{"id":4307,"date":"2022-01-17T16:03:03","date_gmt":"2022-01-17T15:03:03","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=4307"},"modified":"2022-01-17T16:03:03","modified_gmt":"2022-01-17T15:03:03","slug":"why-mobile-xdr-is-a-critical-piece-of-your-customers-security-puzzle","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2022\/01\/products\/why-mobile-xdr-is-a-critical-piece-of-your-customers-security-puzzle\/","title":{"rendered":"Why Mobile XDR is a Critical Piece of Your Customers&#8217; Security Puzzle"},"content":{"rendered":"<p>Last month we wrote about how XDR can\u00a0<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/12\/14\/how-sophos-xdr-enables-you-to-minimize-time-to-detect-and-respond\/\" target=\"_blank\" rel=\"noopener\">minimize the time to detect and respond<\/a>\u00a0to threats,\u00a0and now we want to dive a little deeper into\u00a0the XDR pool to show you\u00a0how\u00a0to better protect your\u00a0organization\u2019s\u00a0mobile devices.\u00a0Mobile devices pose a growing threat to most organizations, and need no less protection than any other endpoint. And XDR is an excellent fit for the kinds of attacks mobile devices increasingly face.<\/p>\n<p>Once, mobile devices were under-emphasized in a lot of security ecosystems. You might deploy email settings, set passcodes, and manage WiFi configuration to prevent man-in-the-middle attacks. Those all remain valid elements of mobile security.<\/p>\n<p>Now, though, there\u2019s so much more to consider.<\/p>\n<h2>Mobile device usage is changing\u2014so security needs to follow suit<\/h2>\n<p>Most notably, both the nature and amount of mobile use have broadened dramatically. Mobile devices now account for\u00a0<a href=\"https:\/\/www.statista.com\/statistics\/277125\/share-of-website-traffic-coming-from-mobile-devices\/\">almost 55%<\/a>\u00a0of global website traffic, making secure browsing a priority. Phones are mini-computers and users want to be able to use them for work as a matter of course. With more people working remotely, this trend is accelerating.<\/p>\n<p>(When we say \u201cmobile devices\u201d, we tend to mean phones. But we\u2019re also referring to any other device that runs Android or iOS; Tablets, for example. And while Chromebooks are generally quite well locked down, they do need protection from phishing and web-based threats, as well as installing unwanted extensions which might be insecure.)<\/p>\n<p>But while the mobile device is starting to supplant, or at least supplement, the desktop for work and web browsing, users are still likely to treat it as a personal belonging. Whether or not you operate a \u201cbring your own device\u201d (BYOD) policy, a device feels different when you keep it in your pocket at all times.<\/p>\n<p>For example, a user might have a different, less-guarded frame of mind when their phone\u2019s in their hand. Their browsing behavior will likely be different, and the immediacy of messaging alerts\u2014coupled with a smaller screen size\u2014can make them more likely to fall foul of phishing.<\/p>\n<h2>Sophisticated threats need a new, all-round approach<\/h2>\n<p>And here\u2019s the problem: while many cybersecurity ecosystems haven\u2019t kept up with mobile\u2019s growing role in day-to-day work, the\u00a0<a href=\"https:\/\/nakedsecurity.sophos.com\/2020\/11\/10\/smishing-attack-tells-you-mobile-payment-problem-dont-fall-for-it\/\" target=\"_blank\" rel=\"noopener\">hackers certainly have<\/a>.<\/p>\n<p>Threat actors understand that mobile devices are often the weak spot in an organization\u2019s perimeter. As a result, they\u2019re using increasingly sophisticated attacks to target users via their mobile devices. This might take the form of cross-device social engineering; for example, using a text message to make a phishing email seem more legitimate on the desktop.<\/p>\n<p>We\u2019ve also seen attacks exploiting confusion around COVID-19 arrangements; for example, prompting users to download a bogus \u201ccontact tracing\u201d app outside of the Play Store. Once installed, the app accesses sensitive information including received messages\u2014and, in some cases, the phone\u2019s location and camera.<\/p>\n<p>A good\u00a0<a href=\"https:\/\/www.sophos.com\/en-us\/products\/mobile-control\" target=\"_blank\" rel=\"noopener\">Unified Endpoint Management<\/a>\u00a0(UEM) solution can go a long way to help you keep your mobile devices updated and secure. Depending on the operating system, and whether it\u2019s a company-managed or employee-owned device, you can segregate business data, set policies, scan for malicious apps, and intercept threats.<\/p>\n<p>There are also things a standalone management solution can\u2019t do. It can monitor the health of a mobile device, but won\u2019t give you context for your entire organization. It can tell you what the user did next, but not if they switched to working on their desktop. And it can tell you the situation now, but not what happened two weeks ago.