Understanding computing assets the key to mobile security


Understanding computing assets the key to mobile security

Joe O'Halloran

The biggest security challenge that organisations face when it comes to preventing data loss and security breaches, such as those involving laptop devices, is knowing exactly what data and devices they have and need to secure, according to security specialists, Absolute Software.

There are five keys points to maintaining adequate mobile device security said Absolute who has developed what it claims is a unique software solution, ComputraceOne to manage mobile devices. The key steps are: security policy; authorisation; management; accountability; tracking.

Absolute security specialist, William Pound commented, “Organisations need to take responsibility for the data on their mobile devices as the information often can be about customers or partners, so the consequences of a breach are far wider than just the organisation itself. To take responsibility there needs to be policy and traceability.

“Asset management is key. Knowing who has a device and, if necessary, where it is. This is particularly important if a device is lost. Tracking software will trace the device and allow it to be recovered. More than that, with this technology installed onto a device, sensitive data files can be deleted, preventing it from being used maliciously.”

The company is claiming a key win for its system by Bracknell Forest Borough Council. Commented Richard Dawson, IT Services Manager at the Council, "For less than £60 per laptop over its life, ComputraceOne has provided not only value for money, but it has ensured that our data has not gotten into the wrong hands. In the last three months alone, we have been able to deactivate and remove all data from three decommissioned laptops as well as recover a stolen laptop


Click here to check out the latest devices that can meet your mobile computing needs

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy