Smart phones and tablets have very similar features and security vulnerabilities as desktop and laptop computers. All have full email and Internet browsing capabilities along with large storage capacities. These devices were being deployed and used for business purposes within our customer’s business without sufficient control over their critical data.
Our customer was facing productivity problems, possible down time due to viruses, and an increased risk of breach of PII.
Establish a centralized system to ensure that all smart phones use required security settings, are properly configured, up-to-date, and compliant with company policy. Also establish measures to prevent unauthorized alteration of devices which may circumvent the security and expose sensitive information.
Improved our customer’s staff availability, device security, and data privacy.