Bring-your-own-device (BYOD) schemes, mobile apps security: realties and recommendations.
Indeed we are always
at the early stage of Bring-your-own-device (BYOD) schemes within enterprises,
organizations and public sector across the world. There are many reasons related
to this reality. One of the keenest is that, the enterprise mobility remains an
exclusive initiative on the hands of decision-makers.
However, it is
clear and obvious that, more than 80 percent (researchers) of enterprises use
third-party commercial applications and the Bring-your-own-device (BYOD) scheme
is henceforth critical (productivity and performance) if a set of dynamic security-strategies are been implemented.
In our ever
changing environment where unfortunately developers are more and concerned with
the functionalities of applications, not their security, Connectikpeople.co
recommends enterprises that embrace mobility and BYOD
strategies to adopt methodologies, practices and technologies for mobile
application security testing and risk assurance.
Comprehensive, relevant, flexible, scalable and seamless: static application security testing (SAST) and dynamic application security testing (DAST) are recommended if they address the new IT Convergence realities.
Enterprises,
organizations, public sector and individuals should not use mobile application,
services or technologies without paying attention to their security.
They should
download and use only those applications that have successfully passed security
tests conducted by specialized application security testing vendors.