Mobile Device Management (MDM) technologies are expanding at an incredibly high rate in midsize to large organizations. Traditional IT management and policies no longer apply in today’s market place. Smart phones and tablets are replacing the PC towers and laptops and adding a whole new layer of security concerns for corporate America.
Mobile Device Management
Mobile Device Management
Questions around how we protect our data and which devices are accessing our networks require us to construct an MDM strategy. To begin, we must understand how MDM tools provide capabilities to secure, manage, and support mobile devices. Learning to control and protect the data and configuration settings on all of your mobile devices, MDM can reduce support costs and business risks.Organizations must scrutinize devices that enter inside their company. Every mobile device entering its Enterprise must be enrolled and configured to meet security requirements.
Mobile applications have quickly become the desired information gateways that customers and employees use to interact with one another.
BYOD (Bring Your Own Device)
Bring Your Own Device (BYOD) adoption has increased productivity by allowing employees to access business applications and data from virtually anywhere in the world.BYOD poses real security challenges and violations of rules, processes, trust and intellectual property. Organizations are faced with a variety of devices that end users have
purchased and they have no control over the choice of device and the types of applications loaded on the devices. Organizations are trying to figure out how to securely enable access to enterprise apps and resources and give those end users that speed of access that they want. In addition, they don’t want their networks compromised by unauthorized devices and infected with malicious code.- Mobile Strategy and Governance:
This can be done by soliciting input from various departments of the enterprise regarding how different areas use portable gadgets. This helps create a uniform governance strategy. Determine which devices are allowed on the network, level of access. Define the who, what, where and when of network access. Inventory authorized and unauthorized devices. Inventory authorized and unauthorized users. Develop policies, mobile security awareness training, and Rules of Behavior prior to rollout of devices.
Choosing an MDMA number of vendors, solutions and technologies are available in the global marketplace that provide a broad range of MDM capabilities and solutions. We can help you determine the best MDM that meets your business and technical requirements.
Mobile AuditsCKSS provides flexible Mobile Risk Assessment Service which enable you to develop, assess and refine your mobile and BYOD strategies. We help you identify gaps and potential risk areas and establish a balance between business and security. We assist our clients in the following areas:
- Frequency of audits
- Creating a security baseline
- Identification of testing tools
- Creation of test plan
BYOD Protection- Sandbox Approach:We assist Organizations assess the risk and classification of the data on mobile devices. Implementing a BYOD strategy includes considerations of data classification and different access methods for different types of data in the IT environment. This approach boxes corporate data into a separate container that can be secured with passwords and other authentication mechanisms; nonbusiness data are kept separate and users can continue to use their devices for personal use. Should the device be lost or the employee leave the company, corporate data can be wiped from the device while leaving personal data intact.
- Distribution: The ability to manage and support mobile devices to include, remote wipe, deploying, installing updating, deleting and blocking mobile applications.
- Policy development
- Accounting: Inventory, provisioning and support of device deployment
- Security: Enforcement of device security
Mobile ForensicsWe assist organizations in recovering digital evidence from mobile devices using industry tools and methods. We also assist organizations in developing procedures for the preservation, acquisition, examination, analysis, and reporting of digital information present on smart phones.
Mobile Application Vetting and Mobile App DevelopmentMobile applications have quickly become the desired information gateways that Customers and employees use to
interact with one another. CKSS Consultants assist’s clients in the following areas:- Developing a threat model for mobile applications.
- Refining the SDCL process to include security processes.
- Developing a Mobile Application checklist based on DISA, OWASP and Best Practice.
- Establishing an enterprise mobile application vetting process, deployment and management of deployed applications.
- Implementing manual and automated mobile code reviews.
- Establishing a policy for mobile application inventory and approved application list (white list) for COTS apps.
- Mobile Apps Development
- Contents Distribution
- Mobile VPN, Virtualization
Have a Security Consultant Contact You
