Project Overview

Smart phones and tablets have very similar features and security vulnerabilities as desktop and laptop computers. All have full email and Internet browsing capabilities along with large storage capacities. These devices were being deployed and used for business purposes within our customer’s business without sufficient control over their critical data.

Business Exposure

Our customer was facing productivity problems, possible down time due to viruses, and an increased risk of breach of PII.

Project Objective

Establish a centralized system to ensure that all smart phones use required security settings, are properly configured, up-to-date, and compliant with company policy. Also establish measures to prevent unauthorized alteration of devices which may circumvent the security and expose sensitive information.

Business Benefits

Improved our customer’s staff availability, device security, and data privacy.