<\/p>\n<p>For that, you need to aggregate and store data from your mobile devices alongside your other cybersecurity controls. And that\u2019s exactly where XDR comes in.<\/p>\n<h2>Enhanced visibility, context, and history<\/h2>\n<p>XDR gives you the complete picture. Sensors on the device send telemetry data to a secure data lake in the cloud, where it\u2019s aggregated alongside your other mobile devices, as well as any other XDR-enabled cybersecurity solutions you might have.<\/p>\n<p>This allows you to surface suspicious activity and investigate it across your entire estate. The data lake allows you to understand the full context as it contains the events from mobile devices, traditional endpoints, servers, firewalls, email and cloud security solutions. It provides you with the whole picture, and the ability to go back in time to see the history of the suspicious activity.<\/p>\n<p>These capabilities fit well with the challenges of keeping mobile devices secure:<\/p>\n<ul>\n<li><strong>Better visibility over device vulnerabilities and health.<\/strong>\u00a0For mobile, cybersecurity and device management are inextricably linked\u2014so it\u2019s valuable that you can investigate the data lake however you want. For example, Sophos Mobile XDR can show you all the devices running out-of-date operating systems, have been jailbroken\/rooted, or lack enough RAM to update. Or you could look for sideloaded apps, like the COVID tracing example.<\/li>\n<li><strong>More context to understand potential threats.<\/strong>\u00a0Because the data lake includes signals from other parts of your security ecosystem, you can easily pivot to see what else was going on for the user at the time\u2014for example, their desktop activity or firewall traffic. This means you can guard against multi-stage phishing and social engineering attacks, and spot behavior of concern.<\/li>\n<li><strong>Historical telemetry data to explore.<\/strong>\u00a0Imagine a new threat is discovered, where compromised devices communicate with a certain domain. Or an app that was thought to be legitimate is found to be malicious, removed from the Play Store, and deleted from devices by its authors. Based on live information, you\u2019d have no way to screen for past activity. With the historical data in the data lake, you can see whether any devices in your estate have communicated with a domain, or had the app installed.<\/li>\n<\/ul>\n<p>The exact nature of the information stored in your XDR data lake can vary based on the device\u2019s operating system, and whether it\u2019s a company-owned or personal BYOD device. And, since privacy is an critical consideration for any data collection, we focus strictly on only collecting the data that\u2019s relevant to cybersecurity.<\/p>\n<h2>Better protect your mobile devices with Sophos Mobile XDR<\/h2>\n<p>It\u2019s clear that mobile devices can no longer be treated as an outlier; they\u2019re a central part of your users\u2019 working life and need to be part of your customers&#8217; joined-up cybersecurity approach.<\/p>\n<p>At Sophos, we know this way of working is here to stay. Our vision for the future is to secure your devices irrespective of where they are or how they\u2019re accessing your corporate resources. Bringing mobile into the XDR family is an important step along that path.<\/p>\n<p><a href=\"https:\/\/www.sophos.com\/en-us\/products\/mobile-control\">Visit our website<\/a>\u00a0to learn more about Sophos Mobile and initiate a 30-day no-obligation trial. Existing Sophos Central users can activate Sophos Mobile for free for a month directly within their management console; simply click on the Free Trials button and follow the links.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With mobile devices now accounting for the majority of website traffic, and new sophisticated attacks emerging, now is the time to integrate mobile XDR (extended detection and response) into your and your customers&#8217; cybersecurity strategy.<\/p>\n","protected":false},"author":67,"featured_media":3412,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[33,147],"coauthors":[111],"class_list":["post-4307","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-sophos-mobile","tag-sophos-xdr"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/07\/featured-image-sophos-xdr-app-icon-1600x960px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/4307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/67"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=4307"}],"version-history":[{"count":2,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/4307\/revisions"}],"predecessor-version":[{"id":4309,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/4307\/revisions\/4309"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media\/3412"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=4307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=4307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=4307"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=4307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}