Regístrese ahora para una mejor cotización personalizada!

Noticias calientes

The Fourth Step to Enterprise Mobility: Create an App Checkpoint

Sep, 04, 2013 Hi-network.com

This is the fourth post in a blog series featuring Vine-format videos focusing on the"Six Essential Steps for Unleashing the Power of Enterprise Mobility".The first blog post discussing how to build a mobile structure can be foundhere. The second blog post highlighting the benefits going virtual can be foundhere. The third blog post focused on preparing enterprises for the division of devices can be foundhere.  

For today's app-centric mobile workforce, it's no longer enough to provide basic security features for devices. Gone are the days where security for mobility is "all or nothing" where virtual private networks (VPNs) gave you access to all corporate network resources, or you had very limited email and calendaring access.

Today, enterprises are managing public and private mobile applications that require a shift in security practices and a new application strategy. Here's a short checklist to guide enterprises as they create app checkpoints to meet new security demands:

To watch the video, see: http://youtu.be/dpQ5_n6FoX4

1. Look for a rapid, reliable, and secure vetting process for applications. 

IT security teams are usually directed toward securing the network and the devices connected to it, versus securing the applications that run on those devices. Many organizations lack the resources to evaluate an application's ability to handle sensitive information throughout its lifecycle.

Companies rarely have the resources to monitor sites that could breed malware, nor do they have the ability to maintain heuristic algorithms to identify such sites prior to infection. And those that decide to secure mobile apps themselves might end up having to prioritize remediations, leaving them vulnerable.

One way to secure the vetting process for applications is to host an enterprise app store. The app store needs to go beyond basic malware protection to include mobile threat management, risk intelligence, data loss prevention, and vulnerability tracking. Look for more than a red light/green light approach to the vetting of mobile apps. The enterprise app store should vet apps using enterprise security policies and business rules that meet your specific business needs.

2. Seek guidance to determine which apps will be mobile, virtual, and/or hybrid.

As more enterprises develop and deliver mobile business apps, it will be important seek guidance from professional services to determine which apps will be mobile, virtual, and/or hybrid. Meeting with professionals in this field will ensure proper security measures are taken to handle the various apps available on the market today.

For more information about creating an application strategy and additional steps to consider, check out this Cisco whitepaper, "Six Essential Steps for Unleashing the Power of Enterprise Mobility." Stay tuned for my next post that will discuss the fifth step enterprises can take to unleash the power of mobility.


tag-icon Etiquetas calientes: movilidad Móvil móvil Red red Wi-Fi Wi-Fi Wi-Fi BYOD wireless bring your own device mobile device enterprise mobility

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.
Our company's operations and information are independent of the manufacturers' positions, nor a part of any listed trademarks company.