CSO's 2015 Mobile Security Survival Guide
Currently, most of the mobile security in place is in the form of Mobile Devices Management (MDM) tools that provide such capabilities as device asset management, secure browsing, application whitelisting, data loss prevention, mobile VPN, app-level VPN and many more. While most CISOs, CIOs, and security analysts I've spoken to conclude that while MDM isn't an adequate mobile security answer, it's currently an important part of the mobile defense toolkit, especially in larger enterprises. And, as is often the case with enterprise data security, there are never any easy answers.
Fortunately, the shift to mobile doesn't mean a shift in mindset for security professionals. In fact, the shift to mobile doesn't change much of anything at a high level when protecting data and applications. In actuality, all of the same security practices are needed on mobile devices as they always have been on notebooks and desktops and any other computing form factor: user authentication and authorization, encryption, enforcing security policies, and everything else that comes with keeping data secure.
Already an Insider Sign in