Cover Story
of
Security is Taking Centerstage when it comes to enabling convergence and bringing in the much needed mobility element within an enterprise
villages in o expand in
nts do you expansion
investment nsion across e untapped d the kind we have e services to e improving est in better
ataka circle h does this nal kitty? a Circle is evenue and ataka circle tor towards siness right erational. It here is a lot d bring out roducts for DOCOMO nse and has e customers
the strong e registered innovative n Karnataka as actually stomers. To hed services rab A Song; op shop for ; Postpay e Rent Free ed CDMA ed with full s47; Newly galore and for Rest of ontinue to r customers and value
MOBILITY
Securing Mobility Space
I
ncreasingly powerful feature sets and rich functionality are driving the widespread use of mobile devices by banks, security and law enforcement agencies, government authorities and other security conscious organizations. Mobile workforces are taking advantage of mobile devices to remotely access confidential emails, spreadsheets, databases, customer data, order information, credit card data, medical history and patient information among other sensitive corporate data. Mobile devices are now the most vulnerable entry points for malware and other threats to the corporate network to which they are connected. Additionally, mobile devices are increasingly more dispersed geographically and at the MOBILITY
Mobility july2012.indd 15
forefront of operations in the field. So is sensitive corporate data safe in the mobile world? The potential security loopholes are increasing – as are the associated costs and liability! Will the next leak of sensitive information in your organization result from a stolen SD card? Or data transferred out of the device through USB or Bluetooth? Can you ensure that corporate email is being accessed only on authorized mobile devices protected by security policies and not just any device the end user can buy? Today’s CIOs are always asking questions like how to protect the end to end data. Protecting corporate data in transit over public Wi-Fi and cellular networks Encrypting data stored on device, making it available only to www.mobilityindia.com
authenticated users on your domain Disabling device communication modules and hardware features (e.g. camera, Bluetooth) Authenticating device users using Active Directory (Domain Security) credentials Authenticating mobile device hardware using certificates Enabling malware protection and intrusion detection Limiting end user’s access, preventing harmful Internet downloads and unauthorized software installation Proactively mitigating risk of data loss with efficient strategies for dealing with lost and stolen devices. According to the mobile market review for the first quarter of 2012 conducted by Cyber Media Research the shipment of smart-phones rose by 17.4% as compared to last year. With mobile security being a July 2012 | 15
7/29/2012 2:14:35 PM