Published: 19 November 2019
Summary
Threats to mobile applications and devices pose security risks to global enterprises. Security and risk management technical professionals responsible for IT security, especially in organizations with high security or compliance needs, must have an in-depth strategy to defend mobile devices.
Included in Full Research
- Prework
- Step 1.1: Build a Mobile Risk Profile
- Step 1.2: Classify Data Requirements for Mobile Devices
- Step 1.3: Gather Business Requirements From Key Stakeholders (Mobile Applications, Mobile OS and Carrier Specifications)
- Step 1.4: Build Out Mobile Security Education and Awareness Training
- Phase 2: Build Mobile Security Strategy
- Step 2.1: Define Minimum OS/HW Requirements
- Step 2.2: Define UEM/EMM Requirements
- Step 2.3: Set Encryption and Configuration Standards
- Step 2.4: Determine Container Requirements
- Step 2.5: Set Minimum Device Authentication Requirements
- Step 2.6: Define MTD Requirements
- Step 2.7: Define Network Protection
- Step 2.8: Evaluate Mobile Application Security Requirements
- Step 2.9: Determine Mobile Secure Communication Requirements
- Step 2.10: Select Mobile Security Solutions and Fill Out Matrix
- Follow-Up