CESG Recommendations: Implementing Secure and Compliant Enterprise Mobility
CESG has recently published the End User Devices Security Guidance: General Security Recommendations listing 12 general security recommendations for mobile end user devices working with OFFICIAL information, each of these areas must be considered when deploying a solution.
Mobile devices, especially smartphones, are highly vulnerable to security breaches. They:
- Are easily lost
- Can be filled with unknown applications
- Frequently communicate over untrusted networks
- Are often purchased by users without consideration of IT standards and security requirements
Enterprise Mobility Management (EMM) systems can help mitigate these vulnerabilities and ensure smartphones, laptops and tablets are configured to meet the Government’s End User Device Security Framework.
This latest paper considers each of the twelve CESG General Security Recommendations and how implementing an EMM platform can help address them.
Submit your details below to access this paper and discover how you can successfully protect your organisation from any risk associated with deploying mobile devices: