In January, PC MAG ran analysis of the Best Mobile Device Management Solutions of 2019. It begins with a statement that’s never been truer: Managing mobile devices across clouds and business operations is more critical to enterprise success than ever before.
Selling mobile device management – also known as Enterprise Mobility Management – naturally encourages a vendor to tout their solutions’ ability to protect networks from a wide range of threats. It acts as a monitor of all corporate devices in use, allowing a company to keep track of where their phones are, what they’re being used for, and in case of loss or theft, the remote wiping or locking of a device.
What many fail to address, however, is the ability of counterfeit smartphones to appear as genuine. With workplaces increasingly introducing “bring your own device” policies, it’s a thankless task to inspect every device manually, which leaves the task up to your MDM/EMM solution.
For a business, the impact can be very serious. As malware advances and evolves, it’s harder to spot a threat once it’s inside the network. Once there, malware can lay dormant, silently waiting for a command or a set time period to elapse before downloading further packages. There’s also the risk of the device itself becoming compromised and open to external monitoring, meaning private and sensitive business conversations and details can be leaked outside the organisation.
We looked at some of the most popular solutions and checked if they could identify a fake phone we
submitted for inspection.
They did not.
The image below shows the features PC Mag tested for their analysis.
From the article itself: Key pieces for testing come from this short list:
We registered for a trial with a well-known MDM solution provider. Our fake Samsung Galaxy S10 didn’t raise any flags during the registration process. Besides device encryption not being enabled, it’s green ticks all the way:
What we saw:
It appears most mobile device management solutions assume a device is genuine, and take it from there, monitoring activity and location etc. However, the act of allowing a counterfeit device onto the network in the first place raises plenty of risks and concerns.
As we discussed in our MWC19 product launch , the risks for device owners range from low-level annoyances (poor performance, adware, short life-span) to more serious concerns such as health threats from sub-standard components, exploding/leaking batteries etc.
Prevention is better than the cure - these concerns can be mitigated by authenticating the validity of a device before allowing it to connect to the network.
Learn more about DeviceAssure’s real-time device verification solution here , or download our whitepaper - Countering a Hidden and Growing Threat , which goes into more detail on the threats contained within counterfeits.