About
Subscribe
  • Home
  • /
  • TechForum
  • /
  • Security should always be the top priority in a mobile strategy

Security should always be the top priority in a mobile strategy

By Dries Morris, Operations Director at Securicom.

Johannesburg, 13 Dec 2012

Of all the reasons for implementing a corporate mobile device management (MDM) strategy, protecting and managing corporate data is undoubtedly the most pressing. Yet, device and content security is probably the one area where companies are falling terribly short.

This is the opinion of Dries Morris, the Operations Director at Securicom, a maker and implementer of an end-to-end range of managed IT security services for companies in Africa.

"The massive array of mobile devices and operating systems, particularly in organisations that have embraced a 'bring your own device' (BYOD) mobile strategy, makes it incredibly difficult for companies to implement and enforce adequate security to protect corporate data stored and shared on employees' mobile devices.

"Inadequate mobile device security is not only a threat to an organisation's IT and data security, but it is also a threat to the success and sustainability of the mobile strategy. Controlling applications is just the tip of the iceberg. There are a host of threats that must be considered and appropriately addressed, with data loss prevention, mobile malware, access control and device decommissioning being among these," says Morris.

Citing from Gartner research, Morris says not all MDM solutions provide device encryption if it is not natively supported on the device and that some tools do not allow for the implementation of functions such as over-the-air (OTA) software upgrades and certificate-based authentication. Furthermore, when it comes to Android devices, many MDM vendors offer generic support using a communication framework. However, this framework cannot be used to support and secure Kindles.

"Some MDM solutions also fall short in areas such as restricting the download and use of potentially malicious apps and games on devices that are used for work purposes, the encryption of data in transit as well as data at rest, and features for the enforcement of data leakage policies."

To ensure optimal security and compliance with corporate IT security policies, Morris says an effective MDM solution must provide for:

* Password enforcement
* Device lock
* Remote lock-down or wipe-clean of lost or stolen devices
* Data encryption
* User authentication / access control
* Anti-virus
* Firewall
* Device monitoring
* Remote enforcement of security upgrades
* Application control
* Support for different types of devices and operating systems
* Data loss prevention / enforcement of data leakage policies

According to Morris, Zenprise MDM tools, which Securicom offers as a cloud-based service to companies through an agreement with Blue Turtle Technologies, which has the agency to distribute the technology in southern Africa, offers perhaps the most comprehensive and robust security features across the broadest range of mobile devices.

Early in June 2012, the company announced an expanded set of security and management capabilities for Android-based smartphones and tablets. The company also announced support for the Amazon Kindle Fire.

Zenprise protects the mobile enterprise end-to-end with the industry's easiest-to-use mobile device management solution. Moreover, Zenprise enables additional security for Android devices covering both BYOD and corporate-issued Android use cases.

Zenprise boasts advanced security features, such as Mobile App Lock, which stops users from launching malicious or non-compliant apps on their devices; secure encryption of network traffic; encryption of data at rest; and mobile data loss prevention.

"There are few MDM technologies available that offer such a strong set of security features. Before spending thousands of rands on a solution, companies must carefully evaluate whether the technology can adequately address their security requirements. Choosing a tool that can't is counter-productive because security, rather than productivity, should always be the key consideration in a mobile strategy."

Share

Securicom

Securicom is a specialist IT security management and consulting company offering an end-to-end range of fully-hosted and managed IT security services.

All Securicom's solutions utilise world-leading technologies, which are innovatively packaged together for their individual strengths and combined with Securicom's expertise, to deliver comprehensive protection against known and emerging threats.

Securicom's services include: advanced e-mail content filtering and management (e-Purifier); hosted e-mail archiving and retrieval (MailVault); e-mail branding (e-Branding); vulnerability scanning (Securiscan); perimeter protection (Managed Firewalls); optimised wide area data services (Managed WDS); remote access security (Securicom SSL VPN) and Optimised Remote Access Services; and WebSecure, which inspects, filters and cleans inbound and outbound Web traffic to combat browser-based threats such as bots, phishing and other malicious active content.

Securicom has offices in Johannesburg, Cape Town and Namibia, and offers its services in 10 other African countries.

For more information on Securicom, please visit http://zc.securicom.co.za.

For more Securicom media-related information, please contact: Kerry Webb on (082) 496 0713.

Blue Turtle

Blue Turtle Technologies provides solutions for optimising, enhancing and leveraging existing IT investment, and supporting the cost-effective delivery of new technology initiatives. With experience from mainframe to desktop, Blue Turtle delivers solutions for the effective management of IT infrastructures employing innovative software products, backed by 'best-practice' implementation services. Blue Turtle's strategy leverages 'best-in-class' software products brought together from leading international and South African software providers to deliver compelling and cost-effective technology management solutions to customers. For more information, visit http://www.blueturtle.co.za.

For more information regarding Blue Turtle Technologies, please contact:

Michael Hutchinson
Blue Turtle Technologies
Tel: (011) 206 5600
michaelh@blueturtle.co.za

Editorial contacts

Kerry Webb
Securicom
(082) 496 0713