Part #6: 5 Principles for Choosing the Right Mobile Security Solution

Subscribers:
79,800
Published on ● Video Link: https://www.youtube.com/watch?v=Nb4uDy2eQ3s



Duration: 7:01
1,968 views
16


The sixth episode focuses on the most important principles for choosing the right tool for your organization’s mobile security. Watch all the episodes here: https://www.checkpoint.com/security-admins-guide-to-secure-remote-workforce/

Mobile devices have three key vectors of attack: the operating system and the device, the apps, and the network, so when you look at a mobile security solution there are some key aspects you have to take into consideration. From visibility and UX to the privacy approach, this episode will teach you everything you need to know before you choose your mobile security solution.

The principles include:
• 360º protection of all attack vectors - Mobile devices have three key vectors of attack: the device’s operating system, the apps, and the network. Any mobile device security solution that you are evaluating must demonstrate robust capabilities for securing each of these three vectors.
• Full visibility into the risk level of the mobile workforce - the optimal mobile security solution should have an easy to manage cloud-based dashboard that provides IT admins with full visibility into incoming threats as well as into the risk posture of mobile devices.
• Flexibility for easy integration, deployment, and management - the mobile security solution that you select must be able to support every device type, operating system, and device-ownership model.
• Maximizing the user experience - the optimal solution should not impact device usability, the browsing experience, data consumption, nor battery life.
• Privacy by design - employee privacy must always be guaranteed.

Download the SandBlast Mobile Solution Brief: https://www.checkpoint.com/downloads/products/sandblast-mobile-solution-brief.pdf