Feb 05, 2013
Emerging Mobile Security Strategies
Mobile devices -- still only semicontrolled, at best -- continue to push the boundaries of remote access. When users are on corporate Wi-Fi, we can bring to bear strong protection mechanisms, such as DLP, application inspection and threat detection. Once they switch to 3G/4G and hit the Internet directly, however, we lose much of our ability to guide the user experience and protect the devices, and our data.
Still, it's not uncommon to find enterprises with users connecting to corporate resources from virtually any location, using personally owned devices. It's time to adapt your security architecture and control suite to the new reality.
On the plus side, we can add the newly introduced global HTTP proxy in iOS 6 to our protection arsenal for supervised devices. Now we can stop the "split tunneling" experience, guide 3G/4G and Wi-Fi user traffic to established gateways, and bring true cloud protections to bear. Is it time to start aligning your next-generation mobile device security with your cloud strategy and anytime, anywhere connectivity requirements? We'll lay out the pros and cons. (S6320213)