As mobile devices become more prevalent in the work place they are causing profound changes in how organizations protect themselves. Are you prepared?
Companies can no longer ignore the growing demand for diverse mobile devices in the work place, and it is a complex task to understand and evaluate security concerns around these products. NCC Group can guide you through the process of determining your organization's risk tolerance for your data and identifying appropriate security controls on the array of current mobile devices in use by today's mobile workforce. This includes policies and procedures for mobile email access, document repositories, password and device encryption, lost or stolen devices, device deprovisioning, and general device security settings. We pride ourselves in taking a product and vendor agnostic approach to give an unbiased view on current marketplace solutions.
We have assisted many product and application vendors in demonstrating their commitment to security not only to their management but also to their clients. Such engagements normally span multiple phases, including:
- Threat Modeling
- Penetration Testing (network & application)
- Architecture Reviews
- Source Code Reviews
- Server Configuration Reviews
We also support you in any post-assessment communications necessary to help present the strongest security posture of your solution to your customer.