BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

Mobile endpoint security: What enterprise infosec pros must know now

Last updated:May 2017

Editor's note

Managing issues of endpoint security involving employee-owned mobile devices is a key part of the security professional's job description. Not only must corporate data and networks be protected from hackers targeting enterprise systems; mobile endpoints now, too, must be defended. There's nothing obvious or easy about the mobile endpoint security challenge. This era of mobile workers using multiple devices has expanded the attack surface for hackers; meanwhile, the IT department's ability to control employee-owned endpoints has gotten increasingly complex. This guide looks at all aspects of the mobile challenge for enterprise security and offers up various approaches IT pros can take, from strategy to tools and training. It looks, too, toward the future to outline the likeliest challenges ahead when it comes to mobile device security. 

1The tools to battle the threats that mobile endpoints invite

When the mobile era dawned, so did the new age of mobile security threats. But with the proper tools and training, enterprise assets can be defended. Here's your guide to what tools exist and what training enterprise employees need to help keep company data and networks secure.

2Focusing on the endpoints themselves is a crucial security step

Strategy, policy, training and tools are all must-haves. But to achieve true enterprise security in the mobile age requires spending time and effort focusing on the endpoints themselves. Here are some things to consider when forming your mobile endpoint security training.

3The new issues emerging for mobile endpoint security

Every season seems to bring with it a new type of device. And with the latest cyber toys come new cyberthreats. As the saying goes, the only constant is change -- so it’s important to keep your understanding of mobile endpoint security up to date. Learn what security considerations are key and how they can be balanced with issues like privacy and access.

4Glossary

Part of keeping up with developments in mobile endpoint security, and the security field in general, is keeping up with the terminology. In this module we've gathered definitions to the key terms in this ever-changing industry.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close