Solutions

mobile-security

Mobile security represents growing security area, its growth caused primarily by the growth in sales of mobile devices (smartphones, tablets, notebooks) and existence of BYOD. Attacker primarily focus on the fastest growing market. Is is necessary to acknowledge, that these devices by their computing power and parameters not only level with standard office computers, but in many cases even beat them. Fir this very reason it must be noted, that the security measures applied to traditional devices in reference to technologies, ways of deployment and structure have to be applied to mobile devices as well. The high diversity of OS and models of devices make this task even tougher.

All mobile devices have in common:

  • Commonly connect between company network and public network and in most cases bypass central gateway and its security policies
  • Contain company data and access information to company network
  • Vendors limit access of third party to certain applications and functions

Mobile Security can be divided in two separate areas:

  • Mobile device management (MDM)
  • Mobile device security (MDS)

These areas quite often overlap and complement each other using the option provided already by the device vendor.
 
Mobile device management (MDM)
This area most commonly includes:

  • Devices inventory
  • Automated distribution and management of policies
  • Application management
  • Reporting
  • Remote Lock, Remote Wipe, Device Track, Encryption

Mobile device security (MDS)
This area most commonly includes:

  • Antimalware protection
  • Malicious web site protection
  • Firewall and attack detection
  • Application security evaluation
  • DLP
Would you use PC without firewall and antimalware protection? If the answer is NO, then we have a solution for You:

More solutions

bvs

Read more

ids/ips

Traditional Firewall solutions provides only a necessary first line of defense, but in today's IT are ineffective. Nwe attacks make use of weaknesses and failures of specific programs and applications.

Read more

web-application-firewall

Web Application Firewall protects Web sites and Web applications from attackers who exploit vulnerabilities applications or protocols to steal data or to change the appearance of the organization's website.

Read more

email-security

Modern malicious programs or malware, include viruses, worms, Trojans and spyware are most common way for attack through e-mail.

Read more