Mobile security

Mobile security

With the proliferation of mobile devices, the inclusion of personal devices at work, and the deployment and use of wireless networks, your organization must adapt its infrastructure and has probably already suffered impact to its networks’ security and performance.

 

Your confidential business data, your customers’ information and all other intellectual property are now in the hands of your employees who use laptops, tablets and smartphones to access it as part of their work.

 

Technologies that use wireless connections require regular security reviews to identify threats and vulnerabilities. These reviews should be included as part of your organization’s overall information security program and risk management strategy.

 

The Mobile security solutions from BCI prepare your company to receive and manage this mobile generation.

Wireless network security assessment

Regular security reviews of network infrastructure components, such as wireless access points, are a key component of an effective information security program. Often, when deploying wireless technologies, basic security concerns are not addressed, exposing your organization to unnecessary threats and risks. These risks, exposures and requirements can include:

 

  • Poorly configured wireless devices and access point;
  • Lack of documented security policies, standards, guidelines, and procedures for wireless technologies;
  • Uncontrolled installation and operation of wireless networks;
  • Inadequate security controls on existing wireless infrastructure;
  • Changing security environment, due to evolving business requirements and new / modified business processes;
  • Vulnerable software revisions and un-patched vulnerabilities associated with wireless communication;
  • Third party compliance reviews.

The Wireless network security assessment from BCI delivers a comprehensive and prioritized plan for mitigating wireless exposures with concise and actionable recommendations.

 

Our wireless security specialists conduct a detailed review of all wireless access points, which includes an analysis of all policies, practices, standards and procedures associated with the implementation and operation of wireless networks as well as a technical configuration review to ensure high quality results using industry best practices.

Complementary services

In order to fully secure your mobile deployment, to protect your business sensitive information and ensure that your connections are secured, BCI offers many additional services that are extended to users, applications, data, content and network:

  • Review of physical access to the wireless network to determine how resources are physically protected;
  • Review of authentication processes to ensure only authorized wireless users have network access;
  • Review of wireless infrastructure to determine potential vulnerabilities which includes a high level enumeration and documentation of the targeted wireless devices;
  • Review of corporate security policies and practices with regards to wireless devices and remote access;
  • Review of the wireless configuration including software / hardware revisions.