You are viewing our public content
You can sign in or register for additional services

Industry News

How to Implement Secure and CESG Compliant Enterprise Mobility - Latest Guide

How to Implement Enterprise Mobility in Compliance with CESG Recommendations....find out here

CESG has recently published the End User Devices Security Guidance: General Security Recommendations listing 12 general security recommendations for mobile end user devices working with OFFICAL information, each of these areas must be considered when deploying a solution.

Mobile devices, especially smartphones, are highly vulnerable to security breaches. They:

  • Are easily lost
  • Can be filled with unknown applications
  • Frequently communicate over untrusted networks
  • Are often purchased by users without consideration of IT standards and security requirements

Enterprise Mobility Management (EMM) systems can help mitigate these vulnerabilities and ensure smartphones, laptops and tablets are configured to meet the Government’s End User Device Security Framework.

This latest paper considers each of the twelve CESG General Security Recommendations and how implementing an EMM platform can help address them.

Click here to access and download the paper, along with the CESG guidance and discover how you can successfully protect your organisation from any risk associated with deploying mobile devices.

Date Posted
25/02/2014 16:56

Industry News

Business IT Support by: Trusted IT