Answer:
By using a cloud based reputation services capable of providing patented attributes for use by commercial mobile security products.
Step-by-step explanation:
By using such reputation services, the reputation services is shielded from being open to users and must have access restriction thereby ensuring that users do not experience poor service. Also, it is important to base security decisions on the objectives to be fulfilled by the security. It is also necessary for these protection to come with network and host hardening alongside the necessary management security capabilities to ensure smooth user experience.