How to Start Up a Mobile Security Project
by Martin Allen - MD Pointsec Mobile Technologies - Thursday, 10 August 2006.
Choosing a Strategy

One crucial question that many companies consider when evaluating mobile security products is whether to go for the “big-bang” approach and roll it out to every mobile machine from the start, or whether to start with just a few devices and complete the rollout over an extended period. We would always suggest you rollout from the start as staggering the process is just asking for trouble. If a machine gets stolen or lost, you can just bet that it will be one which hasn’t been protected yet.

Whichever supplier you decide to go for, choose carefully. If there’s an offer of some reference sites, contact those references and ask questions. If no reference sites are offered, ask why. Look, too, for industry certifications within your business sector, and for an organisation that can support you 24 x 7, just in case problems do arise. In short, go with an established player and a market leader, so that you can have confidence that the product you choose will continue to be supported and developed in the future.

Conclusion

Rolling out a mobile security project used to be difficult and expensive, but such practice is now becoming widespread in companies of all sizes and in all areas of industry. The ubiquitous laptops, PDAs, smartphones and USB sticks in every department of every organisation nowadays means that your network no longer ends at your main gate, but extends to every employee’s home and every customer site. Rolling a mobile security policy will ensure that your data protection efforts will do so too.

Top Tips for an Effective Mobile Security Rollout

1. Roll it out to all devices from the start, rather than just those which you think might be the most deserving. It will save you time and money in the long run.

2. Choose an established vendor which offers 24x7 support, satisfactory reference sites, and relevant certifications.

3. Look at the total cost of ownership, including ongoing support and upgrades, rather than just the up-front licence costs.

4. Ensure that the product supports all of the hardware platforms that you use, and which you intend to use in the future.

5. The recently-published DTI survey into security breaches in the UK will help you to convince senior managers that mobile security is a major risk that must be addressed sooner rather than later.

Spotlight

Biggest ever cyber security exercise in Europe is underway

Posted on 30 October 2014.  |  More than 200 organisations and 400 cyber-security professionals from 29 European countries are testing their readiness to counter cyber-attacks in a day-long simulation, organised by the European Network and Information Security Agency (ENISA).


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //