This week, the mobile enterprise focuses on fraud detection tools for smartphones, Google Apps security and how to print securely and easily while on the go.

More Transactions, More Fraud

According to Gartner, by 2014, about 12% of all e-commerce transactions will be made using smartphones and other mobile devices. But the convenience of smartphone technology also brings an increased risk of fraud and no good way to prevent it. Sure, there are plenty of fraud detection tools online, but they don’t work so well in the mobile sphere.

Also according to Gartner, fraud detection tools for mobile are in development, and may not be fully matured until 2012. Until then however, CIOs are strongly encouraged to figure out what is best protect their information in the meantime. Having some system in place is better than none, especially at a time when the mobile market is competitive. Having sensitive information compromised can affect a company and its customers in way that can hurt more than just their security.

Yet, if you’re curious as to how you can protect your mobile devices now, here are just a few methods currently available:

  • Mobile Device Identification: a JavaScript on a server that a mobile user logs into captures information about a user's browser and phone. Depending upon whether the application is browser based or native, the script will capture unique browser identification information and data to uniquely identify the phone to it will gather the phone's serial number and network card number and forward to the e-commerce entity.
  • Location Information: using a phone's location information requires that the device only be turned on. An enterprise can benefit from using location information to authenticate the user through correlation with other systems such as a user's address in a directory. However, in order to forward location information based on GPS data, a user must opt-in, though there may be some networks that use software that don’t require user opt-in.
  • Research: some vendors have begun looking at specific mobile devices, its location and the behavior patterns of the user inside a mobile application on a phone to better understand the security risks involved.

The Two-Step Verification

Another option is to employ what the Google has just introduced as “a more secure sign-in capability for Google Apps accounts” designed to increase security on the cloud. Its two-step verification makes it easier for organizations of all sizes to use this technology with minimal set up for free.

According to the Google Enterprise Blog:

Two-step verification... requires two means of identification to sign in to a Google Apps account, something you know: a password, and something you have: a mobile phone. … After entering your password, a verification code is sent to your mobile phone via SMS, voice calls, or generated on an application you can install on your Android, BlackBerry or iPhone device.

Currently only administrators for Google Apps Premier, Education, and Government Editions can activate the two-step verification from the English version of the admin control panel. Standard Edition customers will be able to access it in the months ahead.

Printers: When You Need One, They're Never Around...

While we’d like to believe we live in a world where paper has been replaced by mobile devices, the truth is that sometimes you need to print something. And when you’re a mobile worker roaming from hot spot to hot spot, a printer is not always readily available.

Thanks to Xerox, finding ways to print has gotten easier. The Xerox Mobile Print Solution lets mobile professionals securely print e-mails, presentations and other business documents from any smart phone or e-mail-enabled device. By using Enhanced Mobile Express and Global Print Drivers workers can automatically know what printers are available to their laptop while offering simplified print management by IT staff.

If you’re working from your smartphone, Xerox has you covered, as well. Their mobile solution also allows users to print from e-mail-enabled devices without having to download drivers or applications. By e-mailing the file in its original format, such as Microsoft Word or Adobe PDF, to a secure server, a confirmation code is sent to the user to securely release the document for printing from any Xerox Extensible Interface Platform(R)-enabled multifunction printer (MFP).