Mobile Security Strategy Best Practices

Presented by

Brian Duckering, Sr. Mobile Security Specialist, Symantec

About this talk

As enterprises begin to recognize the need for greater visibility into mobile threats and are increasingly pressed to protect their organizations from such threats, primary concerns still seem to be focused around what threats a solution can identify – malware, phishing, network attacks and much more. While this is a starting point, there are other elements, characteristics, and abilities that have a far greater impact on the protection of an organization’s sensitive assets, information, and data that are not discussed often enough. Join Brian Duckering c and Jeff Louisma as they explore the less-discussed topics of a mobile security strategy that everyone should understand – before it’s too late. • Focus on high user acceptance rates - poor adoption rates can make a good solution worthless. • Provide security on managed & unmanaged devices - equally effective security should be available for mobile devices and use cases. • Protection of sensitive data and systems should take place in real time - relying on third-party solutions or human intervention could be too late. • Resource demand should be minimal - maintaining and updating the solution should be efficient and require minimal resources.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (426)
Subscribers (77924)
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure. We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.