Browse Definitions :
Definition

mobile app reputation

Mobile app reputation is an assessment of the security and privacy of an app, typically expressed as a numerical rating. The ratings support the decisions of users on whether or not to download a given mobile app or what permissions should be allowed.

The trend toward smartphone use for mobile computing and the bring-your-own device (BYOD) trend in the workplace have combined to pose a significant threat to the security of end users and corporate networks. According to research by Webroot, an internet security company, 64 percent of almost two million Android apps tested in 2012 were determined to be trustworthy or benign. The number of apps available for testing had increased to nearly 50 million by 2016, and the percentage of those apps determined to be trustworthy had dropped to 21 percent.

Mobile app reputation services access the software available through app stores, analyze and evaluate it and make information available as a threat intelligence feed. Within the enterprise, the feed may be integrated with security software such as mobile device management (MDM) or mobile app management (MAM).

The addition of app reputation data to mobile management software makes it possible for an organization to automate decisions about each app based on specified criteria that may be customized for different users or user groups. The software may make the decision to prevent the installation of malicious or otherwise insecure apps or remove any that are found to be problematic after they’ve been installed. The data feed can also support decisions about what an app is allowed to do, such as sharing data with other programs.

The use of mobile app reputation services to automate security decisions removes the onus from end users to ensure that the apps they download are secure. Users can download apps as desired and rely on the management software to protect their devices and the corporate network from security threats.

Some app reputation service providers allow app developers to request a reassessment of their products if they believe their reputation ranking should be higher or if they have addressed issues that contributed to a low assessment.

This was last updated in May 2017

Continue Reading About mobile app reputation

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against ...

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close