Enterprise endpoint and mobile security management wait for no one

Last updated:April 2014

Editor's note

endpoint security management

Admins can no longer worry just about keeping desktops up to date; laptops, smartphones and tablets bring a host of new security concerns into the enterprise. This guide compiles tips on how to address endpoint management and mobile security with available tools and policies.

1Tools for mobile devices proliferate as vendor shakeups continue

Enterprise mobility management must not only include end-user devices and apps, but also the software used to provision, monitor and secure various endpoints. Fortunately, there is a host of offerings to choose from, but be aware that tools for endpoint management are changing as vendors gobble up one another and strive to keep up with changing corporate needs. Both admins and users will recognize incarnations of Windows and Office for mobile devices, where Microsoft is competing with other OSes and suites. Virtualization and cloud computing also add options to the mix.

2Don't get left behind as mobile security management evolves past the desktop

Once IT professionals evaluate their organizations' mobile usage patterns, they can begin work to protect important assets. Most enterprise mobility management products include some form of endpoint security, but one should never rely on a single approach. Built-in security settings in Group Policy, third-party products and hardware controls are available. To centralize administration and cut costs, some companies may opt to outsource mobile security management to a Security as a Service provider. See the potential downside of Security as a Service, as well as why you should remember data and people when planning for mobile security management.