Securing the Mobile Enterprise: Part 6

As smartphones extend the boundaries of the enterprise network, it’s clear that a ‘whack-a-mole’ mobile security strategy, focused on dealing with the security issue of the day, won’t be enough. There must be a less reactive, more pre-emptive strategy for protecting the mobile perimeter.

However, the breadth and complexity of the enterprise environment, coupled with the increasing, constantly changing mobile security risks and compliance demands, makes implementing, managing and updating a mobile security solution a challenge.


Mobile Security Pain Points:

1.  Increasing mobile security risks

2.  Constantly changing compliance demands

3.  No ‘quick fix’ packaged solutions for end-to-end, defense-in-depth security

4.  Limited availability of mobile security expertise

Further, there are no ‘quick fix’ packaged solutions available today that can provide end-to-end defense without a high level of security expertise behind it to help ensure the enterprise is protected.

Moving Forward

The continual commitment of time, resources and funds necessary for 24x7x365 vigilance may make companies attempt to slow smartphone adoption at a time when productivity tools are needed the most to boost the bottom line in a tough economy.

For all these reasons, companies should explore working with a service provider who is experienced in delivering security solutions. The right provider will be able to combine demonstrated security expertise and the latest security features with a global, network-centric security approach that helps ready the organization for the onslaught of mobile attacks ahead.

Potential Benefits of a Mobile Security Service Provided:

1. Strategic relationships in mobile industry for an integrated end-to-end solution

2.  Costs spread across many customers

3.  Zero-to-low capital investments and minimized operational costs

4.  Large support staff to keep solutions up to date

5.  Greatly simplified security implementation

For companies needing faster implementations, zero-to-low capital investments and minimized operational costs, outsourcing the mobile security infrastructure to a service provider can be a wise solution.

A large support staff is also on hand to help keep solutions up to date, which can greatly simplify security implementation and thereby potentially help increase network uptime.

Sensitive company information can be protected with an information-centric security approach.  This is something to consider when formulating your overall security plan.


The tipping point is near: As hackers continue to find innovative ways to attack, the security industry will need to find equally innovative ways to challenge them so it can help protect the enterprise.

By setting and enforcing firm policies, adhering to best practices and taking advantage of emerging technologies for end-to-end mobile security management, employees can have a more protected work environment and IT can have more visibility into – and control over – security threats.

Finally, by working with the right service provider, companies can reduce the complexity involved in managing security risks, while they potentially better protect their intellectual property, their brand and their good name.

For further reading on Mobile Security you can see my previous posts on this series here.

So what do you think?  What factors are most important to consider when implementing your overall network security?  What has worked well in the past?  What do you see as the most vulnerable areas of security?  Your comments will be most helpful to others.
The Networking Exchange Blog Team About NEB Team