Overcoming Mobile Enterprise Security Challenges


Click here to download now

Source: SOTI Inc.
Date: March 2008
Type: White Paper
Rating: (2)

Overview: Increasingly powerful functionality is driving the wide-spread use of mobile devices by banks, government and law enforcement agencies and other security conscious organizations. Mobile workforces are taking advantage of mobile devices to remotely access sensitive data like confidential emails, customer data, credit card data, medical history and patient information.

Mobile devices are now the most vulnerable entry points for malware and threats to the corporate network. The potential security loopholes are many. Will the next leak of sensitive information in your organization result from a stolen SD card, or through USB / Bluetooth? Can you ensure that corporate email is being accessed only on authorized devices protected by security policies? Can you reliably "wipe" information from a lost device if it does not connect to your server? Can you proactively detect an attempt to install unauthorized software on a device? Can you respond in real-time and take control if the device is in the wrong hands? Can you track the location of a stolen device?

This document helps you answer these questions and examines how to manage end-to-end security by:
- Protecting data in transit over public Wi-Fi and cellular networks
- Encrypting data stored on device, making it available only to authenticated users
- Disabling device communication modules and hardware features (e.g. camera, Bluetooth)
- Authenticating device users using Active Directory (Domain Security) credentials
- Enabling malware protection and intrusion detection
- Limiting end user's access, preventing harmful Internet downloads and unauthorized software installation

Not what you're looking for? Search again
Go Advanced »
More From the Mobile & Wireless Section

View All Categories

Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management

Development : Architecture & Design, C/C++, Database, Development Tools, Embedded Systems, High Performance Computing, Java, Mobility, Security, Web Development, Windows/.NET, Open Source

Government : Cloud/SaaS, Enterprise Applications, Enterprise Architecture, Federal, Information Management, Leadership, Mobile & Wireless, Policy & Regulation, Security, State & Local

Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers

Healthcare : Policy & Regulation, Leadership, Security & Privacy, Mobile & Wireless, Electronic medical records, Clinical information systems, Administration systems, Interoperability, The Patient

Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services

Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business

Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends

Mobility : 3G Wireless/Broadband, 802.11x, Fixed Mobile Convergence, Mobile Business, Mobile Messaging, Muni Wireless, RFID, Smartphones, Wi-Fi VOIP, Wi-Fi/WiMax, Wireless Security, WLAN

Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds

Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats

Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services

Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services

Storage : Data protection, Disaster Recovery, Removable/Portable Storage, Security, Storage Fabrics, Storage Systems, Virtualization

Telecom : VOIP, Unified Communications, Voice services, PBXs, Call Centers, Presence, Collaboration Systems, Business, Regulation, Internet policy

Windows/Microsoft : Applications, Internet Explorer, Microsoft Company News, Office Suite, Open Source, Operating system, Security


More Government Resources

Wrangling Actionable Insights from Organizational Data
ThunderCat recently issued a white paper titled, "Wrangling Actionable Insights from Organizational Data," which shines a light on how organizations can best leverage ......

Take our poll and see how you measure up your peers:
Use of FedRAMP for Cloud Assessment

More On government