Gartner Report:
Avoid Mobile Application Security Pitfalls

Copyright © 2020 Zimperium All Rights Reserved
Privacy Policy


Download Your
Complimentary Report

Your email and personal information are confidential, and will not be sold or rented. For further information, read our Privacy Policy.

Mobile application security failures are increasingly responsible for fraud and enterprise breaches. Often, the failures result from public-facing app abuse or running on compromised devices since they can run on any mobile device. Security and risk management leaders must protect mobile applications to enable the organization to advance digital transformation and limit cybercrime and fraud. This research highlights the main pitfalls and suggests approaches to avoid security failures when developing and using mobile apps for your digital business.

"Through 2022, mobile application security failures will be the biggest mobile threat for enterprises.."

Gartner, Avoid Mobile Application Security Pitfalls, 27 July 2020, Dionisio Zumerle.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Zimperium.

In this Report:

Avoid Mobile Application Security Pitfalls” outlines challenges Security and Risk Management teams face and recommendations on how to deliver innovative mobile apps while lowering risk and limiting fraudulent transactions.

Challenges for Security and Risk Management teams:

  • Mobile application security failures lead enterprises to sensitive data loss
  • Architectural limitations affect security functionality
  • Mobile threat landscape rapidly evolves

Recommendations to Security and risk management teams:

  • How to plan for performance and security tradeoffs
  • Mobile specific application security practices
  • When to go beyond obvious controls and obfuscation