The “bring your own device” (BYOD) culture is booming. Many companies around the globe are supporting it and allowing their employees to bring mobile devices to work, connecting with the company’s networks and applications. Even though this trend is helpful for employees, it brings with it serious risks, particularly security vulnerabilities, to the company.
Catering to the rising demand for security and management of mobile devices, CompliancePoint, an information security consulting and services provider, has rolled out its new Mobile Vulnerability Scanning Service, which offers organizations improved security and management of mobile devices, including for BYOD initiatives.
Aiming to protect companies against security breaches, the new Mobile Vulnerability Scanning Service incorporates vulnerability scanning, configuration scanning, and mobile data discovery capabilities.
The Mobile Vulnerability Scanning Service’s vulnerability scan capability is designed to detect known vulnerabilities in the operating system and installed applications, while the configuration scan feature examines the local settings of devices to detect common configuration issues, such as with password settings, network configuration, running services, anti-malware status and more.
The mobile data discovery feature available with the Mobile Vulnerability Scanning Service allows companies to configure scans for a variety of data, such as unencrypted payment card data and personally identifiable information like social security numbers.
“Mobile and BYOD devices are a key potential weakness in protecting an organization from a security breach,” said Jerry Wyble, vice president and practice manager, Information Security Group, CompliancePoint, in a statement. “With the addition of our Mobile Vulnerability Scanning Services, CompliancePoint offers organizations complete end-to-end coverage for vulnerability scanning and reporting.”
All in all, the CompliancePoint’s Mobile Vulnerability Scanning Service intends to help organizations take precautions to ensure the security of their corporate networks, as well as to protect sensitive data, such as credit card information, personally identifiable information, or protected health information.
Edited by Blaise McNamee