Mobile Device Security Workshop

advertisement
Mobile Device Security Workshop
Technology Makes it Possible. WWT Makes it Happen.
EXECUTIVE OVERVIEW
There is no pause in sight for the rapid employee adoption of mobile devices,
including tablets and smart phones. In order to stay in front of this trend, your
organization should be focused on two potential consequences:
•
•
BENEFITS
Your organization will
establish a framework for
managing the growing
presence of corporate and
personal mobile devices
within your environment:
1.
Identify Devices Present
2.
Understand Security Concerns
and Measures Available to
Address Mobile Device
Security Challenges
3.
Scope Support Requirements
as Part of a Mobile Device
Policy
4.
Develop a Roadmap to
Address Action Items Related
to your Mobile Device Policy
Security concerns ranging from data breaches and cyber-attacks to
malware and viruses unique to devices and mobile platforms.
Device support factors, including IPV6, 802.1x and general network
capacity to handle increased traffic loads.
World Wide Technology (WWT) developed its Mobile Device Security Practice to
address the issues associated with managing the presence of a broad range of
devices operating within today’s enterprise technology environment.
Through a combination of workshops and solution demonstrations, our multilayered approach is designed to assist your organization in mitigating risks by
providing a Mobile Device Security Reference Architecture, which includes:
•
•
•
Mobile device policy creation and enforcement.
Mobile device management structure, asset identification and
segmentation.
A data loss prevention plan and mobile Web security program.
Beginning with its Mobile Device Security Workshop, focused on developing a
Bring Your Own Device (BYOD) security policy model, WWT will assist your
organization in developing an overall strategy to address and plan for the range of
issues related to the rampant growth in mobile device usage.
OBJECTIVES
The Mobile Device Security Workshop is a two- to four-hour technical whiteboard
session. It begins with a discussion of mobile security topics, including current
BYOD status, wireless architecture and secure identity and endpoint management.
The objective is to produce a working conceptual overview of how your
organization can secure and manage mobile workloads in your existing platform,
or plan for changes to your environment to accommodate your needs. We will
explore how you can:
•
•
•
Increase visibility into your environment as it relates to mobile device
usage and required support for protocols such as IPV6 and 802.1x.
Determine steps to mitigate risk from a security standpoint, including
identifying vulnerable configurations based on NSA best practices.
Technical recommendations for achieving your prospective mobile
security goals, including potential wireless surveys to scope proper
infrastructure.
Page 2
Mobile Device Security Workshop
METHODOLOGY
WWT follows a consistent methodology for all service engagements, including
workshops, assessments and professional services.
World Wide Technology, Inc.
(WWT) is an award-winning
Systems Integrator that
provides innovative
technology products, services
and supply chain solutions to
customers and suppliers
around the globe. Learn more
at www.wwt.com.
Our advisory services, provided during the Plan and Design phases of our
methodology, are delivered by experienced Technical Solution Architects (TSAs)
with hands-on knowledge of wireless, security and mobile device technologies.
Our PDIO approach provides a clear roadmap regarding what you can expect in
working with WWT and helps to ensure the success of your mobile security
project. Next steps may include a technology assessment, solution
demonstration, proof-of-concept or development of a client-specific design.
WWT’s solutions-based, holistic approach leverages best-of-breed technology
based on your business or mission needs and existing infrastructure.
WWT’S TECHNOLOGY PARTNERS
WWT is uniquely qualified to help you address the technical and business
requirements of Mobile Device Security Architecture. By incorporating a holistic
approach to wireless/wired network design, coupled with innovative solutions
for mobile device security, WWT provides a comprehensive solution portfolio
focused on deploying and securing mobile devices for large enterprise
customers.
WWT has the depth of knowledge and a demonstrated track record of deploying
and supporting a diverse portfolio of solutions. Moreover, WWT’s Professional
Services Engineers, Consulting Service Engineers, Wireless and Security
Architects provide end-to-end support leveraging a combined 400 industry
certifications from the following OEMs:

Cisco

Citrix

Microsoft

EMC/RSA

Apple

360 GRC

Blackberry

Mobile Iron

NetApp

McAfee

Fluke/AirMagnet

VMware
GET STARTED TODAY
Call 800.432.7008 to join the growing number of global business leaders
benefiting from World Wide Technology’s technical expertise, industry-leading
partnerships and award-winning customer service.
Learn more at www.wwt.com.
Download