Page 12 - Mobile Data Loss
P. 12

6     Mobile Data Loss

          to your security strategy’s success. It can be outlined in policies dis-
          played when they register their device, as well as in a management app
          with visual privacy through which they can view this anytime. Taken
          from a company with a hugely successful mobile security program
          “We do not want to see what you do, but make what you do safer.”




          SUMMARY
          In summary, an enterprise mobile security strategy should encompass
          the User, Apps, Device, and Network. This goes beyond the device
          and beyond EMM, and encompasses a holistic mobile security design.
          In the next chapter we’ll dive deeper into the mobile threat landscape
          and the impact of these threats on enterprise mobile data loss. This
          will provide the basis for outlining countermeasures for existing threats
          as well as future ones, and provide a baseline for protecting enterprise
          mobile data.

             It’s important to note that your enterprise mobile security strategy
          will not become a dusty security policy meant to cover mobile
          security for the next 10 years. Instead, your mobile enterprise security
          strategy will develop into an iterative security framework that
          requires analysis and refinement over time. The goal is a more
          defensive approach to protect your enterprise data with the enhanced
          security and features provided by mobile, and incorporate lessons
          learned from the plethora of PC-related breaches of the last few
          years. Mobile has introduced more secure options to protect your
          enterprise data; features that adapt to the new world of data sharing.
          The risks and threats may be evolving, but so are the counter-
          measures. Welcome to the mobile era of security.
   7   8   9   10   11   12   13   14   15   16   17