Smartphone web browser security arrives for corporates

Based on the Rapport consumer desktop browser plugin technology used by more than 8 million online banking users, the Secure Web Access service is billed as allowing businesses to protect their web applications, network and data from attacks that exploit insecure mobile devices.

According to the company, Secure Web Access detects smart phones and tablets infected with – or at risk of infection from – malware and prevents them from connecting to protected web resources.

In addition, the service provides real-time alerts to enterprises on the security status of each device that attempts to connect to resources and applications.

In use, Secure Web Access assesses the security posture of each device requesting access to secure resources before it can connect to applications or the network.

Trusteer's servers then work out whether the service is installed on the device, if any malware is present, and whether it has any unpatched vulnerabilities.

Only if devices pass the security policy test are they then allowed to connect through to the business systems.

Mickey Boodaei, Trusteer's CEO, said that IT departments are under pressure from the executive suite all the way to the departmental level to allow employees to use tablets and mobile devices to connect to secure web resources.

The Secure Web Access service, he explained, is a quick and easy to deploy system for enterprises that want to minimise the threat associated with mobile device connectivity to business applications.

Commenting on the new service, Nigel Stanley, a practice leader for security with Bloor Research, said that many CISOs face a huge challenge when it comes to managing smartphones.

Stanley, who is a smartphone security specialist, added that they also realise that they need to quickly and securely embrace this ever more popular endpoint or they could see their data and systems trashed by malware-ridden devices.

"Secure access services are one way in which users can be encouraged to use their own smartphones while protecting the company network and hopefully make this one less thing a CISO need worry about", he added.

What’s hot on Infosecurity Magazine?