Securing Mobile Applications
In This Chapter
Recognizing the importance of sandboxing
Understanding how sandboxing works on various platforms
Protecting your network with virtualization
Thousands of applications are available in the marketplace or app stores for mobile devices, including iPhones, iPads, and Android devices. Whether you’re downloading apps from the market or deploying apps to your company’s employees for their devices, it’s important to know what security exists within these applications to protect them from other applications. Mobile operating systems like Apple iOS and Google Android have built-in security infrastructure protecting applications from each other.
Protecting or shielding one application from another is often called sandboxing. In effect, the application has its own little sandbox to play in and has no access to data or information stored in other applications’ sandboxes.
This chapter examines what sandboxing means for the corporate environment when employees bring their personal phones and tablets (and whatever’s on them) into the workplace. It’s desirable for the enterprise to deploy security in a way that shields the applications on its ...