Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical Security

Network vs. mobile device management in the age of remote work

By Peter Bookman
Mobile device security at work
November 16, 2021

Mobile device management (MDM) offers many advantages for protecting devices connected to company networks but also presents drawbacks, including the potential to be undermined by hackers when the managed device joins an unknown network. 

A device, a VPN and a network walk into a bar

Many good jokes start with this line, and it is perfect to illustrate the problem with traditional mobile device management operating in the real world. Device management is orderly. VPNs are orderly. Protected company networks are orderly. In a perfect world, these partners would communicate and share information in a carefree and secure environment, without fear of having their privacy breached. 

Unfortunately, the real world is messy. Devices connect to protected company networks and assets on unknown and unprotected networks, like the bar Wi-Fi in a hotel. Now this orderly world is vulnerable as the device and VPN communicate over a network territory that is not secure. In many cases, devices are set to automatically connect with an available free Wi-Fi network as a convenience, but it is not without consequence.

The managed device and VPN were fine in their known and protected domain, but once they stepped into the bar and joined the unknown network, they became vulnerable to anyone else in that bar on that network. This is the digital equivalent of leaving your drink unattended, and the hangover you may get from a breach could cost you far more than a night on the town.

The problem runs deep

The network comes into the operating system at a very low level — so low, in fact, that in many ways the operating system is unaware of what it is being exposed to. Operating systems that run our smartphones, laptops and an endless array of cameras, digital doorbells, refrigerators, game systems and Internet of Things (IoT) devices have one thing in common; they all ride on top of the network to which they connect. When this network is unknown and untrusted, the threats are unknown to the operating systems that run these devices. This is the area beyond what MDM solutions can see. It’s the place we call edge territory.


Windows 32 Architecture Example – Source: guardDog.ai

Another problem is that these edge territory networks are possibly hosting many other IoT devices. The majority of these IoT devices are not running Windows or another known operating system. Instead, they are often operating on an embedded and even entirely custom version of Linux. This complicates MDM’s effectiveness because it cannot run agents on these devices. 

When we assess this messy situation from a high level, we see an operating system that has no idea what is going on in the network to which it is connected. The device can’t protect itself against all unknown threats. Worse still, a network has no ability to assess its own vulnerabilities. Mobile device management alone cannot meet the needs of a disorderly world.

Unknown networks and asymmetric threats from unseen and seemingly harmless IoT devices can dramatically undermine mobile device management and the information it needs to protect, and these costly intrusions can go undetected for far too long.

The solution is equal to less than zero

There are a couple of interesting challenges MDM faces in truly securing the enterprise. The first is the impossible challenge of deploying management agents on every device. The second important consideration is this: even if you could have agents on every device, can the device be protected before an attack? At best, organizations hope for a zero-day response, or maybe zero plus one. MDM solutions cannot succeed in this circumstance. The answer is turning to threat detection and prevention. 

This kind of response requires a network-aware approach that uses an independent overlay working with artificial intelligence (AI) from the cloud to provide managed detection that can autonomously respond to incidents before they affect managed devices and assets. Most managed detection and response providers rely heavily on human resources — and a lot of them. They employ many specialists and invest millions of dollars in 24/7 security operation centers. But this is a realistic choice for most companies, and, if so, could they source the right talent?

What this issue translates to is that companies cannot secure their operations relying on the approaches of the past. They, instead, need to rethink their approach to cybersecurity. The volume of novel exploits is accelerating. The number of devices accessing networks is growing exponentially too, bringing with them an ever-growing number of vulnerabilities for cybercriminals to exploit. What we really need are approaches that can keep up with this changing landscape; that are AI-powered and trained to detect and respond to threats autonomously; and that can leverage a network-aware position to see vulnerabilities and close them before they become problematic.

Not if, but when

To truly protect the enterprise network in today’s distributed environment where an employee could be at the office, at home or on the road, there are many strategies, technologies and tools for defending confidential information from aspiring thieves. There isn’t one solution, such as mobile device management, that can handle every circumstance that emerges from this evolving environment. Furthermore, this isn’t a case of if an attack will happen, but when.

The best strategy is a holistic approach that strengthens cybersecurity in orderly and disorderly environments against threats both known and unknown. The goal is to reduce any attack surface, to seal vulnerabilities as they are discovered to prevent future exploits and to shut down threats in real-time, where possible, to avoid losses, damages to reputation and even regulatory fines for compliance failures.

KEYWORDS: artificial intelligence (AI) cyber attack Internet of Things (IoT) mobile device management mobile security network surveillance risk and resilience

Share This Story

Peter bookman headshot  image (1)

Peter Bookman is Founder and CEO of guardDog.ai. Bookman has 25 years’ experience leading teams and disrupting markets with numerous exits. He is credited as an inventor to 14 patents in both software and hardware intellectual property.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!