ABSTRACT

We might almost take the discussion for endpoint security software assessed in Chapter 9 and apply it more or less completely to mobile software. Many of the security problems are analogous. The software has to provide protections, whether it’s connected to a network or not. On the other hand, configuration and management are delivered over the network when the device is connected. In order to examine yet another architectural pattern, this example mobile security product will make use of cloud-based management software and a Software as a Service (SaaS) “reputation” service. Just for clarity, for many real-world mobility protection product implementations, the customers may deploy their own management servers, which is exactly analogous to the problems we examined for the management console of the endpoint security system. In this example, we will not take up issues related to management from a cloud-based service.