Complex security policies
can be difficult for employees to follow, it is unrealistic to leave
security in the hands of mobile employees. An effective enterprise security alt="Security Manual - Sarbanes-Oxley" vspace=3 align=right
src="http://www.it-toolkits.com/images/Security.gif" width=85
longDesc="Security Manual Template - Sarbanes-Oxley" height=110>plan should
provide for simple, automated, scalable, and comprehensive ways to protect IT
investments and maintain worker productivity. Organizations must approach
security from a comprehensive perspective that ranges from the desktop to the
data center, following best practices to help ensure that the plan protects both
physical assets and data. A good strategy for mobile security is based on:



  • Protect systems: Asset tags can help simplify
    asset management by identifying individual devices. When used in conjunction
    with server-side asset management toolssoftware, these tags can give IT
    organizations the ability to monitor internal system components. In addition,
    dedicated security locks can help prevent theft. Visual deterrent labels and
    company logos offer an additional layer of protection against common theft
    because they can prevent an easy resale.

  • Protect data: When physical protection fails and a
    mobile device is lost, stolen, or damaged, it is critical that organizations
    retain the ability to protect sensitive enterprise data on the system. Data
    protection is linked to efficient access management. If authentication is not
    well managed, data protection can be difficult – especially if it is not
    centrally controlled. With a central security management solution a
    server-side application that interacts with the client-side software for
    central management IT departments can maintain control over key client
    security features and link them back.

  • Prevent unauthorized access: Security policies
    must strike the correct balance between providing the right people with access
    to the right level of information and blocking access for improper users.
    Authentication is key to enabling secure data access because it focuses on
    identifying the user. Authentication methods can include smart cards with PIN
    access, contactless cards, or unique biometric verifiers such as Federal
    Information Processing Standards (FIPS) – certified embedded fingerprint
    readers. Multi-factor authentication is the combination of these technologies
    into one strong authentication process, whereby any end user may be asked for
    more than one form of authentication.

  • Prevent malicious attacks: Network security should
    focuses on antivirus deployment and securityappliances, targeting three lines
    of
    defense: endpoint protection, which relies on software designed to
    safeguard mobile devices; network traffic monitoring, which uses appliances to
    watch for unusual data traffic patterns on enterprise networks; and Internet
    gateway appliances, which serve as filters and firewalls that selectively
    identify and block potentially dangerous data.

Resources
Post Your Resume to 65+ Job Sites
Resume Service

Post to Twitter Tweet This Post


Popular Tags:
 stealing   productivity   investments   monitors   devices   electronic components   mobile devices   servers   methods   infrastructure   access management