Enterprise mobility management must cover all the security bases

Enterprise mobility management must cover all the security bases

Enterprise mobility management must cover all the security bases

Date: May 30, 2014

Security is the one area in IT that a manager's work is truly never done, says Craig Mathias, principal at Farpoint Group, a firm that focuses on wireless networking and mobility management. In this video, Mathias takes a comprehensive look at enterprise mobility management (EMM) in a security context, starting with policy and outlining a thorough framework for ensuring security in the mobile era.

IT management in general is concerned with a variety of elements in the modern workplace. Computers, of course, and network management, as well as security management and personnel. But for mobility itself, there are five key additional domains: mobile device management (MDM); mobile application management (MAM); mobile data or content management (MCM); mobile expense management; and mobile policy management.

Mathias delves into each of these areas in detail, though he begins with the crucial starting point for any InfoSec pro: creating a formal security policy. Mathias notes that it's surprising how many companies have no set policy when it comes to mobility. A solid policy, he notes, requires three key elements: identification of what information is sensitive; explication of who is allowed to access this information; and what should be done in the event of a breach.

The focus of any such security policy for EMM must be on endpoint security (where information lives). Sensitive information must be encrypted and Mathias strongly recommends two-factor authentication.

From the foundation of solid mobility security policy, a company's IT staff must then develop plans for dealing with new technology, employing both MAM and MCM, and also be sure to continually communicate security policy through training, support and continual policy review and revision.

These are just the highlights of Mathias' informative and practical presentation. It is one every InfoSec pro should view to make sure his company has in place an EMM strategy strong enough to stand up to an always-evolving environment, in terms of both technology and the threats to it.

View the next item in this Essential Guide: Tactical Success for Multiplatform Endpoint Security or view the full guide: Managing BYOD endpoint security

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: