Did you know that the United States loses $30 billion worth of cellphones each year?
People are constantly losing their devices, meaning that they are susceptible to losing private information. It’s hard to fathom our iPhones, which contain so much private data, becoming stolen or lost. Consider the possibility that your phone’s security has been breached, leading to the theft of your personal data: It’s a terrible thought, but it’s possible.
Some people lose their phones, but you can be sure that no one can steal or hack yours with Build38’s new security feature. With this new functionality the T.A.K exposes a new endpoint in the backend-to-backend REST API (aka fraud management interface) that enables the app developer to take action on a given user device, either by restoring the application to a “clean” state or by making the application temporarily unusable.
Continue reading to have a better understanding of how Build38 can remote wipe or lock your devices.
What is remote wipe?
Remote wipe is a security feature that enables a system administrator or device owner to send a command that deletes data stored in the end user’s device. It’s generally used to remove sensitive data from a device that’s been stolen or misplaced, ensuring that it doesn’t end up in the wrong hands. It may also be used to delete data from a device that has been passed from one person to another and cannot be physically accessed.
How does remote wipe work?
T.A.K’s remote wipe solution can only operate if the device is switched on and connected to the Internet. The remote wipe command is sent to T.A.K’s backend system through the backend-to-backend interface, which forwards it to the end user’s device. When the command reaches the device, all sensitive data stored in T.A.K’s Secure Storage will be permanently wiped, keeping it away from any unauthorized third party.
You might also be interested in: How to improve application protection
What is a remote lock?
A remote lock allows service providers to remotely lock or unlock a specific app instance. A remote lock/unlock may be useful and even be a regulatory requirement in case the service provider has information that indicates (e.g. from a fraud management system) suspicious activity from a user.
When a remote lock command is executed, the lock command is triggered from a remote system endpoint or control panel, another feature of our in app protection solutions which results in the application becoming temporarily unusable.
In order to lock/ unlock a device or system remotely, administrators may use Remote Lock. Data breach concerns associated with “Bring Your Own Device” (BYOD) regulations or security weaknesses in dispersed enterprises are commonly addressed by remote lock capabilities in security systems.
How does remote lock work?
A remote system endpoint or control panel triggers the lock command
through T.A.K’s REST API. Upon reception of the lock command, it will be forwarded to the end user’s device, where the application will be immediately blocked. When the application is blocked, it remains unusable by the user and all personal data encrypted and inaccessible.
When the service provider is confident that the thread has passed (e.g., because the user has called the service center), the operation can be reversed by means of the unlock command. After the unlock command has been executed, the application gets back to its previous state, with all data accessible again and the application usable by the user.
Benefits of remote wipe and remote lock
Any device owner may benefit from a remote wipe and lock option, but companies find it particularly valuable as organizations of all sizes and in all industries must protect their assets including end user’s information, but also quickly react to the impact of a potential thread.
There are several advantages of remote wipe and remote lock for your organization, including:
- Your private information will be protected if the device is lost or stolen since a remote wipe may destroy all of the device’s data.
- With the appropriate software, you may erase any T.A.K protected application. This means that your data is safe, no matter what kind of device you have.
- You may use a remote wipe command to quickly delete corporate data from an employee’s device if he or she is fired or quits.
- In the event that one of your users is having some suspicious activity online (e.g., connecting from different countries within a short time period), a remote lock allows you to react promptly to the danger with the ease of mind that the operation can be reversed – so if the activity turns out to be legitimate, no harm has been done.
Remote wipe and remote lock: Build38’s new feature
Remote wipe and remote lock are terms used in the industry to refer to the administration of mobile devices such as smartphones, tablets, laptops, and desktop PCs, among other things, particularly in the space of Mobile Device Management (MDM).
Thanks to Build38, these capabilities are as well available now when deploying an MDM client is not possible or practical, e.g. in a B2C scenario for Mobile Banking. This innovative approach gives control to the Service Provider on the data that is stored in the App itself and ownership on the credentials and when they can be used.
Contact us to learn more about this and other protection solutions