Mobile protection

Mobile security and enterprise mobility

Mobile security solutions for the protection of mobile devices

Mobile security and enterprise mobility

Every second employee uses a smartphone or tablet for mobile working. Only every fifth person gets a mobile device from the employer. As a result, the majority uses private devices as part of the “Bring Your Own Device (BOYD)” model. This is the result of the study "Mobile Readiness for Work" by the consulting firm Deloitte and is a serious mobile security problem. Unsecure mobile end devices offer many attack opportunities for cyber criminals. Learn more about mobile security for enterprise and the benefits of containerization.

Smartphones and tablets as a mobile security weakness

Smartphones and tablets are a popular target for hackers . Anyone who logs into a public or foreign WLAN in a hotel, airport or café opens the door for so-called Man in the Middle attack (MITM). Attackers use security holes in the router or hot spot and can then trace all communication between the user and the router.

But phishing attacks also remain popular. Attackers gain access to sensitive information such as e-mails and passwords via fake websites, email, SMS, messenger services, Facebook, etc. With any mobile data security in place, these attacks are a serious problem.

Last but not least, the installation of insecure apps poses a major security risk. Supposedly free and ad-free apps are gladly used. The app developers can access the complete data of a mobile device. The risk is particularly high with apps that are not from the official app stores from Apple or Google. If employees then use their private mobile phone while still in the business environment, attackers can easily access sensitive company data.

Highest mobile security for enterprise with R&S®Trusted Mobile

Highest mobile security for enterprise with R&S®Trusted Mobile

  • Effective protection for smartphones and tablets
  • Separation into isolated compartments (open and access restricted)
  • Secure access to company resources
  • Specially adapted mobile operating system based on Android

Learn more about our mobile security solution and how the police force is using it

Mobile security with a container solution

The measures presented above offer only a minimum level of security. You get more mobile security for your enterprise with a container solution.

  • It offers a suitable solution to securely combine both the private and professional use of a mobile device.
  • Based on a hardened security core, a container solution divides into two isolated security areas: a private area ("Open") and a corporate area ("Restricted"). Applications and data in these respective security domains are strictly separated.
  • It is based on a security core that prevents an unauthorized outflow of information from the business domain. Both domains are strictly isolated from each other by means of inserted access control mechanisms.
  • The separation between "Open" and "Restricted" also enables secure access to the corporate network.

If you have further questions, please contact us.

10 basics for more mobile security

In the following, we give 10 basic tips on how to achieve more mobile data security:

  • Provide basic protection
    Every smartphone has basic mobile security protection measures in place. In the settings, check that the available security functions are switched on.
  • Keep the operating system and your apps up to date
    Repeatedly, soft spots with regard to mobile security appear on the surface. Those are closed by updates of the manufacturers. If they don’t do it in a timely manner, attackers use the chance to exploit these vulnerabilities. You should therefore keep your device up-to-date and check regularly for new updates. Alternatively, you can also activate the automatic update function in your device.
  • Install apps only from trusted sources
    Install apps only from the official app stores. These are subject to standardized security checks. If you download apps from other portals, these checks are missing. This increases the risk of an insecure application.
  • Check the rights of your installed apps
    Access to location data, address book or telephone status, for example, is not necessary for every app. However, many apps grant themselves comprehensive rights by default. Check whether the required rights are necessary and whether you can withdraw the access rights. If in doubt, uninstall the app immediately. Also check regularly which apps you still use. Unused apps should be uninstalled immediately. Because: Every application poses a mobile security risk.
  • Use the lock function of your device and secure passwords
    You should always activate SIM/USIM PIN and screen lock. Particularly protect sensitive applications, such as online banking and app purchases with a PIN, fingerprint or password. You should always replace default codes with your own combinations. Avoid to unlock your screen with a pattern combination - it is very easy to circumvent and very insecure.
  • Activate interfaces only if necessary
    This tip is one-step closer towards mobile data security. Only activate wireless interfaces such as WiFi, bluetooth or NFC only when you need them. It is possible that close attackers could otherwise intercept your data transmission.
  • Be careful with public hotspots
    In public WiFi networks, data transmission is usually not encrypted. Increased caution with regard to mobile security is required here. Make sure you have a secure connection, which you can recognise by the "https" in the address line. You can also use an app that can set up a virtual private network (VPN) . If possible, never use sensitive applications such as online banking in public networks.
  • Make regular back-ups
    Back up your data regularly to a suitable medium, such as a hard drive, USB stick or cloud.
  • For unknown calls, check the number before calling back
    If you call a number you do not know, do not call it back directly under any circumstances without verification. The Federal Network Agency offers a good overview of the most frequently misused numbers. If such incoming calls happen more often, block the corresponding numbers.
  • Wipe mobile device before you sell or dispose it
    Before selling or getting rid of your device, completely wipe it. Otherwise, other parties can easily restore remaining data. Also remove the SIM card and, if in use, additional storage media such as an external SD card.
Your monthly cybersecurity update

Your monthly cybersecurity update

Request information

Do you have questions or need additional information? Simply fill out this form and we will get right back to you.

I want to receive information from Rohde & Schwarz via

Marketing permission

What does this mean in detail?

I agree that Rohde & Schwarz GmbH & Co. KG and the Rohde & Schwarz entity or subsidiary company mentioned in the imprint of this website, may contact me via the chosen channel (email or postal mail) for marketing and advertising purposes (e.g. information on special offers and discount promotions) related to, but not limited to, products and solutions in the fields of test and measurement, secure communications, monitoring and network testing, broadcast and media, and cybersecurity.

Your rights

This declaration of consent may be withdrawn at any time by sending an email with the subject "Unsubscribe" to Additionally, a link to unsubscribe from future email advertisements is contained in each email sent. Further details on the use of personal data and the withdrawal procedure are set out in the Statement of Privacy.

Your request has been sent successfully. We will contact you shortly.
An error is occurred, please try it again later.