BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.



Similar documents
Kaspersky Security for Mobile

BEST PRACTICE GUIDE TO SYSTEMS MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Feature List for Kaspersky Security for Mobile

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

RESELLER BRANDING BEST PRACTICE GUIDE TO MAIL & WEB.

Symantec Mobile Management Suite

Guideline on Safe BYOD Management

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

BEST PRACTICE GUIDE TO CONTROl TOOLS

IBM Endpoint Manager for Mobile Devices

Kaspersky Security for Business

KASPERSKY SECURITY FOR BUSINESS

SecuRity technologies for mobile and Byod.

Symantec Mobile Management 7.1

YOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

Symantec Mobile Management 7.1

Symantec Mobile Management 7.2

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

BEST PRACTICES. Systems Management.

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

BEST PRACTICES. Encryption.

Kaspersky Security 10 for Mobile Implementation Guide

Symantec Mobile Management for Configuration Manager 7.2

PULSE SECURE FOR GOOGLE ANDROID

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

CHOOSING AN MDM PLATFORM

BYOD: End-to-End Security

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution.

ForeScout MDM Enterprise

The ForeScout Difference

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Ensuring the security of your mobile business intelligence

YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

Athena Mobile Device Management from Symantec

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity

A guide to enterprise mobile device management.

Chris Boykin VP of Professional Services

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

Kaspersky Security for Mobile Administrator's Guide

BYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

SA Series SSL VPN Virtual Appliances

Trust Digital Best Practices

Choosing an MDM Platform

Securing the mobile enterprise with IBM Security solutions

Symantec Mobile Security

BEST PRACTICES. Security Controls.

IT Enterprise Services

Bell Mobile Device Management (MDM)

Security Intelligence Services.

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

IBM MobileFirst Managed Mobility

Top Four Considerations for Securing Microsoft SharePoint

IT Resource Management & Mobile Data Protection vs. User Empowerment

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Secure Mobile Solutions

Reducing the cost and complexity of endpoint management

Managing and Securing the Mobile Device Invasion IBM Corporation

World-class security solutions for your business. Business Products. C a t a l o g u e

RFI Template for Enterprise MDM Solutions

Endpoint protection for physical and virtual desktops

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci

Microsoft Windows Intune: Cloud-based solution

[BRING YOUR OWN DEVICE POLICY]

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

KASPERSKY LAB: EMPOWERING INDUSTRIAL CYBER SECURITY

Readiness Assessments: Vital to Secure Mobility

Apple Configurator MDM Site - Review

Mobile Device Management

Ensuring the security of your mobile business intelligence

Transcription:

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

CONTENTS 1. OPEN ALL HOURS...2 Page 2. MOBILE DEVICE MANAGEMENT WHAT IS IT?...2 3. CHOOSING THE RIGHT MDM SOLUTION:...2 4. EFFECTIVE MDM PRACTICES...3 5. IN CONCLUSION...6 1

MOVING TARGETS: MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY. 1. OPEN ALL HOURS Mobile access to vital business applications and information empowers workers to be more productive, supporting increased business agility and flexibility. But mobility comes at a price: The same features that make smart devices so useful to employees also make them attractive to hackers, data thieves, malware distributors and other criminals. In the past 12 months alone, 51 per cent of organisations globally have experienced data loss due to insecure mobile devices. 1 It s not just about malware; the trend towards Bring Your Own Device (BYOD) initiatives in companies of all sizes is contributing to an increasingly complex spread of devices across the business. At the same time, the lines between business and personal use are blurring, creating a challenging management and control environment for IT administrators. How can you support BYOD initiatives without the headaches? How can you control what the end-user is doing when they re downloading apps in a hotel room in a different time zone? What happens when they leave their smartphone in the back of a taxi? Can you control all of this easily and from one central point? Mobile Device Management (MDM) can answer most of these questions. 2. MOBILE DEVICE MANAGEMENT WHAT IS IT? Mobile Device Management allows IT professionals to extend their wired security strategy and policies to all devices, wherever they happen to be. MDM software allows IT managers to cost-effectively automate vital management and control tasks such as device configuration, software updates, backup/restore. All while ensuring the safety of sensitive business information in the event of theft, loss or end-user abuse. 3. CHOOSING THE RIGHT MDM SOLUTION: 3.1 Multi-Platform Support Android, BlackBerry, ios, Symbian, Windows Phone, anyone supporting BYOD initiatives will be familiar with the demands of securing and maintaining multiple platforms. An MDM solution that supports multiple platforms is not only cost-effective, it takes the pain out of managing multiple systems. It also brings flexibility, supporting not only the devices you have today, but the brands and products you choose in the future. 2 1 Source reference: Ponemon: The Cost of a Lost Laptop (2009)

