Securing Mobilite Users
Multi-layer strategy secures your mobile solutions
Providing mobile access to corporate information increases productivity and is a vital part of today’s business but it can make you vulnerable to attack. NextiraOne’s service-led approach to security protects every aspect of your mobility solution.
Our multi-layer approach to security addresses mobile devices and infrastructure, implements an efficient management regime and develops specific security policies.
A multi-layer strategy secures the different building blocks of mobile solutions used by business today:
Mobile device protection
Implementing a mobile device security strategy minimises the risk of losing corporate information when a mobile, laptop or PDA is compromised.
- Data encryption
- Malware protection
- Remote locking messages
Secure data transmission
Conventional VPNs take advantage of Internet connectivity to provide encryption and authentication, addressing the lack of security on the open Internet. Mobile workers can establish VPN tunnels (IPSEC or SSL) from their mobile device to a VPN gateway using any IP-based connection ( based on WIFI, GPRS, or 3G). The VPN tunnel lets mobile workers connect securely to the corporate network and access internal information and applications.
An appropriate Demilitarized Zone (DMZ) architecture, combined with application firewall, proxy, Intrusion Detection Systems or Intrusion Prevention Systems (IDS/IPS) technologies and complementary patching and monitoring, will give the highest level of security an application may require.
Implementations of reverse proxy which include a web application firewall for the protection of voice attacks and will ensure strong security for the voice traffic.
All mobile devices connected to the corporate network or containing corporate data must be part of a tight and stable security policy. The establishment of a back-up policy and the installation of remote data wiping software are the first steps to a proactive management regime.
Specific Security Policies
An appropriate mobility solution depends on the profile of the end-users but must include a rigid policy for lost or stolen mobile devices. By reporting the loss to the proper department and to the carrier for immediate deactivation, corporate data can be wiped or locked using pre-loaded remote wiping and/or disabling software.
NextiraOne has already helped companies in every sector from finance to government by defining and implementing security policies to complement their mobile roll-out