• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Android • Application • News • Security  /  Pokemon Go Makes Implementation of MDM Strategy a Necessity in Organizations
01 August 2016

Pokemon Go Makes Implementation of MDM Strategy a Necessity in Organizations

Written by Suhita Mazumdar
Suhita Mazumdar
Android, Application, News, Security
Estimated reading time: 3 minutes

Whether your organization is into manufacturing steel or designing apps for smartphones, employee work flexibility is becoming more of a requirement than a privilege for every organization. Start-ups and SMBs are seeing real gains by encouraging Bring-Your-Own-Device (BYOD) at workplace. Infact, Gartner predicts that by 2017, half of employers will require employees to supply their own device for work purposes. The BYOD policy is an economically viable and offers great impetus to mobile workforce opportunities, increasing job satisfaction and more.

Recently, the world’s most popular gaming app Pokemon Go is giving nightmares to organization encouraging BYOD policies. A dangerously addictive app, Pokemon Go can put your entire organizational information security at risk and can even kill BYOD policies of your organization.

Pokemon Go- The Game

Pokemon Go can be easily downloaded to an Android or iOS device. The game has witnessed 50,000,000 – 100,000,000 downloads on Google Play Store within a month of its launch. Once downloaded, the game has access to a user’s GPS location and clock to detect when and where the user is in the game. To add some personalized interactivity, Pokemon Go also has access to the device’s camera to make game characters appear in the player’s on-screen surroundings. It is all about catching those characters in the game.

Pokemon Go and the Indian Enterprise Scenario

Pokemon Go has not been released in India. So, if you witness your colleagues going crazy with the game then there is a danger lurking in your organization. Pokemon players in India have turned to third-party apps without even comprehending the cyber security risks it can hold with regards to personal and professional information security.

A popular app like Pokemon Go takes just few days for cybercriminals to exploit and launch dangerous malware attacks like DroidJack giving them full control over a victim’s phone. And, if the phone contains confidential corporate data, then it is a big cause to worry.

Irrespective of its economic feasibility, BYOD policy in itself presents a challenge to ensure that company data remains in the appropriate hands. And, if employees download third-party apps like Pokemon Go, then it’s time for organizations to think of a well-defined mobile security strategy.

Mobile Device Management (MDM)

Mobile devices and applications are becoming an integral part of any organization’s workflow. Policies like BYOD permits SMBs and now large enterprises to go mobile without a huge device and service investments. Nonetheless, a well-structured BYOD policy requires a well-defined security strategy especially when apps like Pokemon Go poses significant data security risks, malware threats and more.

Seqrite Mobile Device Management (MDM) allows enterprises to implement a wide range of device controls without ever having to physically handle a user’s device. Functioning completely over-the-air, MDM enables enterprises to manage and regulate comprehensive device policies and configuration settings.

The solution comes with proactive security management and helps enterprises to enforce policies around downloads of third-party apps like Pokemon Go and monitor data usage. Using the Application Control feature IT administrators can manage the app repository and install/uninstall apps and set restrictions on apps that are installed on devices. These settings can be managed on devices remotely from the server portal, thus enabling ease of use and access.

Further, the Seqrite Launcher feature allows admins to customize how mobile devices function within the enterprise. Apps on the device and in-built features can be enabled or disabled as per company policies. Seqrite Launcher functions as a standalone app and ensures that mobile devices are locked down into kiosk mode for maximum productivity.

No device can be 100% protected within or outside the enterprise. MDM is one of the best approaches to ensure that enterprise devices are protected against malicious apps and malware threats attempting to steal confidential and sensitive corporate data.

 

Source:

www.itportal.com

www.techrepublic.com

www.foxbusiness.com

www.entechus.com

www.gartner.com

 

 Previous PostSolution to system startup issue faced by Seqrite users
Next Post  Seqrite Endpoint Security v.7.0 Released
Suhita Mazumdar
About Suhita Mazumdar

A mind that always searches for some purpose to enlighten others through the power of words defines Suhita Mazumdar. Suhita loves to read and write on IT Security,...

Articles by Suhita Mazumdar »

Related Posts

  • Discover ‘GNU Make’, an amazing tool for building application code.

    The Evergreen ‘Make’ Utility: A cost-effective way of deployments on Cloud.

    October 1, 2020
  • Is your Router exposed to cyber threats

    Is your router exposed to cyber threats? Here is how to safeguard it.

    July 30, 2020
  • Snake ransomware stings to spread its venom in the veins of enterprise networks.

    Snake Ransomware brings impending doom to enterprise networks

    July 10, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021
  • How can EdTech companies deal with rising security challenges?

    How can EdTech companies deal with rising security challenges?

    December 24, 2020

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (274) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (54) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.