Archives for April 2010

Ten “Must Haves” for Secure Mobile Device Management


Smartphones and tablets offer tremendous productivity enhancements because wherever your are, whatever time of day, you can get access to your entire enterprise – the corporate network, proprietary business applications, and sensitive data – from a device small enough to fit in your pocket.

This era of “the pocket enterprise” also creates serious enterprise risks with employee habits or behaviors that can lead to data loss, exposure of the corporate network, and compliance breaches. Have employees passcode-enabled their devices? Do they abide by the corporate mobile app policies? Have they tampered with the device.s security features? Do they synch non-public data using Dropbox or forward it to their Gmail account? And the most pressing question of all: How can the enterprise even begin to answer these questions?

Zenprise, the leader in Secure Mobile Device Management, and a Cymbel partner, has recently released a white paper entitled, The Ten “Must Haves” for Secure Mobile Device Management.

If you would like a copy of this white paper, please fill out the form on the right side of this page.

Links to Explore


Defense-in-Depth Architecture focused on Applications, Users & Data

Cymbel new defense in depth

In response to the five forces of change, our approach to defense-in-depth has changed. Our solutions are focused on applications, users, and data. In addition, many of our solutions have embraced function consolidation or unification. For example, in network security, firewall and IPS functionality are unified in next-generation firewalls. Overall, the benefits include:

  • Reduced IT Security risks
  • Reduced costs of meeting regulatory compliance requirements
  • Reduced IT Operations costs
  • Increased IT Service availability and performance
  • Improved IT alignment with business needs.

Links to Explore

Compliance & Security Services

Cymbel provides a wide range of services related to automating compliance and reducing security risks.

Cymbel uses a four step process – Assessment, Policy Development, Policy Implementation, Re-assessment. The key to our approach is to gain real visibility during the Assessment process by using automated tools to collect actual operational data. Learn more.

Links to Explore