{"id":4861,"date":"2015-12-01T19:28:02","date_gmt":"2015-12-01T19:28:02","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4861"},"modified":"2020-02-27T04:00:07","modified_gmt":"2020-02-26T17:00:07","slug":"making-mobiles-less-elusive-in-the-corporate-network","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/making-mobiles-less-elusive-in-the-corporate-network\/4861\/","title":{"rendered":"Making mobiles less &#8216;elusive&#8217; in the corporate network"},"content":{"rendered":"<p>Today we\u2019ll talk a bit more about how our software protects businesses and helps their IT security staff. Let\u2019s take a look at those \u201celusive\u201d mobile devices.<\/p>\n<p>Smartphones and tablets help workaholics a lot. They now work everywhere: at the office, at home, in a traffic jam, or on vacation. The problem is that besides the working files, they also have personal data and apps on the same devices, installed from unknown sources. That\u2019s a data leak in the making.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Making mobiles less \u2018elusive\u2019 in the corporate network #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FvD2f&amp;text=Making+mobiles+less+%26%238216%3Belusive%26%238217%3B+in+the+corporate+network+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In larger enterprises where the employees use company-provided mobile devices, it\u2019s up to the company to ensure their security. And thus smartphones become an IT security staff\u2019s headache simply because there are lots of ways sensitive data may leak. How do you avoid data leaks if the person loses their phone? How do you conceal corporate e-mail and working files from outsiders? How do you make sure the employee only opens safe sites in their browser? What do you do if someone has \u201cborrowed\u201d the phone and there\u2019s no way to retrieve it?<\/p>\n<p>Kaspersky Lab has developed a solution based on <a href=\"https:\/\/www.kaspersky.com\/products\/business\/security-applications\/security-center\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security Center<\/a>, which makes IT staff\u2019s tasks lot easier.<\/p>\n<p>All you need to do is:<\/p>\n<ul>\n<li>Install <a href=\"https:\/\/www.kaspersky.com\/products\/business\/security-applications\/security-center\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security Center<\/a> \u2013 a single unified management console that makes it easier to manage and secure all your endpoints<\/li>\n<li>Deploy the mobile management package<\/li>\n<li>Set up the security policy required by the business<\/li>\n<\/ul>\n<p>Now let\u2019s go.<\/p>\n<p>First, we install the mobile antivirus. There\u2019s no other way given how much mobile malware is out there: In Q3 alone there were\u00a0323,374 new mobile malware examples.<\/p>\n<p>Then we set up the remote management that allows the admin to deploy the phone book, lock down the device if it is lost, filter out the web-content, or delete the data.<\/p>\n<p>Next, we forbid the installation or use of apps which aren\u2019t approved by the security settings. This is necessary so that the financial report isn\u2019t getting out to the cloud and Angry Birds aren\u2019t preventing the users from reading e-mails in time.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>In Q3 alone there were\u00a0323,374 new mobile #malware examples<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FvD2f&amp;text=In+Q3+alone+there+were%C2%A0323%2C374+new+mobile+%23malware+examples\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Then we encrypt the mail client and request the password every time the control is taken over. The e-mails aren\u2019t visible even from the file manager.<\/p>\n<p>And in order for Santa admin to know who has been a good boy\/girl this year and who hasn\u2019t, we\u2019re setting up the alerts if something violates security policies.<\/p>\n<p>It\u2019s okay now. We\u2019ve limited and secured employees\u2019 web-surfing. If the device is lost, the data will be erased. Crooks may bang their heads against the wall we\u2019ve raised, but they have no chance of getting through.<\/p>\n<p>And if some unprincipled colleagues would like to get away with the data, they\u2019re going to fail.<\/p>\n<p>In fact, the users themselves may dislike all of this. So it\u2019s better to explain what is it all about ahead of time, so that there are no surprises for employees.<\/p>\n<p>After all, only pre-established and unchangeable rules of the game are good enough, are they not?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We talk a bit more about how our software protects businesses and helps their IT security staff. <\/p>\n","protected":false},"author":674,"featured_media":15323,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[36,218,2360],"class_list":{"0":"post-4861","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-malware-2","10":"tag-mobile-security","11":"tag-security-policies"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/making-mobiles-less-elusive-in-the-corporate-network\/4861\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/making-mobiles-less-elusive-in-the-corporate-network\/4861\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/making-mobiles-less-elusive-in-the-corporate-network\/4861\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/malware-2\/","name":"malware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=4861"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4861\/revisions"}],"predecessor-version":[{"id":26792,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4861\/revisions\/26792"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15323"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=4861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=4861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=4861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}