Improving Organizational Collaboration While Enhancing Mobile Security Protection

On June 24, IBM and Box announced a strategic partnership designed to accelerate secure sharing, collaboration and analytics on mobile devices.

While both companies have significant expertise in enabling smartphones and tablets with business applications and tools, the partnership enhances existing market solutions such as:

  • Box’s cloud-based secure content management and collaboration platform and applications that offer employees a familiar user interface (UI);
  • Specialized consulting offerings from IBM that facilitate back-end support integration to existing file shares and drives;
  • Global Services and Box Consulting for rapid deployment across iOS, Android and Windows devices;
  • IBM’s Enterprise Content Management (ECM), Case Management, Security, Social Collaboration and Analytics solutions.

The security aspects of the partnership can be leveraged by your organization, and with these new capabilities, you can further improve your mobile security protection.

Five Key Changes to Secure Mobile Collaboration

As detailed in our recent press release, the partnership permits your organization to expand its knowledge of current security risks and vulnerabilities, improve data protection and bolster mobile security protection by offering the following:

IBM’s Security portfolio will be incorporated into the Box Trust program, so clients can benefit from preintegrated solutions without compromising ease of use. In addition, support between IBM MaaS360 Enterprise Mobility Management (EMM) and Box’s content management capabilities will be even stronger and more responsive.

IBM & Box free trial

What Does This Mean to Me?

Mobile security continues to be an area where some organizations confess that they “don’t know what they don’t know.” To better understand how things will work on the ground (or in the air, at home or anywhere else), these scenarios outline our in-market solutions for secure enterprise collaboration.

  • Consolidated View of Content Repositories: IBM MaaS360 currently leverages Box’s APIs to deliver Box documents through an IBM MaaS360 container. This permits end-users to have a single consolidated view of the content repositories they need to access for work on their mobile devices. Your IT administrators can enforce policies to protect privileged data, including user authentication, copy/paste restrictions and open-in to only authorized applications. As a result, your repositories are easier for IT teams to manage, and your end user experience is improved significantly. Practically, this means that your security administrators can restrict users from cutting and pasting draft press release content about your upcoming blockbuster product release or permit them to automatically delete the announcement after it’s been read.
  • Restricting Box to Company-Approved Mobile Devices: Through the Box for EMM application, the use of Box can be restricted to company-approved mobile devices managed and secured by MaaS360. This permits end users to have the exact same experience as in the native Box application but enables IT administrators to provision the Box application and control access to content based on users’ roles or the device’s security posture. From a practical perspective, this means that employees can’t save sensitive information to Box unless the device is being managed by the company’s mobile management system.

How Do I Learn More?

To learn more about this exciting offering, check out our partnership Web page.

More from Application Security

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Audio-jacking: Using generative AI to distort live audio transactions

7 min read - The rise of generative AI, including text-to-image, text-to-speech and large language models (LLMs), has significantly changed our work and personal lives. While these advancements offer many benefits, they have also presented new challenges and risks. Specifically, there has been an increase in threat actors who attempt to exploit large language models to create phishing emails and use generative AI, like fake voices, to scam people. We recently published research showcasing how adversaries could hypnotize LLMs to serve nefarious purposes simply…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today