Chapter 13

Securing Mobile Applications

In This Chapter

arrow Recognizing the importance of sandboxing

arrow Understanding how sandboxing works on various platforms

arrow Protecting your network with virtualization

Thousands of applications are available in the marketplace or app stores for mobile devices, including iPhones, iPads, and Android devices. Whether you’re downloading apps from the market or deploying apps to your company’s employees for their devices, it’s important to know what security exists within these applications to protect them from other applications. Mobile operating systems like Apple iOS and Google Android have built-in security infrastructure protecting applications from each other.

Protecting or shielding one application from another is often called sandboxing. In effect, the application has its own little sandbox to play in and has no access to data or information stored in other applications’ sandboxes.

This chapter examines what sandboxing means for the corporate environment when employees bring their personal phones and tablets (and whatever’s on them) into the workplace. It’s desirable for the enterprise to deploy security in a way that shields the applications on its ...

Get Mobile Device Security For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.