5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #2: In-Depth Risk Analysis

Share this blog

5 Must-Have Sections For Every Enterprise Mobile Security RFP - Must-Have #2: In-Depth Risk Analysis

Our second webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” looks at In-Depth Risk Analysis, and took place on June 26, 2019.  

Mobile devices are subject to risks that other enterprise endpoints are not. Mobile devices are now the de facto platform for productivity in business. Today, the traditional computing devices (e.g., servers, desktops and laptops) upon which enterprises have focused their security and compliance efforts represent only 40 percent of the relevant endpoints. The remaining 60 percent of devices are mobile.

Organizations and government agencies are realizing mobile devices are an unprotected endpoint with access to or containing all of the information of a traditional endpoint. And while there are some overlaps in what you protect – email, calendars, etc., – the way you solve the traditional endpoint security problem is completely different than how you solve the mobile security problem.

Users regularly incur risk on mobile devices, such as by:

  • Connecting to unknown and unencrypted networks;
  • Downloading unvetted apps, and apps from third-party stores; and
  • Jailbreaking or rooting their devices, and remaining on vulnerable operating systems (OS’s)

These and similar actions increase the likelihood of attacks. Watch the on-demand webinar to learn how to construct an RFP for an effective enterprise mobile security solution that can address and mitigate these risks.

Avatar photo
Author: Andy Shane