4. EFFECTIVE MDM PRACTICES 4.1 Strong policies Create mobile-specific policies that clearly define, among other things: How the device will be deployed What data will be accessible by mobile workers Who can do what on company networks What procedures will be implemented in the event of device loss or theftdefine and enforce policies in a granular, flexible way e.g. apply different policies to different users and groups, according to their needs. This level of granularity should extend to the device itself- for example, jailbroken or otherwise compromised devices can be prevented from accessing company data or remotely locked, adding an extra layer of security. 4.2 Containerisation Eighty-nine per cent of people using their personal device for business purposes say they use it to access critical work information. 41 per cent say they use their personal devices at work without permission. 2 Even the most conscientious users can inadvertently put company systems and content at risk by downloading consumer applications or accessing personal content using their device. This is where containerisation comes in. It s a simple solution that separates personal and business content on the device, allowing IT complete control over business content and protecting it from any risks introduced by personal usage without affecting personal data. Using containerisation, IT departments can apply security and data protection policies to a business container on a personal or company-owned device making it particularly useful in BYOD scenarios. 4.3 Encryption MDM best practice should also include the option to encrypt sensitive data within the container. Encryption reinforces anti-theft strategies; forcibly encrypted data reduces the impact of any time delay in wiping a lost or stolen device. By ensuring that only encrypted data can leave the business container on a device, organisations can guard against data leakage and support compliance requirements around data protection. Kaspersky Lab s MDM encryption technology can be automated and made completely transparent to the end user, ensuring that your security policies are adhered to. 4.4 Anti-Theft and Content Security It s almost impossible to physically lock down small, ultra mobile devices, but you can lock down their contents and control what happens when they do go missing. Kaspersky Lab s MDM solution includes anti-theft and content security features that can be enabled remotely, preventing unauthorised access to sensitive date. Among them: SIM control: Lock a lost or stolen phone, even if the SIM card is replaced, and send the new number to the rightful owner. Device/location tracking: Use GPS, GSM or WiFi to pinpoint device location. Remote/selective wipe: Completely erase all data on any device, or just sensitive company information. Remote lock: Prevent unauthorised access to a device; no need to wipe data. 3 2 Source reference: Juniper Networks, Trusted Mobility Index 2012.

4.5 Mobile Anti-Malware You need a strategy for dealing with lost or stolen devices. But devices are at risk even when they re with authorised users. Many organisations are careful to implement anti-malware and anti-spam solutions on their fixed networks but do little to protect their mobile devices from becoming a source of viruses or other malware. Kaspersky Lab s mobile security technologies include a blended anti-malware solution that combines traditional, signature-based detection with proactive, cloud-assisted technologies. This improves detection rates and gives real-time protection from malware. On-demand as well as scheduled scans ensure maximum protection automatic, over-the-air updates are essential to any MDM strategy. 4.6 Keeping things simple: Centralised controls Kaspersky Lab s technologies allow administrators to manage the security of mobile devices from the same, single pane of glass console they use for their network and endpoint security. This eliminates the complexity associated with separate solutions, and the multiple, often incompatible consoles that come with them. Technology sprawl makes a challenging job more complex than it needs to be. By simplifying and automating the secure configuration of multiple devices, you not only reduce the burden on IT, but support better mobile security practices. Once your policies and ground rules are in place, centralised control can be achieved using a single click whether you re managing 10 devices or 1,000. 4.7 Get the balance right Deploying, managing and securing your mobile IT environment doesn t have to be complicated or expensive. Kaspersky Lab s MDM solution makes the secure configuration of mobile devices painless and straightforward; the mobile agent installed on devices will provide all the protection you need against current threats. IT administrators can be confident that all mobile devices are configured with their required settings and are secure in the event of loss, theft or user abuse. It doesn t matter what size your business is, if you don t manage mobile devices properly, they ll soon become just another drain on resources, not to mention a security and data loss risk. Whether you re hoping to reduce costs by supporting a BYOD initiative or operating a strict company-owned mobile device program, the risks are ultimately the same: a growing volume of sensitive business data is sitting in employees pockets, being left behind in taxis, stolen or lost. What if you didn t have to trade security and data protection for mobility, enhanced productivity and simplicity? Kaspersky s mobile device management and enhanced mobile security technologies mean that you don t. 5. IN CONCLUSION Organisations need intelligent security technologies to protect their data and they also need intuitive and uncomplicated IT efficiency tools. Kaspersky Lab s 2,500 employees are driven to meet those needs for the 300 million plus systems they protect and the 50,000 new systems a day that are added to their number. Kaspersky MDM is a component of Kaspersky Endpoint Security for Business. Combining award-winning anti-malware, IT policy enforcement tools, centralised management and cloud-assisted protection, Kaspersky s business security products are the right choice for your organisation. Talk to your security reseller about how Kaspersky can bring secure configuration to your mobile endpoint deployment and more! 4

SEE IT. CONTROL IT. PROTECT IT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Kaspersky Lab ZAO, Moscow, Russia www.kaspersky.com 2013 Kaspersky Lab ZAO. All rights reserved. Registered trademarks and service marks are the property of their respective owners. Mac and Mac OS are registered trademarks of Apple Inc. Cisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. IBM, Lotus, Notes and Domino are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. Microsoft, Windows, Windows Server and Forefront are registered trademarks of Microsoft Corporation in the United States and other countries. Android is a trademark of Google, Inc. The Trademark BlackBerry is owned by Research In Motion Limited and is registered in the United States and may be pending or registered in other countries.