Steps for Achieving Proper Mobile Security Governance

14.05.2009

Organizations may have well defined IT tools in place to manage enterprise systems (e.g., servers, networking and storage). As advanced mobile devices become increasingly used in business applications, their roles have been quickly shifting from email access to business-oriented transactions with back-end database systems (e.g. ERP, CRM and SFA). In the meantime, the growing business mobility is taking traditional IT boundary outside an organization's perimeter.

Organizations need to and user role-based data access and distribution. Strong password enforcement, including two-factor authentication (e.g. software token) for a particular user group for additional security, should be performed. Existing network-based segregation or zoning should be revised to be data centric and extended to mobile users and devices.

To avoid increased integration cost, and later challenges in software support and upgrade, organizations should plan a centralized device management solution at the time of device deployment, ideally to be directly integrated with existing IT systems for network, application, server and device. A number of advanced solutions exist today that can support multi-platforms on a centralized enterprise console. IT managers can achieve proactive controls over device usage, configuration setting, software update and security patching. In particular, remote password reset, device lock and wipe are necessary features in many cases. Such solutions should be deployed with little or no user involvement, easy integration with existing directory structure and good scalability for a large number of users with diversified devices and on different wireless networks.