Enterprise Security Trends Blog | HP Blogs
Keep up with the latest cyber, consumerisation, collaboration and cloud enterprise security trends from the team of HP information security professionals.

Enterprise Mobile Security - Presenting to the IISP

by Paul Schwarzenberger, MSc, CISSP, Enterprise Security Architect, HP

 

Yesterday evening I gave a talk on the subject “Enterprise Mobile Security” to the London chapter of the Institute of Information Security Professionals – IISP for short. I talked about the business drivers towards the growing use of mobile devices and consumerisation, security risks, and the requirements for securely enabling the use of business apps.

 

Mobile Device Management Device Profile

Android smartphone with mobile anti-malware

 

I demonstrated a couple of example solutions which can address some of the security risks:

 

  • Application access from an iPad to a corporate network, using SSL VPN and certificate authentication, so that the connection experience is automatic and invisible to the user
  • Anti-malware solution for Android smartphones, combining the use of a mobile device management system to monitor and help identify malicious applications, with an anti-virus client for Android

The presentation (excluding the demos) can be viewed here:

http://www.slideshare.net/hpEnterpriseSecurity/enterprise-mobile-security

 

My talk was followed by “Defending your turf: what does it take to protect data in a mobile workforce” presented by Nader Henein from the Blackberry Security group at Research in Motion.

Comments
BernardS(anon) | ‎07-02-2012 08:06 PM

It is very important to protect your mobile device from security threats and attacks.  Encryption tools are available to protect many different areas such as your calls, messaging and downloads.  Many people do not realize that their mobile devices can get viruses just like their home computers can,

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the community guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
About the Author
After graduation from Oxford University, Paul developed laser technology for NASA satellites, before moving into IT Security at Cable & Wire...
About the Author(s)
  • Manage cyber engineering & architecture team developing security services, security reference architectures, big data security, mobility, cloud, cyber situational awareness and security operation center solutions. Responsible for developing innovative cyber solutions across public sector accounts. Collaborates with HP Labs, HP CTO Organization, product groups and third-party vendors to leverage innovative technologies to deliver the next generation of cybersecurity solutions.
  • A business first, senior executive, with over 20 years of hands on experience in defending banks, governments and corporations against cyberwarfare. My career in security started when I was employed to crack a secure system, which had locked down the boot process, whitelisting of applications and encrypted disks. I linked TeamOffice (an ICL email and collaboration system) with Microsoft Word to send an email which allowed me to do anything the person reading the email could do and send the results back to me, all without there knowledge. Having proved this vulnerability, I worked with Peter Simpson to create Defuse, a tool that blocked inappropriate actions. This successfully blocked Winword Concept, the first known malicous code in the wild. From these begginings I have investigated all aspects of security to provide an holistic approach to security as a business enabler and currently advising organisations on the suitability of the cloud to their needs.


Follow Us