Learning Library

← Back to Library

Zero Trust for Mobile Security

Key Points

  • The speaker illustrates the severe impact of a lost or stolen mobile device, highlighting that protecting the data—especially on enterprise‑managed phones—is far more critical than the hardware itself.
  • Zero‑trust security, which continuously validates every access request based on context, is now the leading strategy for cloud and network protection but has lagged in adoption for mobile devices despite the large amount of corporate data they hold.
  • Four major mobile‑specific risks are outlined: (1) credential exposure from weak passwords or MFA, (2) device exposure due to insecure cellular/Wi‑Fi connections, (3) application exposure via vulnerable third‑party apps, and (4) insider threats, which affect roughly half of companies each year.
  • Implementing a zero‑trust workflow for mobile access—such as an employee authenticating on a Samsung Galaxy Z Fold5 to retrieve a confidential file while traveling—demonstrates how continuous verification can mitigate those risks and secure enterprise resources.

Full Transcript

# Zero Trust for Mobile Security **Source:** [https://www.youtube.com/watch?v=PjRfqDlPEio](https://www.youtube.com/watch?v=PjRfqDlPEio) **Duration:** 00:06:18 ## Summary - The speaker illustrates the severe impact of a lost or stolen mobile device, highlighting that protecting the data—especially on enterprise‑managed phones—is far more critical than the hardware itself. - Zero‑trust security, which continuously validates every access request based on context, is now the leading strategy for cloud and network protection but has lagged in adoption for mobile devices despite the large amount of corporate data they hold. - Four major mobile‑specific risks are outlined: (1) credential exposure from weak passwords or MFA, (2) device exposure due to insecure cellular/Wi‑Fi connections, (3) application exposure via vulnerable third‑party apps, and (4) insider threats, which affect roughly half of companies each year. - Implementing a zero‑trust workflow for mobile access—such as an employee authenticating on a Samsung Galaxy Z Fold5 to retrieve a confidential file while traveling—demonstrates how continuous verification can mitigate those risks and secure enterprise resources. ## Sections - [00:00:00](https://www.youtube.com/watch?v=PjRfqDlPEio&t=0s) **Untitled Section** - - [00:03:05](https://www.youtube.com/watch?v=PjRfqDlPEio&t=185s) **Dynamic Access Control via UEM/MDM** - The speaker explains how identity and access management uses continuous data from unified endpoint and mobile device management to assess real‑time risk, enforce least‑privilege file access, and trigger immediate re‑authentication when anomalies such as rapid cross‑location requests are detected. - [00:06:09](https://www.youtube.com/watch?v=PjRfqDlPEio&t=369s) **Reminder to Like and Subscribe** - The speaker urges viewers to click the like button and subscribe before leaving the video. ## Full Transcript
0:00Imagine I'm walking to the airport  and someone gets a hold of my device, 0:03in my case, a Samsung Galaxy Z Fold5. 0:07Hey, my phone! 0:08While losing the physical device would be costly. 0:11Losing my personal datawould  be even more detrimental, 0:14and that would only be exponentially worse if 0:16it was a enterprise device  with a ton of company data. 0:20Thankfully, security got my phone back, 0:22which is funny because I'm going to talk  about security for mobile devices today. 0:26The most robust security strategy  in use right now is zero trust. 0:30An approach assumes that every  connection and end point to the threat. 0:34Zero trust ensure that access to  enterprise resources is only granted 0:38after a snapshot of the entire  request, context is analyzed. 0:41Looking at the user device and other  details every time access is requested. 0:47Companies have been quick to apply this  strategy to the cloud and their networks, 0:50but there's been a delay in  extending it to their mobile devices. 0:54Given the a vast amount of enterprise  data that lives on these devices. 0:57It's critical that businesses understand  how to effectively manage them. 1:01Today, I'm going to talk about the  risks that come with mobile devices 1:04if they're not adequately accounted  for in a company security strategy. 1:08Let's dive into four right now. 1:10One credential exposure, 1:13static passwords, passcodes, and weak multi-factor  authentication can leave companies exposed, 1:19as the correct credential does  not always equal correct user. 1:23For example, devices can be stolen or lost, and  passwords and passcode can be easily compromised. 1:29Two device exposure. 1:32Devices, by their nature are  just a more exposed endpoint, 1:36for example, because they rely on  cellular signals instead of Wi-Fi. 1:40It's hard to ensure that the  networks they're using are secure. 