Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Those Free Mobile Apps May Come at a Price: The Latest BYOD Threat: Page 2 of 2

According to Guerra, this isn't just an Android problem. In fact, a big part of the problem is that the distribution model for mobile apps, like the mobile device market itself, is highly fragmented.

"It used to be that companies purchased software from large trusted vendors. In the mobile world, that's gone," he says. "If you look at the top 50 iOS apps, 92% come from different developers."

This wide range of user-selected hardware and software exposes the corporate network to threats like the one outlined by Percoco and Schulte. The problem can be difficult to fix, because in a fragmented marketplace, it's tough to find someone to blame.

"Consumers want free apps, but developers have to monetize somehow. They get a premium for their advertising if they have user data," says Guerra. "Even the developers don't have a tool to analyze what these third parties are doing."

Guerra says he believes that a behavior-based filtering process is the best way for an enterprise to prevent being compromised by mobile apps.

"It's not saying that this app is safe, or this app is unsafe," says Guerra. "It is saying that this app performs these behaviors. We feed the data directly into their MDM or MAM and that way, they can implement enforcement of their policies."

However, as the Bouncer research shows, filtering on only the front end has serious limitations.

"The implications of [the research] are that stores--not just Google Play, but any type of marketplace, even private-enterprise marketplaces--that are doing analysis of applications before they make them available to their end users, if they're just looking at it when they're being submitted, the application may become malicious at a later date," Percoco warns.