• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Mobile security basics for SMBs

Mobile security basics for SMBs



Checklist for a Comprehensive Mobile Security Strategy ...

Checklist for a Comprehensive Mobile Security Strategy

✓ Access management
✓ Device management
✓ Application management
✓ Secure email data-loss
✓ Network management
✓ Data security



Total Views
Views on SlideShare
Embed Views



1 Embed 33

http://en.community.dell.com 33



Upload Details

Uploaded via as Adobe PDF

Usage Rights

CC Attribution-NonCommercial LicenseCC Attribution-NonCommercial License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Mobile security basics for SMBs Mobile security basics for SMBs Document Transcript

    • OCTOBER 2012 Sponsored by Dell and Intel® A UBM TECHWEBMobile Security Basics for SMBs Locking data down without locking users out T he days when employees were tethered to their desktop computers are over. Consider: In Q4, 2011, smartphone shipments exceeded PC shipments for the first time. In fact, more than two thirds of people buying mobile phones are choosing smartphones, according to Nielsen research from June 2012. People have come to rely on the instant access to information that these smart devices provide in their daily lives. On-demand access to weather or traffic reports, online schedules, and the friends and family in their social networks let people take more informed actions in their personal lives. Not surprisingly, people want this same kind of on-demand access to information at work. This phenomenon is extending beyond the road warriors traveling from client to client to traditionally nonmobile workers — in other words, those who do mostChecklist for a Comprehensive of their work in the office. Mobile devices make it possible for all workers toMobile Security Strategy be better informed during more hours of the day. Research conducted by iPass found that workers with mobile devices typically work before and during their commute every day, in addition to working at night.✓ Access management In fact, iPass estimates that smartphone users work 240 more hours per year compared to the workforce in general. That’s the equivalent of expanding✓ Device management your workforce by 10 percent. Mobile devices are a clear boon to productivity. But this revolution in the✓ Application management way people work isn’t without its challenges. Most likely, your employees are using personal devices to access your business’s network, applications and data. That’s true even if your company provides BlackBerrys or other corporate-✓ Secure email data-loss approved mobile devices. As a result, most of these devices operate outside of IT control, a real- protection ity that brings with it many security risks. Yet, instead of fruitlessly fighting employees’ desire to use devices of their choosing, small and midsize busi-✓ Network management nesses (SMBs) stand to save time, money and hassles by implementing a mobile strategy that enables a diversity of devices (smartphones, tablets, laptops and✓ Data security so on), including those that are not company issued. The right mobility strategy will enable SMBs to capitalize on the oppor- tunities that the bring-your-own-device trend presents while maintaining Technology Primer Sponsors
    • MOBILE SECURITY BASICS FOR SMBs A UBM TECHWEB TECH PRIMER // OCTOBER 2012 the security they demand across their networks, applications and data. A mobile security strategy that protects business resources should include the following components: 1. Access management: First, organizations must develop an access policy that spells out who is allowed what kind of access (see the sidebar “Getting Started”). Controlling access to applications and storage sites by job function is critical. Mobile device management and security solutions contain an administra- tive portal that allows IT to implement policies according to defined user profiles. These profiles can be defined for individuals, such as C-level executives, or groups, such as a sales force. 2. Device management: Once access management is established, IT must manage the risk inherent to the device itself. That means establishing IT control over passwords, VPN settings, phone feature configuration and security features. 3. Application management: Applications are the engine of productivity. IT must have the ability to control how applications are installed and the ability to block, lock or kill those applications as needed. 4. Secure email data-loss protection: Implementing a corporate container on personal devices that are used for work keeps business data separate from other applications. Because IT retains the ability to wipe the container, this approach also prevents employees from having access to company data once they’ve left the company. This control prevents cut-and-paste of valuable business data into social media or consumer applications, which keeps your critical information from leaving when your employees do. 5. Network management: Visibility into all devices accessing the network allows for more efficient planning for bandwidth demands and security concerns. A few years back, when only a segment of employees accessed corporate infrastructure via a BlackBerry, the ✓  GETTING S TA R T E D impact was relatively small. Today, with most employees access- ing information on smartphones and tablets, the security and bandwidth issues take center stage. Before you can implement a mobile security solution, you first 6. Data security: Once IT has secured the network, the devices need to understand how mobile devices are accessing your and the applications, the last critical element is control over the network today. Many IT managers are shocked by the number data. This includes making sure that data is encrypted both in of personal devices that are accessing their network without any transit and at rest on the device. Encryption prevents accidental controls in place. and intentional data loss from theft or unauthorized uses. Laying the groundwork for mobile security typically involves: What’s Next 1. Conducting asset discovery: Explore what kinds of devices Smart devices are taking over. Count on a world where everyone employees are using, including hardware, software, licensing and in your organization has a smartphone or tablet. Providing the any warrantees. Find out exactly what your organization currently ambient connectivity your workers take advantage of in their owns. personal lives can have a significant positive impact on your busi- ness. But to make this transformation a reality, IT must implement 2. Examining user behavior: Explore whether employees are solutions that secure business data across your network, applica- already using personal devices (smartphones, tablets and so on) tions and devices. for work functions. Can they access your network without formal These hardware-enabled innovations are helping to make permission? virtualization pervasive throughout bank IT environments, as orga- 3. Creating user profiles. Segment users by their job functions nizations progress from simply consolidating general-business and define which applications and data each job function requires. applications to virtualizing larger, mission-critical workloads.  These definitions will support the implementation of mobility policies. 4. Engaging a strategic partner. The mobile solution CONTRIBUTOR: Sean Wisdom, Global Director of End ecosystem is fragmented and complex. Many organizations turn User Computing for Dell, is a mobile industry expert focused on to IT solution providers to guide them. IT solution providers offer improving the productivity, efficiency and profitability of business a variety of services to help you control and take advantage customers through mobile solutions. Sean’s insight into how mobil- of mobile devices. These organizations can help you define a ity can transform the way a business operates — gleaned from his strategy that’s custom fit for your business needs and implement work leading hundreds of mobile deployments — drove the direc- a solution stack that will help you achieve your goals. tion and content of this piece. © 2012 UBM TechWeb, a division of UBM LLC. All Rights Reserved. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. // 2 //