1:43Three application exposure, 1:46public facing applications are a common  initial access factor for hackers. 1:50Common reliance on third party  applications in libraries can 1:54leave enterprise applications exposed 1:56even if they're secured  because an authorized updates. 1:59Fourth and final insider threat, 2:02insider threat can show up  in a variety of different 2:04ways from a disgruntled employee turning rogue, 2:07to a perfectly happy employee accidentally  falling for a phishing scheme, 2:10a social engineering attack that  targeted the user through context. 2:14Unfortunately, this is super common, 2:16as a study found that 50% of companies  had at least one insider attack in 2022. 2:22So now that we know these risks exists, what  can you do to secure your mobile environment? 2:27Let's walk through an example of which  ideally happen in a zero trust framework. 2:31When an employee requests access  to an enterprise resource. 2:35Sue is traveling for work 2:36and wants to knock on a few tasks  before she boards her flight, 2:39she grabs her Samsung Galaxy Z  Fold5 to look at the latest updates 2:43on an NDA project she's been assigned to. 2:45To get access to the latest document, 2:47she submitted credentials into  her company's file sharing tool. 2:52Once the correct credentials have been submitted, 2:54they go to the policy decision  and enforcement engine. 2:58This engine completes two different processes 3:00a user context evaluation and  a device context evaluation. 3:05These evaluation information  from from the phone's identity 3:09and access management software, 3:11which is pulling data from the  Unified Endpoint Management Software 3:15and mobile device management  software on the device. 3:18The UEM and MDM 3:19are perpetually tracking and  monitoring data points on the device. 3:23Looking at things like Wi-Fi device  health, location and even typing patterns 3:29to ensure that the phone is following the policies 3:31set by the company and the device is  in the hands of the authorized user. 3:35So that I IAM to easily be able  to get the information that 3:39the policy decision and enforcement engine  needs in order to complete its task. 3:44There should be a very seamless process and the  end user should get a decision almost immediately. 3:49So back to our example with Sue. 3:51If no red flags are raised, she will  be granted access to those files. 3:55However, if a risk was raised, for example, 3:58to requests coming from her account within a  span of 5 minutes in two different locations, 4:03there have been additional authentication check. 4:05Like typing in a passcode  that was sent to her device, 4:08providing she's able to do that, she'll  be able to get access to those files. 4:13It's good practice to give employees  only access to the files they need 4:17and to require re-authentication frequently. 4:19So in this example, Sue would only be given  access to the file for her NDA project, 4:24not all the files that exist  within the file sharing tool. 4:27Additionally, she should have to re-authenticate 4:30her credentials when she  arrived in her second city. 4:33Now that we know what an  ideal situation looks like, 4:36how do you go about implementing a  system like this at your business? 4:40Let's walk through that right now. 4:42One, Start by focusing on  your journey to the cloud. 4:45By modernizing your IAM infrastructure to a  cloud based or hybrid cloud based solution. 4:51You can increase operational  efficiency and technical agility. 4:55The cloud also allows for containerization 4:57that can separate business systems  and information that are unrelated. 5:01In this way, if a container is hacked, 5:03the perpetrator only has access to the  files in that particular container. 5:07Not all the data on the device. 5:09Two, deliver risk based access. 5:12Well, every request needs to be buried the  validation to be a measure of the risk. 5:16This is important to ensure that the user  experience is not negatively impacted. 5:21Three, simplify the deployment  of your security solutions. 5:25Create a unified platform that  has workforce and consumer access, 5:28identity, governance, privacy  and consent management 5:32that allows information to be seamlessly and  easily shared without compromising security. 5:37And finally, consider the security  features on the actual device. 5:41Security suites vary by manufacturer, so take the  time to compare and review the actual offerings. 5:47For example, Samsung Knox supports  a mobile zero trust vision 5:51by providing defense in depth all  the way down to the hardware level 5:55and easily incorporates into a  company's broader security strategy. 6:00Remember, 6:01your security is only as strong  as your weakest endpoint, 6:03which is why you need to take the  time to secure your mobile devices. 6:08Thanks for watching. 6:09Before you leave, please remember  to click like and subscribe.