A guide to incorporating mobile into your IT security systems

it-systems

Mobile security is a relatively new area of enterprise IT and many businesses are looking for a proven formula for securing not just the devices, but also the apps installed on them and the data they access.

What you’ll learn from the report:

  • Challenges of the mobile ecosystem
  • Popular ownership models and provisioning recommendations
  • Redundant technologies
  • Remote access control on mobile
  • VPN
  • App stores
  • Data control
  • Remediation policies

Introduction

The mobile ecosystem has undergone seismic changes over the past 10 years as the majority of corporate mobile fleets have migrated from being almost entirely made up of BlackBerry devices to a world containing multiple types of hardware, operating systems, and ownership models. Gartner’s Market Guide for Mobile Threat Defense Solutions1 notes that in 2017, less than 10 percent of organizations have a form of Mobile Threat Defense (MTD) in place, yet by 2019, one-third of reported malware will come from mobile devices.

Traditionally, mobile devices were managed by a telecom team that had a separate reporting structure and responsibilities to the rest of the IT and security departments. As mobile devices mature from simple call and text devices (and in some cases entirely replace traditional IT devices), organizations need to consider what security controls to migrate from these legacy platforms and what needs to be re-evaluated, replaced or introduced.

This paper is written for corporate mobility and security professionals who help shape, maintain, and support their organization’s mobile device fleet. It assumes a basic understanding of EMM concepts and will not deal with the selection or deployment of such technologies. It provides guidelines for investigating, developing and deploying policies and controls to provide the security of a mobile device’s physical attributes as well as the data of applications and services residing on the device or in a cloud/remote service.

To continue reading the report please fill in the form

Download the full report

Please fill in the form below to download your copy of the whitepaper.