THE TOP 8 MOBILE SECURITY RISKS

Similar documents
CHOOSING AN MDM PLATFORM

MOBILIZE YOUR WORKFORCE FOR GREATER PRODUCTIVITY

BEST PRACTICES IN BYOD

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Choosing an MDM Platform

Secure, Centralized, Simple

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.

Corporate-level device management for BlackBerry, ios and Android

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

What We Do: Simplify Enterprise Mobility

Securing end-user mobile devices in the enterprise

Blackberry Brings Security and Simplicity to Multinational Insurance Company

MDM Mobile Device Management

Symantec Mobile Management Suite

The Future of Mobile Computing

Bell Mobile Device Management (MDM)

BEST PRACTICES IN BYOD

Kaspersky Security for Mobile

Symantec Mobile Management 7.1

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management

Guideline on Safe BYOD Management

The CIO s Guide to Enterprise Mobility Management THE CIO S GUIDE. To Enterprise Mobility Management. Whitepaper. Whitepaper.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

BES12 Frequently Asked Questions. BEs12. questions. FAQs

BYOD Guidance: BlackBerry Secure Work Space

WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT

Sophos Mobile Control

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

Athena Mobile Device Management from Symantec

Symantec Mobile Management 7.1

Symantec Mobile Security

Symantec Mobile Management 7.2

Cisco Mobile Collaboration Management Service

Symantec Mobile Management for Configuration Manager 7.2

BlackBerry 10.3 Work and Personal Corporate

Security and Compliance challenges in Mobile environment

A guide to enterprise mobile device management.

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

Mobile Application Ecosystem

We Manage Mobility. Manage Secure Support Monitor Track. Balhar Dosangh Director, Strategic Alliances

ANY TIME ANY PLACE ANY WHERE. JOEL SWEENEY and SHAUN BENNETTS XPERTEX

Enterprise Mobility as a Service

How To Manage A Mobile Device Management (Mdm) Solution

Mobile device and application management. Speaker Name Date

Feature List for Kaspersky Security for Mobile

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

Mobile Device. Management-

Deploying. Mac. Five best practices

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

Symantec Mobile Management 7.2

Healthcare Buyers Guide: Mobile Device Management

BYOD: End-to-End Security

Managing and Securing the Mobile Device Invasion IBM Corporation

The ForeScout Difference

[BRING YOUR OWN DEVICE POLICY]

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

Mobility, Security Concerns, and Avoidance

Enterprise Security with mobilecho

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

Secure Mobile Solutions

Good for Enterprise Good Dynamics

ForeScout MDM Enterprise

BYOD Policy Implementation Guide. February 2016 March 2016

Reducing the cost and complexity of endpoint management

Tom Schauer TrustCC cell

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE

Enterprise solution comparison chart

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

DriveLock and Windows 8

Security Best Practices for Mobile Devices

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Device Management for CFAES

WHITE PAPER. The CIO s guide. management

Corporate Presentation 2016

Mobile Security Fall 2013

BLACKBERRY COBO: ULTIMATE MOBILE SECURITY AND CONTROL

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

BlackBerry 10.3 Work Space Only

Managing Mobility. 10 top tips for Enterprise Mobility Management

Mobile Security & BYOD Policy

Enterprise Mobility Management

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

When enterprise mobility strategies are discussed, security is usually one of the first topics

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Mobile Security: Threats and Countermeasures

Bell Mobile Device Management (MDM)

Mobile App Management:

Mobile Device Management Version 8. Last updated:

Copyright 2013, 3CX Ltd.

Transcription:

1 THE TOP 8 MOBILE SECURITY RISKS How to Protect Your Organization Whitepaper

2 The Top 8 Mobile Security Risks: How to Protect Your Organization As enterprises mobilize business processes, more and more sensitive data passes through and resides on mobile devices. And while almost every CIO knows how important mobile security is, getting a grip on it can be tough. There s a lot to consider, and new factors enter the equation all the time. On the pages that follow, you ll find an overview of the key issues you need to be on top of right now to protect your organization, its employees and its customers. If you answer no to many of these questions, you may have some significant gaps in your approach to mobile security. The good news is that you re not alone and there are EMM solutions designed to address each of these challenges. The Top 8 Enterprise Mobility Security Issues Today 1. Inadequate control over lost/stolen devices 2. Users who don t follow mobile policies 3. Rogue apps and malware 4. Poor separation of work and personal content and apps 5. Limited protection for data at rest and in transit 6. Weak authentication 7. Difficulty monitoring the entire mobile fleet 8. Challenges with compliance and flexibility (meeting the needs of all users)

3 1. Do you stay in control when devices go missing? Yes No I m not sure Are your procedures for lost/stolen devices clearly defined, well understood by your entire staff and adhered to? Is IT able to perform a remote wipe (and confirm that data is permanently deleted)? Do you impose password protection on every device, regardless of who owns it (Bring Your Own Device; Corporate Owned, Personally Enabled; etc.)? Do you insist that devices automatically lock after a brief period of inactivity? Are the devices in your network (again, regardless of the ownership model) discoverable via location-based tracking? Do you have backup and restore capabilities that allow you to provision a new device quickly and easily? Can mobile workers easily and safely initiate some remote security tasks themselves through a user self-service tool (e.g. locking a misplaced device remotely)? 2. Do your users understand and follow your policies? Yes No I m not sure Do you provide training and documentation for new employees that explains how they should approach mobile computing? Is that training reinforced regularly and in different ways? Do they truly understand what s expected and why it matters? Do you account for different learning styles (some users will respond better to video; others to a checklist, etc.)? Do you ask users to sign your policy document and are they aware of the penalties of not complying?

