Mobile Devices – especially mobile phones, smartphones and tablet-pcs – have spread at a phenomenal rate. Their advance is less driven by the IT department but by the end users themselves.
As long as only the phone was used, there was no problem. Nowadays, as the use of the devices extent to email and internet and the smartphones are integrated into enterprise applications, these systems are increasingly a security risk. An appropriate security awareness of users can not be expected in all cases.
Similarly, with its circulation and its integration into company applications, these systems are of course interesting for attackers.
So you need
On the one hand an efficient protection
- Virus protection
- Intrusion Detection
- Theft protection (block device, erase data)
- Encryption (complete, or at least for certain areas)
On the other hand a comfortable management
- Enforcement of policies
- Control of applications, apps (whitelists, blacklists)
- Mapping and profiling of users
- Internet-access-control (compliant to company policy)
Installations where management and security are covered by separate systems have not proved successful.
Effective solutions must consider both devices on which a security product can be installed as well as devices which is not the case (due to restrictions of the operating system or the manufacturer).