<\/strong>Zimperium is capable of running natively on Microsoft Azure<\/a>.<\/li>\n<\/ul>\n