4 3. How do you keep rogue apps and malware at bay? Yes No I m not sure Do all devices accessing your network have up-to-date anti-virus/anti-malware tools installed? Do you keep an up-to-date whitelist of third-party apps? Can you run a quick check at any time to make sure that all the apps in use are authorized? Are BYOD users required to keep devices current with OS upgrades, software and app updates, and anti-virus protection? Do you have a corporate app storefront? Do you have a mechanism in place to manage apps throughout their lifecycle (deployment, updates, retirement)? Are you able to automatically detect when jailbroken or rooted devices try to access your network and can you automatically program next steps? Can employees find out which apps are approved, recommended or mandatory for their role? Are users prompted to enter their device password before installing apps? Are your anti-virus measures for non-mobile devices up to date and adequate? (Malware exposure can occur when users connect a mobile device to an infected desktop computer via USB, but most desktop anti-virus software will help prevent this type of attack.) 4. How do you keep work and personal content/data separate? Yes No I m not sure Can you enable and control a separate work space or container on the devices you manage, across multiple operating systems? Do you have a mechanism to prevent data leakage across multiple devices (e.g. making it impossible for users to send corporate data through unsecure channels like social media)? Can you enable content/file sharing securely? Can mobile users securely view, edit, send and share files; save files securely for offline use; and upload files to a secure work space?

5 5. Can you ensure data is secure, at rest and in transit? Yes No I m not sure Can you enforce encryption, for data that s resting on devices and for data in transit, to the standard your policies demand? Are users prevented from disabling encryption manually? Can app data move securely along its path without a third-party VPN? Do you have confidence that your systems can protect your customers data regardless of how closely employees follow your policies? 6. How do you control authentication? Yes No I m not sure Do you authenticate devices and users beyond single-factor identification? Do your systems produce an alarm when an unauthorized device accesses the network? Can you control what happens next? 7. Can you monitor your mobile ecosystem in real-time? Yes No I m not sure Are you able to get a quick snapshot of your complete mobility landscape, through a unified dashboard? Can you easily create and export reports for auditing/compliance/logging? Can you configure your systems to create alerts and take automatic actions when security breaches are detected? 8. Can you apply appropriate security policies to the various user profiles in your organization? Yes No I m not sure Are you able to provide the highest security for those users who require it? Are you able to meet all the compliance requirements of your industry?

6 How to protect your organization If you re looking for answers to any of the challenges in this checklist, think BlackBerry. The BlackBerry platform is purpose-built for security, to deliver the best protection for work content, on device and in transit, for corporate, COPE and BYOD devices BlackBerry, ios, and Android today, with support for Windows Phone coming soon. Work email, content and apps are seamlessly separated from personal email, content and apps, with no compromise to the user experience. The BlackBerry security model delivers fast, multi-platform app deployment, and fully encrypted, behind-the-firewall content access without the need for third-party VPNs or add-on security. A user self-service portal allows for simple security management. And optional Gold level EMM provides the highest security control, enabling full compliance for government, high-security and regulated environments.

7 To find out more and to sign up for a FREE 60 day BlackBerry Enterprise Service 10 (BES10) trial, head to blackberry.com/business 1 EZ PASS Free perpetual BES10 licenses for all existing BlackBerry and other MDM licenses. Limited time offer. 2 Learn more at blackberry.com/ezpass 1 60-day Free Trial Offer: Limited time offer; subject to change. Limit 1 per customer. Trial starts upon activation and is limited to 50 Silver licenses for BlackBerry devices and 50 Gold licenses with Secure Work Space for ios and Android. Following trial, customer must purchase service to continue use of product. Not available in all countries. A trial system can be upgraded to a production system at any time by adding a production key purchased or acquired from an authorized reseller. When a system is upgraded to production, the trial licenses will no longer be available. 2 Between now and January 31, 2015. Additional Terms and Conditions will apply. ios is a registered trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. ios is used under license by Apple Inc. Apple Inc does not sponsor, authorize or endorse this brochure. Android is a trademark of Google Inc. which does not sponsor, authorize or endorse this brochure. 2014 BlackBerry. All rights reserved. BlackBerry, BBM and related trademarks, names and logos are the property of BlackBerry Limited and are registered and/ or used in the U.S. and countries around the world. All other trademarks are the property of their respective owners.