"If we are talking about corporate devices, and most of our customers have corporate laptops and many have corporate mobile devices, it is implied that remote secure access systems and mobile device management systems have already been installed on them. In this case, all the problems are solved and there are no risks described above. Deploying such solutions allows you to include remote devices in the security perimeter and fully control everything that happens to them. If there are no such systems, then you need to urgently deploy them. Now many have taken the easiest path - they are installing some VPN client on user devices and a VPN concentrator inside their network. And it seems that all the issues have been resolved, but such seemingly obvious solutions can become a real headache for information security departments," Andrey Kondratyev is categorical.
"The BYOD concept is not new, and there are plenty of tools on the market today that allow for very effective information security management. For companies that have already implemented and are actively using these tools, almost nothing has changed. Companies that are forced to take this path only now will face the usual difficulties in such situations in choosing and implementing new solutions - advanced firewalls, MDM systems," Oleg Nosov is of this opinion.
purposes MERLION deployed "one of the most belize mobile database MDM solutions, but it is quite difficult to quickly deploy it on all the necessary devices in a short period of time. Therefore, first of all, we implemented a set of measures aimed at increasing security on the side of the internal infrastructure. For example, any possibility of exchanging files between the home PC and the office PC was disabled. In turn, employees were sent instructions for connecting to the corporate network."
According to Igor Stalbovsky, for these
-
- Posts: 542
- Joined: Mon Dec 23, 2024 3:13 am