Cisco Logo


Mobility

This is the fourth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual can be found here. The third blog post focused on preparing enterprises for the division of devices can be found here.  

For today’s app-centric mobile workforce, it’s no longer enough to provide basic security features for devices. Gone are the days where security for mobility is “all or nothing” where virtual private networks (VPNs) gave you access to all corporate network resources, or you had very limited email and calendaring access.

Today, enterprises are managing public and private mobile applications that require a shift in security practices and a new application strategy. Here’s a short checklist to guide enterprises as they create app checkpoints to meet new security demands:

Step 4

To watch the video, see: http://youtu.be/dpQ5_n6FoX4

1. Look for a rapid, reliable, and secure vetting process for applications. 

IT security teams are usually directed toward securing the network and the devices connected to it, versus securing the applications that run on those devices. Many organizations lack the resources to evaluate an application’s ability to handle sensitive information throughout its lifecycle.

Companies rarely have the resources to monitor sites that could breed malware, nor do they have the ability to maintain heuristic algorithms to identify such sites prior to infection. And those that decide to secure mobile apps themselves might end up having to prioritize remediations, leaving them vulnerable.

One way to secure the vetting process for applications is to host an enterprise app store. The app store needs to go beyond basic malware protection to include mobile threat management, risk intelligence, data loss prevention, and vulnerability tracking. Look for more than a red light/green light approach to the vetting of mobile apps. The enterprise app store should vet apps using enterprise security policies and business rules that meet your specific business needs.

2. Seek guidance to determine which apps will be mobile, virtual, and/or hybrid.

step4b

As more enterprises develop and deliver mobile business apps, it will be important seek guidance from professional services to determine which apps will be mobile, virtual, and/or hybrid. Meeting with professionals in this field will ensure proper security measures are taken to handle the various apps available on the market today.

For more information about creating an application strategy and additional steps to consider, check out this Cisco whitepaper, “Six Essential Steps for Unleashing the Power of Enterprise Mobility.” Stay tuned for my next post that will discuss the fifth step enterprises can take to unleash the power of mobility.

Comments Are Closed

  1. Return to Countries/Regions
  2. Return to Home
  1. All Mobility
  2. Return to Home