top of page

Mobility Solutions
for State & Local Government

MobileThreats2.jpg

Form Factor.  Portable form factors make mobile devices susceptible to loss or theft.

 

Malicious or Risky Apps collect and share data such as personally identifiable information (PII) and device location with third-party advertising and analytics systems.

Data Loss Data can be lost through cloud services and productivity apps via open-in, copy, paste, and forwarding functions.                  

Device Tampering exploit OS vulnerabilities to jailbreak or root devices, bypass security, and install malicious apps from unauthorized app stores.  

Always-On Connectivity.  Mobile devices are hyper-connected and often access sensitive data over untrusted networks, increasing the risk of data loss through Wi-Fi sniffi­ng, rogue access points and man-in-the-middle attacks.

 

Security and Compliance

Today, mobile operating systems have a sandboxed file system and protected kernel, so traditional security threats present less of a concern. However, mobile technologies face three other types of threats: user-based, device-based, and network-based.

Threat vectors on mobile vs. PCs 

Sandboxed mobile operating systems are secure. Threats such as malware are mitigated by OS design. Preventing data loss on mobile requires focus on a different set of risk vectors.

How Is Your Mobile IT Modernization Progressing?  Chat With An Advisor Today!
 
Ask about our Mobility Starter Pack.
arrow&v

Form Fill Success! Here's to advancing your mission!

Mobility Starter Pack

 

designed for

State and Local Government Requirements

Mobility strategy whiteboard session

Assessment of existing mobile implementation

Mobile email plus policy integration         

Automated mobile threat remediation

Holistic monitoring of mobile IT environment

Implementation and training

bottom of page