Mobile Security with AT&T Mobility

With today’s proliferation of mobile devices, remote work locations, and cloud based apps, new cyber security threats are on the rise. Watch this video to learn about Distributed Denial of Service (DDoS) attacks, intellectual property attacks, and more. Learn how AT&T Network Security solutions can help protect you and your customers from cyber security threats.

A company should look at three areas to embrace a multi-layered security model that integrates existing solutions with new mobile-focused solutions.

1. Review existing security threats. 

The operating system, version, and patch status of the device are several items that should be checked before a mobile device connects into your network and applications. Virtual Private Network (VPN) access to data will mitigate some but not all of the risks. Enterprise Marketing Management (EMM) software minimizes device level risk and certain application level risks, but IT must be careful to ensure that the EMM software doesn’t provide an onerous security experience.

2. Remediate and refresh existing security solutions. 

Businesses should define degrees of risk and match the security solution to the data’s risk profile. These solutions should secure specific applications and content while separating business data from personal data and applications. Companies also need their security solutions to assist with Wireless Local-Area Network (WLAN) access, device onboarding, device health checks, mobile application distribution, and update management. A company should integrate its existing AAA infrastructure and policy management solutions with its EMM mobile solutions. These solutions should help a company bridge existing identity and network access control solutions and provision personal mobile devices with VPN settings, certificates, and trust details.

3. Reinvent your security strategy with context.

Security policies should use application, user identity, role, content type, time of day, location, device type, and device state to control network access to applications and data. In this phase, companies will also build a strategy for multi-factor authentication. Local area network context and device context (including wearables) will enhance existing authentication solutions.

By considering, checking, and implementing these three main steps, you will help ensure your mobile security 24/7.  Symantec issues a monthly intelligence report, that provides the latest analysis of cyber security threats, trends, and insights on malware, spam, and other potentially harmful business risks. It can be found here.


About admin

Wireless Consultant "One Stop Wireless"
This entry was posted in Applications, AT&T, One Stop Wireless Shop, Smartphone, Tablets, Wireless Consultant and tagged , , , , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *