A second approach is to develop your mobile policies completely from scratch after you bring in your LDAP. Each smart phone then has its own virtualized firewall instance on the server.
An administrator manages the devices through a console. You can do things like configure filtering to prohibit the device from going to categories of websites such as adult, gambling or social media; blacklist applications you don’t want people to use or install; filter mail for viruses and spam; and much more. The administrative tools look very similar to a regular firewall admin product. This helps reduce the learning curve for the administrator.
M.A.D. also has remediation services so you can detect what users are doing that could violate policy. Detection takes place within seconds and an administrator can take any number of prescribed actions based on policy; for example, sending a warning to the user or wiping the disk of sensitive data.
A critical aspect of the M.A.D. solution is that it offers time based security and geo-location based rules. For example, an activity that is perfectly acceptable on a weekday between 8 A.M. and 5 P.M. might be forbidden on weekends or after hours. Or, a device can be used or an activity can be permitted within a specific location range. For instance, it’s OK to access a corporate application while the user is within the U.S., but this action is prohibited if the device is used in China.
As corporations enable more and more true enterprise applications via mobile smart phones and tablets, the need for tight security on these devices will grow. Mobile Active Defense has a non-intrusive solution that mirrors in the mobile world what you’ve already built for your fixed environment.
Sign up for MIS Asia eNewsletters.