Leading players in the oil and gas industry are busy adopting a variety of technologies that improve collaboration, productivity, employee safety and mobile security.

By embracing mobility, they achieve better integration of functions across the business, creating a more responsive organization and the ability to operate, monitor and manage remote sites with lowered risk.

Wishing to remain anonymous, this multinational oil and gas company is headquartered in the US and has a large population of field workers that frequently travel to remote locations and high-risk environments around the world.

This company manages 8,000 corporate owned mobile devices, which are a mixture of Android and iOS smartphones and tablets.
The mobile devices are used by field staff to streamline business operations, to keep them connected with HQ and to act as a safety line.
The mobile device provides critical business functionality, including the transfer of time-sensitive and confidential information to field workers and communications during time of emergency situations.

When the company first deployed mobility, they adopted an EMM to manage the devices. However, they quickly realized that this only protected the hardware, but didn’t defend their most sensitive asset – corporate data.

Mobile security challenge 1: Phishing

The company was experiencing a repeat problem with stolen credentials. Multiple staff members had their Active Directory credentials stolen so the CISO mandated that a comprehensive anti-phishing layer be implemented.

Conscious of the need for a phishing protection that extended to their recently adopted mobile platforms, the team also wanted to add protection against mobile malware.

Mobile security challenge 2: Unsolicited file sharing

Finally, in order to take a more proactive approach to mobile threat prevention, the company wanted to have a content filtering solution on mobile that would allow them to stop access to malware-hosting app stores and unapproved IT resources, such as cloud storage providers, which they were instructed to manage as part of the company’s data loss protection strategy.

The security hole that mobile had created became a real concern. We had a certain level of security provided by the EMM and built in with the OS, but you don’t have to look far to realize that this isn’t enough these days. We couldn’t stop our staff from accessing services via web browsers that carry malware or leak data. We lacked the visibility needed to achieve a superior level of security: visibility of the data itself.James Hoggart, IT Systems Manager

Mobile security challenge 3: Outdated OS

The company also needed real-time mobile data insights and analytics to check that every device is running the latest OS, isn’t communicating with any risky apps and websites and hasn’t been reconfigured by users trying to get around device permissions and inbuilt OS security.

Defense against the full spectrum of mobile threats

The IT team compared a number of solutions from leading Mobile Threat Defense (MTD) providers and chose Wandera because of its strong capabilities in all four areas of detection in Gartner’s Market Guide for MTD.

Most of the security providers we looked at were limited in what they offer, only focusing on one area of mobile security like apps, or end point. Wandera is the only provider on the market that uses a cloud proxy to scan data in transit and has the added layer of on-device protection, so it leaves no stone unturned.James Hoggart, IT Systems Manager

The IT team was also excited to hear Wandera offers content filtering for not only the apps but also the browser, making it easy to restrict entire categories that were known to carry risk.

Hoggart was pleased that Wandera would allow him to assess the company’s mobile risk exposure by identifying vulnerabilities on each mobile device, including those that could be dynamically triggered, like Semi-Jailbreak.

Wandera was able to produce a report to identify devices running out-of-date operating systems with a single mouse click – no digging through the EMM to produce complicated reports.

Wandera was deployed across the full device fleet within minutes using the company’s EMM. Thanks to the over-the-air integration between the solutions, it meant 100% deployment was achieved with no input at all required from employees. The service was then able to analyze mobile data traffic in real-time, which was immediately made available to the security team.

Our security team love Wandera because they have a service that is managed by our mobility team but it has been built with security teams in mind. It maps to what they already know, so they essentially treat it as an extension of their desktop security program.James Hoggart, IT Systems Manager