This paper explains the MDM strategies and what you have to do to ensure mobile security such as
1. Defining IT policies
2. Asset and Inventory management
3. Configuration management
4. Remote wipe and data encryption
5. VPN
6. Password policies
7. Tunnel gateway
8. Jail break detection
9. Malware protection
2. Mobile Device Management Strategy (MDM)
•MDM strategy creates a holistic view in managing devices and applications used by the enterprise that will allow IT teams to extend their ‘wired’ security strategy and policies to all devices, wherever they happen to be.
•The strategy will be directed to employ user-defined ‘rules’ mapped to specific policies that cost-effectively automate vital management and control tasks such as device configuration, asset management, software updates, backup/restore.
•Using Mobile Iron MDM solution, RapidValue will wrap mobile applications with the desired agents of MDM to support the below set of features through strong governance.
Over-the-air (OTA) Configuration
Troubleshooting & Reporting
Monitoring and Alerts
Integration Management
Internal App Store
Remote Software Distribution and Updates
Blacklist / Whitelist Applications
Manage Applications through Enterprise App Store (App Restore / Version Control)
MDM
MAM
3. Mobile Device Management Strategy (MDM)
•Defining Strong IT policies – Define and enforce policies in a granular, flexible way – e.g. apply different policies to different users and groups, according to their needs. Create mobile-specific policies that clearly define, among other things:
oHow the device will be deployed?
oWhat data will be accessible by mobile workers?
oWho can do what on company networks?
oWhat procedures will be implemented in the event of device loss or theft?
•Asset and Inventory Management – With either approach of ‘BYOD’ or ‘company-owned mobile device program’ asset management is critical for IT teams to manage the devices and prevent any security threat to the data in mobile applications. Through effective MDM profiling, RapidValue targets to segment and categorize the following:
oIdentify make and model of mobile devices, the operating system, version, and firmware release being used – for mobile devices, feature phones, smartphones, and tablet computers.
oSegmenting by job function, mobility requirements, geographic location, device type/class or any other criteria.
oManage and track devices remotely through location services or Over the Air (OTA) configuration.
•Configuration Management – Remote setup and configuration of mobile devices is an essential element of MDM for IT teams to manage access into applications and connection parameters.
oEnabling/disabling hardware capabilities such as GPS, camera, or Bluetooth or new application download.
oSecurely access and manage enterprise documents residing in a variety of content repositories, including SharePoint, email, messaging, and web browsing (proxy information).
4. Mobile Security Strategy
•Unlike personal laptops, mobile devices present a significant security risk for many organizations unless they are secured and managed.
•Since these devices/apps hold sensitive corporate data they should be as secure as information stored behind the firewall on the corporate network.
•To mitigate this risk, RapidValue will enable IT staff to control all aspects of mobile device security .
•This includes the ability to mandate passwords for mobile device users, encrypt data stores, and erase data from mobile devices remotely.
Malware Protection
Jailbreak Detection
Tunnel Gateway
Password Policies
Support VPN
Data Encryption (On-Device & OTA)
Remote Wipe
Inventory of Application downloads
5. Mobile Security Strategy
Key considerations for a mobile security strategy are:
•Authentication - Mobile device authentication and mandatory passwords are the easiest, most effective IT policies to enforce.
•Remote Locking/Wiping - Important mobile security element is the ability to remotely lock and/or wipe a mobile device that has been lost or stolen
•Encryption - File level, application level, or even full disk encryption can protect sensitive data in the event of a lost or stolen mobile device.
•Virus and other Malware Protection - Malware threatens information confidentiality, endangers system passwords, and increases the risk of data loss or compromise.