Access "Thwarting BYOD risks starts with a mobile security policy, experts say"
This article is part of the May 2012 issue of New security strategies for the bring-your-own-device era
IT security pros mulling over an investment in a new mobile device management (MDM) system in order to reduce BYOD risks should first conduct a thorough review of their mobile device security policies to get a better understanding of how they plan to use the MDM technology. That was the message from a variety of security experts at InfoSec World Conference and Expo 2012 held in April. Far too many enterprises are selecting and implementing MDM technology and then failing to understand how to use its capabilities to the fullest, says Diana Kelley, founder and principal analyst at consulting firm Security Curve. “Once they get it deployed, they quickly realize they don’t know how to manage the tool and they’re not using it effectively,” Kelley says. In fact, a variety of businesses can use security features already native to most Google Android and Apple iOS devices, Kelley says. Both mobile platforms provide remote lock and wipe capabilities as well as support for password management for mitigating BYOD risks. Although its capabilities are limited, Microsoft’... Access >>>
Premium Content for Free.
Mobile device management systems help mitigate BYOD risks
by Lisa Phifer, Contributor
Understand the benefits and limitations of multi-platform MDM technology.
Deploying DP systems: Four DLP best practices for success
by Crystal Bedell, Contributor
Plan your data loss prevention project carefully to avoid missteps.
- Mobile device management systems help mitigate BYOD risks by Lisa Phifer, Contributor
VMware strategy for security partners undergoes overhaul
by Marcia Savage, Editor
Virtualization giant revamps its security partner program after hitting some bumps in the road.
Thwarting BYOD risks starts with a mobile security policy, experts say
by Robert Westervelt, News Director
Organizations need to establish formal mobile policies before buying a mobile device management system.
- VMware strategy for security partners undergoes overhaul by Marcia Savage, Editor
Verizon DBIR: Organizations are forgetting computer security basics
by Marcia Savage, Editor
Verizon data breach report illustrates need to get back to basics.
Cybersecurity education vs. cybersecurity training
by Ron Woerner, Contributor
Security professionals need to understand the difference and plan accordingly.
Security staffing: Why information security positions go unfilled
by Lee Kushner, Contributor
Be aware of potential roadblocks and adjust your recruiting accordingly.
- Verizon DBIR: Organizations are forgetting computer security basics by Marcia Savage, Editor
More Premium Content Accessible For Free
Compliance and risk modeling
You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting ...
Essentials: Threat detection
Antivirus and intrusion prevention aren’t the threat detection stalwarts they used to be. With mobile endpoints and new attack dynamics, enterprises ...
Managing identities in hybrid worlds
The world in which successful IAM programs must be implemented is increasingly complex, a mix of legacy on-premise IAM infrastructures, cloud-based ...