CSA Report Identifies 17 Key Components for Effective Mobile Device Management
September 24, 2012
By Anil Sharma
, TMCnet Contributor
In its latest report on mobile device management, the Cloud Security Alliance (CSA) Mobile Working Group has identified 17 vital elements that are critical for organizations to consider for the full lifecycle security management of mobile devices.
The research report titled, ”Mobile Device Management: Key Components, V1.0” is one of six parts found within the upcoming, "Security Guidance for Critical Areas of Mobile Computing" report, items that are scheduled to be presented and discussed at the upcoming annual CSA Congress being held November 7-8, 2012 in Orlando, Fla.
In its finding, the alliance noted that with the growth in the number of applications, content and data being accessed through a variety of devices, mobile device management (MDM) has to extend beyond device management alone. And as IT departments are now fully responsible for company-owned devices, companies all over the world must look to adopt policies and practices to prevent any compromise in security.
“Mobile devices are becoming an integral part of corporate networks and as employees are increasingly using their personal device to access cloud-based applications and services, identity management is paramount in ensuring that this access remains secure,” said Patrick Harding, CTO, Ping Identity, in a statement.
Harding commented that by having the right identity management processes, enterprises can provide employees with secure and convenient access to cloud apps via single sign-ons from an array of devices.
“The CSA has taken important steps in identifying the key elements organizations need to consider before adopting a BYOD policy and we’re happy to see identity management recognized as a key piece,” he added.
While every company will have a distinct tolerance for risk and will adopt mobile technology in various ways, there are several fundamental components of MDM that have to be considered and incorporated into policy and practice. With each component falling into one of three major categories: software and hardware, inventory and security, the report provides implementation best practices as well as potentials risks with a “must have” or “optional” rating to help organizations better prioritize their security efforts.
“As mobile devices have become mainstays in the enterprise, an understanding of the full technology, process, and people implications of MDM will be absolutely required to ensure that the introduction of mobile devices will not compromise security,” concluded J.R. Santos, global research director of the CSA.
Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO West 2012, taking place Oct. 2-5, in Austin, TX. Stay in touch with everything happening at ITEXPO (News - Alert). Follow us on Twitter.