


IT simply selects the security features they want to add to the app, clicks a button to start the process, and the app wrapping software takes care of the rest. The app wrapping approach enables enterprise IT to apply security policies to the binary image of virtually any finished application in an automated and replicable way to create a “self-defending app.”Īpp wrapping injects pre-developed security features into an existing application after the development process is done. And remember, IT needs to achieve this regardless of the app’s source, without modifying the user experience or installing a management client or agent on the device. What IT specifically needs is a way to quickly and easily apply fine-grained security and policy controls around mobile apps, and in parallel, tailor apps to meet specific security policy requirements. If all of these requirements are not met, the mobile security approach won’t be adopted and won’t scale across the enterprise. Mobile security also must preserve or enhance the user experience.
BLACKBERRY ENTERPRISE MOBILITY APP WRAPPER CODE
Adding context-specific data protection can best be accomplished after an application is built.Īdditionally, mobile security must be quick and easy to deploy, without requiring custom code development or burdening IT with provisioning setups.

This is why a one-size-fits-all approach to app security doesn’t work. Enterprise data is specific to each organization, and the policies and requirements for protecting that data must be tailored to each organization’s needs. At times, developers face daunting business and technical challenges. By securing the app, enterprise IT can be assured that its information is protected, regardless of the device on which the app resides.īut building data protection into an app can be difficult, risky and sometimes ineffective. In the data-centric extended enterprise, the app must become the primary vehicle for sensitive data distribution on mobile devices. So today, enterprise IT must assume that sensitive data will end up in an app on a malware-infected, jail-broken, unmanaged mobile consumer device. The security challenges of a mobile environment are broader and more intricate than any MDM can solve. Until now, IT has been able to maintain control of mobile resources using device-level mobile device management (MDM) solutions. Security’s Evolution: Roadblock to Enabler And, accustomed to the broader array of apps instantly available for personal use, users want to choose the apps that best solve their problems, make them more productive, save money or create new opportunities. In the extended enterprise, users want the freedom to choose their own devices. In the extended enterprise, sensitive and proprietary information increasingly resides on any number of mobile platforms in third-party hands that cannot truly be managed because the enterprise doesn’t own those devices. While BYOD and COPE address a self-contained, manageable group of employees who use their own devices for corporate access, the larger trend is the emergence of a phenomenon we call the “extended enterprise”-the expanding constellation of customers, contractors, partners, consultants and others that surround an organization who need access to the company’s data for legitimate business purposes. BYOD and COPE (corporate owned, personally enabled) are simply leading indicators of a much larger transformation underway in enterprise mobility.
