- Tools & Templates
- Security Jobs
- Data Protection
- Identity & Access
- Business Continuity
- Physical Security
- Security Leadership
Cloud Security Alliance releases 'Mobile Device Management: Key Components, V1.0'
The report identifies 17 must-have elements in the lifecycle of a mobile device security program.
As promised, the Cloud Security Alliance (CSA) has released a report outlining 17 specific elements that need to go into the security lifecycle of corporate mobile device policies.
The whitepaper is one of six parts to the upcoming, "Security Guidance for Critical Areas of Mobile Computing" I told you about yesterday. It'll be released at the upcoming annual CSA Congress Nov. 7-8 in Orlando.
“As mobile devices have become mainstays in the enterprise, an understanding of the full technology, process, and people implications of MDM will be absolutely required to ensure that the introduction of mobile devices will not compromise security,” says J.R. Santos, Global Research Director of the CSA. “While most companies already have security policies in place, those policies need to be reviewed and possibly updated to account for the many components of mobile technology that we have identified in this report.”
At a glance, the 17 elements are:
2.) Risk Management
3.) Device Diversity/Degree of Freedom
4.) Configuration Management
5.) Software Distribution
6.) Enterprise AppStore
7.) Content Library
10.) Device Policy Compliance and Enforcement
11.) Enterprise Activation/Deactivation
12.) Enterprise Asset Disposition
13.) Process Automation
14.) User Activity Logging/Workplace Monitoring
15.) Security Settings
16.) Selective Wipe/Remote Wipe/Lock
17.) Identity Management/Authentication/Encryption
Thanks to cloud computing, your business data is everywhere and being accessed by everyone. Making the wrong decision to protect your data can result in high costs, increased risk and executive exposure. View this live webinar on cloud security and the evolving data center, and learn why a data-centric approach to security is the best bet for today's virtual environment.
- Redefine Business Portability
- Prevent Mobile Devices from Loading Dangerous Code
- Expanding Your Security Perimeter: Common Sense for Navigating Today's Threat Landscape
- Fighting Fraud Videos: IBM Intelligent Investigation Manager
- IBM Intelligent Investigation Manager: Online Product Demo
- Webinar: IBM IIM for Fraud, Abuse and Waste in Government