Professional Documents
Culture Documents
Brought to you by
1. Understand your business needs and
security standards
Every industry is dierent in its
func;oning. Defense, health care, IT,
retail, and others each have their own
security requirements.
For example, a na;ons defense sector
will have far more protocols and security
clearance requirements when compared
with its logis;cs industry.
Therefore, it is essen;al to be aware of
your industry's standards to ensure that
there is no ambiguity while performing
research on the available features of an
mobile device management (MDM)
solu;on.
2. Know whats in store while
embracing mobility
An enterprise that decides to go mobile should be aware of the associated pros and cons.
Let's say that your organiza;on supports BYOD (bring your own device), which allows employees
to use their personal mobile devices to perform company-related tasks like accessing work-
related content.
Employees would want the ability to complete rou;ne tasks from their smartphones during their
down;me, so they can focus on mission-cri;cal work while at their desks.
This invariably poses a risk in the form of data leakage due to factors such as malware or device
theT.
3. Understand app management and
security
Managing mobility in organiza;ons involves
combaVng security risks concerning devices
and apps.
Exis;ng security awareness programs are
targeted towards desktop users.
If an enterprise is looking to adapt to a
mobile environment, these programs have
to be revisited to focus on the usage and
risks involved with mobile devices.
An enterprise should educate its employees
to use trusted sources and avoid suspicious
third-party sites for app downloads. It should
discourage the habit of tapping Con;nue
during app installa;ons.
An ideal MDM solu;on has features that
prevent suspicious apps from being installed.
4. Segment your organiza;on based
on level of trust
Segments in an enterprise can be either hierarchical
or departmental.
Regardless, certain employees might have access to
data that won't be available to others such as a taxi
service provider whose drivers require passengers'
pickup and drop-o loca;ons.
Their mobile devices can be provisioned to show only
this data on an app.
However, their superiors can access further details
such as passenger email ID and age, which they can
use to make data driven decisions.
To maintain ;ered protec;on, top-level employees
require stronger encryp;on and more exibility.
5. Set policies and restric;ons for
devices and apps
An ideal MDM solu;on would let you push policies
onto mobile devices.
By seVng up policies, you can restrict certain device
func;ons.
Consider the following situa;on: your company has
come up with a breakthrough product idea in a
market with no other oering that is even remotely
similar to yours.
Your R&D team is working on materializing this
product.
To ensure that there is not even the slightest data
leak, you need to disable data distribu;on by
preven;ng local prin;ng or data storage.
6. Iden;fy non-compliant devices
Jail broken and rooted devices always
pose a greater risk, because they're an
easy target for malware and cyber adacks.
You need a system that can quaran;ne
devices, so threats cannot spread aTer
detec;ng malware, app risks, network
adacks, and other threats.
Enterprise data is regularly compromised
simply because employees devices aren't
compliant with the enterprises' security
policies.
An ideal MDM solu;on should detect
whether a device is compliant.
It should also let you device lock or remote
wipe non-compliant devices and bar them
from your organiza;ons network.
7. Create awareness among users