How to Start Up a Mobile Security Project
by Martin Allen - MD Pointsec Mobile Technologies - Thursday, 10 August 2006.
Choosing a Strategy

One crucial question that many companies consider when evaluating mobile security products is whether to go for the “big-bang” approach and roll it out to every mobile machine from the start, or whether to start with just a few devices and complete the rollout over an extended period. We would always suggest you rollout from the start as staggering the process is just asking for trouble. If a machine gets stolen or lost, you can just bet that it will be one which hasn’t been protected yet.

Whichever supplier you decide to go for, choose carefully. If there’s an offer of some reference sites, contact those references and ask questions. If no reference sites are offered, ask why. Look, too, for industry certifications within your business sector, and for an organisation that can support you 24 x 7, just in case problems do arise. In short, go with an established player and a market leader, so that you can have confidence that the product you choose will continue to be supported and developed in the future.


Rolling out a mobile security project used to be difficult and expensive, but such practice is now becoming widespread in companies of all sizes and in all areas of industry. The ubiquitous laptops, PDAs, smartphones and USB sticks in every department of every organisation nowadays means that your network no longer ends at your main gate, but extends to every employee’s home and every customer site. Rolling a mobile security policy will ensure that your data protection efforts will do so too.

Top Tips for an Effective Mobile Security Rollout

1. Roll it out to all devices from the start, rather than just those which you think might be the most deserving. It will save you time and money in the long run.

2. Choose an established vendor which offers 24x7 support, satisfactory reference sites, and relevant certifications.

3. Look at the total cost of ownership, including ongoing support and upgrades, rather than just the up-front licence costs.

4. Ensure that the product supports all of the hardware platforms that you use, and which you intend to use in the future.

5. The recently-published DTI survey into security breaches in the UK will help you to convince senior managers that mobile security is a major risk that must be addressed sooner rather than later.


Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Thu, Feb 4th