Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical Security

Network vs. mobile device management in the age of remote work

By Peter Bookman
Mobile device security at work
November 16, 2021

Mobile device management (MDM) offers many advantages for protecting devices connected to company networks but also presents drawbacks, including the potential to be undermined by hackers when the managed device joins an unknown network. 

A device, a VPN and a network walk into a bar

Many good jokes start with this line, and it is perfect to illustrate the problem with traditional mobile device management operating in the real world. Device management is orderly. VPNs are orderly. Protected company networks are orderly. In a perfect world, these partners would communicate and share information in a carefree and secure environment, without fear of having their privacy breached. 

Unfortunately, the real world is messy. Devices connect to protected company networks and assets on unknown and unprotected networks, like the bar Wi-Fi in a hotel. Now this orderly world is vulnerable as the device and VPN communicate over a network territory that is not secure. In many cases, devices are set to automatically connect with an available free Wi-Fi network as a convenience, but it is not without consequence.

The managed device and VPN were fine in their known and protected domain, but once they stepped into the bar and joined the unknown network, they became vulnerable to anyone else in that bar on that network. This is the digital equivalent of leaving your drink unattended, and the hangover you may get from a breach could cost you far more than a night on the town.

The problem runs deep

The network comes into the operating system at a very low level — so low, in fact, that in many ways the operating system is unaware of what it is being exposed to. Operating systems that run our smartphones, laptops and an endless array of cameras, digital doorbells, refrigerators, game systems and Internet of Things (IoT) devices have one thing in common; they all ride on top of the network to which they connect. When this network is unknown and untrusted, the threats are unknown to the operating systems that run these devices. This is the area beyond what MDM solutions can see. It’s the place we call edge territory.


Windows 32 Architecture Example – Source: guardDog.ai

Another problem is that these edge territory networks are possibly hosting many other IoT devices. The majority of these IoT devices are not running Windows or another known operating system. Instead, they are often operating on an embedded and even entirely custom version of Linux. This complicates MDM’s effectiveness because it cannot run agents on these devices. 

When we assess this messy situation from a high level, we see an operating system that has no idea what is going on in the network to which it is connected. The device can’t protect itself against all unknown threats. Worse still, a network has no ability to assess its own vulnerabilities. Mobile device management alone cannot meet the needs of a disorderly world.

Unknown networks and asymmetric threats from unseen and seemingly harmless IoT devices can dramatically undermine mobile device management and the information it needs to protect, and these costly intrusions can go undetected for far too long.

The solution is equal to less than zero

There are a couple of interesting challenges MDM faces in truly securing the enterprise. The first is the impossible challenge of deploying management agents on every device. The second important consideration is this: even if you could have agents on every device, can the device be protected before an attack? At best, organizations hope for a zero-day response, or maybe zero plus one. MDM solutions cannot succeed in this circumstance. The answer is turning to threat detection and prevention. 

This kind of response requires a network-aware approach that uses an independent overlay working with artificial intelligence (AI) from the cloud to provide managed detection that can autonomously respond to incidents before they affect managed devices and assets. Most managed detection and response providers rely heavily on human resources — and a lot of them. They employ many specialists and invest millions of dollars in 24/7 security operation centers. But this is a realistic choice for most companies, and, if so, could they source the right talent?

What this issue translates to is that companies cannot secure their operations relying on the approaches of the past. They, instead, need to rethink their approach to cybersecurity. The volume of novel exploits is accelerating. The number of devices accessing networks is growing exponentially too, bringing with them an ever-growing number of vulnerabilities for cybercriminals to exploit. What we really need are approaches that can keep up with this changing landscape; that are AI-powered and trained to detect and respond to threats autonomously; and that can leverage a network-aware position to see vulnerabilities and close them before they become problematic.

Not if, but when

To truly protect the enterprise network in today’s distributed environment where an employee could be at the office, at home or on the road, there are many strategies, technologies and tools for defending confidential information from aspiring thieves. There isn’t one solution, such as mobile device management, that can handle every circumstance that emerges from this evolving environment. Furthermore, this isn’t a case of if an attack will happen, but when.

The best strategy is a holistic approach that strengthens cybersecurity in orderly and disorderly environments against threats both known and unknown. The goal is to reduce any attack surface, to seal vulnerabilities as they are discovered to prevent future exploits and to shut down threats in real-time, where possible, to avoid losses, damages to reputation and even regulatory fines for compliance failures.

KEYWORDS: artificial intelligence (AI) cyber attack Internet of Things (IoT) mobile device management mobile security network surveillance risk and resilience

Share This Story

Peter bookman headshot  image (1)

Peter Bookman is Founder and CEO of guardDog.ai. Bookman has 25 years’ experience leading teams and disrupting markets with numerous exits. He is credited as an inventor to 14 patents in both software and hardware intellectual property.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing