Learning Guide

Securing mobile devices: A resource guide for solution providers

Security solution providers are often called in to help their customers get control of the proliferating population of mobile devices (including smartphones and tablets) in the enterprise. Whether the devices are employee-owned or endorsed by management, employees are commonly using mobile devices for business purposes, which puts the enterprise’s data and intellectual property (IP) at risk. By recommending and implementing mobile device security solutions, the solution provider provides valuable support to security-minded customers. 

Mobile security guide: Begin with mobile platform comparison
Creating a corporate mobile device security policy should begin with a mobile platform comparison of the platform strengths and weaknesses. This tip from Mike Chapple compares the Blackberry, iPhone and Android platforms based on device management, device encryption and GPS privacy to use as the foundation of a smartphone security policy.

Securing smartphones: iPhone security settings and deployments
The iPhone Configuration Utility is useful for securing multiple iPhones. In this tip, Mike Chapple recommends specific security settings and deployment methods. He explains how to use iPhone Configuration Utility from Apple to help customers create configurations that provide administrators with a tremendous degree of policy flexibility, as well as methods for deploying the configuration profiles to large numbers of iPhones.

A BlackBerry security policy that can be managed through BES will be far richer than policies natively supported by Android or even Apple iOS4 devices.
(Read more)

Mobile device security solutions: BlackBerry security
Mobile security expert Lisa Phifer outlines the many ways security solution providers can secure their customers’ BlackBerry devices.  She describes native security capabilities of the BlackBerry operating system, and opportunities for BlackBerry Hosted Service partners.

Securing mobile devices: Android security
Solution providers can help customers secure all their Android devices, whether company-provided or employee-owned. Lisa Phifer lists the tools and products that fit the bill. She details ways solution providers can take advantage of Android security capabilities such as mapping business need to Android capabilities, integrating Android devices into existing corporate infrastructure, and adding third-party email clients.

BlackBerry PlayBook security
Expert Lisa Phifer explains how to help customers with PlayBook Security, with specific action plans for VARs, consultants and BlackBerry hosted service providers. This tip also reviews BlackBerry PlayBook’s security features, and reveals future PlayBook enterprise features.

This is a great time to consult on iPhone and iPad integration and to be providing outsourced services for the platform. The adoption rate is currently outpacing the supply chain of professionals who can service end users.
(Read more)

Chapter excerpt: Details for implementing iPad and iPhone security policy
In this excerpt from Enterprise iPhone and iPad Administrator’s Guide, author Charles Edge covers iPhone security policy and third-party products for Apple device security. The chapter covers third-party tools that may be helpful in securing mobile devices including Virtual Smartphone Platform and Sentry from MobileIron, Afaria from Sybase Inc., TARMAC from equinox USA Inc., KACE appliances from Dell Inc., AirWatch from AirWatch LLC, and Casper Suite from JAMF Software LLC.

Interview: Spotlight on the Apple partner program
In this interview, Kevin Klein of 318 Inc. talks about his company’s strategies for securing customers’ iPhones and iPads.  He answers questions about using third-party products to augment Apple’s management offerings, and how to respond to customer’s questions about the security of Apple versus Droid or BlackBerry mobile devices.

 

This was first published in August 2011

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: