CESG Recommendations: Implementing Secure and Compliant Enterprise Mobility

CESG Recommendations: Implementing Secure and Compliant Enterprise Mobility

CESG has recently published the End User Devices Security Guidance: General Security Recommendations listing 12 general security recommendations for mobile end user devices working with OFFICIAL information, each of these areas must be considered when deploying a solution.

Mobile devices, especially smartphones, are highly vulnerable to security breaches. They:

  • Are easily lost
  • Can be filled with unknown applications
  • Frequently communicate over untrusted networks
  • Are often purchased by users without consideration of IT standards and security requirements

Enterprise Mobility Management (EMM) systems can help mitigate these vulnerabilities and ensure smartphones, laptops and tablets are configured to meet the Government’s End User Device Security Framework.

This latest paper considers each of the twelve CESG General Security Recommendations and how implementing an EMM platform can help address them.

Submit your details below to access this paper and discover how you can successfully protect your organisation from any risk associated with deploying mobile devices:

If you see this, leave this form field blank and invest in CSS support.
Your Details (* denotes required field)

Non WiredGov Registrants: Please fill in all the required fields below.

WiredGov Registrants: Simply login here to automatically fill the fields with your information. Alternatively you can fill in the required fields manually.

Share this campaign

MobileIron