Overall Assessment: Security was designed into the platform from its inception, includ‐,ing areas such as verifying the authenticity and the integrity of the device and its soft‐,ware. RIM offers strong security protection across the device, transmission and the net‐,work domains through tight control of the device, its software and its application control ,policies. RIM's BlackBerry was the 9irst mobile solution to be certi9ied under the Com‐,mon Criteria Scheme. The product also has the most security certi9ications globally in‐,cluding FIPS 140‐2, CAPS, EAL‐2+, Coverity and Fraunhofer. While other vendors have ,stepped up security efforts in the past year, RIM offers the most robust security solution.,Conclusion,There is no one size 9its all mobile security solution. A 9irm must decide how much con‐,9idential data will be on its users' devices and build a solution that maps the rigorous‐,ness of the security to the data risk. These security policies should be similar to a 9irm's ,laptop policy but take into consideration the differences in the devices' ability and the ,user's tolerance for security. IT should expect its end users to have different device pref‐,erences. This means it is unlikely that a 9irm will use a single mobile vendor or a single ,OS for all of its smartphones. Therefore, IT must understand the differences in the secu‐,rity implementations of each vendor and attempt to provide a consistent level of security ,across platforms. ,
Monday, 19 March 2012
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: only a member of this blog may post a comment.