Smartphone based technology enables location-based security policy enforcement

Mobility is changing our lives at all levels – personal, as well as professional. Smartphones and tablets have become indispensable tools, shaping our day to day experiences, whether we are driving, presenting a power point deck at work, or shopping at the nearest retail store. While these devices provide productivity benefits, they also pose new risks to organizations. Some of these risks can be mitigated by the use of traditional anti-virus or mobile device management (MDM) software.cover_banner_security

However, negligible employees, infinite amount of smart device features, and a never-ending battle between anti-virus providers and hostile individuals and organizations often causes continues security breaches, damage or unwanted exposure of allegedly protected organizational data and IP. This results in many restrictions or not being allowed to carry the smartphone with us, while working or visiting at various factories, companies and defense and government buildings all around the world.

To overcome this challenge, the Israeli company WiseSec, introduces new technology which enables the security officer to implement a location-based security policy enforcement system for smart mobile devices.

Vadim Maor, Founder and CEO at WiseSec explains, “As oppose to other technologies in the mobile security market, our technology doesn’t use traditional anti-virus, mobile device management (MDM) software or multiple personas on a single device, but enforces dynamic micro-location-based policy to prevent sensitive, restricted, or classified data leakage. This is done without any need to root the device operating system or change the device ROM, and with minimal battery consumption.” He adds, “Our technology does not rely on the cellular network or on GPS services, operates in both indoor and outdoor environments, and can withstand various mobile fraud and cyber-attacks.”

WiseSec’s CelluSec security policy can restrict or disable one or more device peripherals and functions that are normally perceived as a security threat, including the smart device’s camera, microphone, data network, WiFi connection, Bluetooth connection, GPS, incoming and outgoing calls, incoming or outgoing SMS messages, or any application running on the device.

According to Maor, “This is a client-based technology that users need to install on their device if they would like to carry their smartphone with them inside a restricted area. Once installed, the device client dynamically enforces the required policy, subject to the location in which it resides, and removes the policy when leaving the protected complex. The user cannot close or uninstall the application without the approval from his security officer, and even in the attempt to wipe the device, the security officer receives a notification about the potential security breach.”