The following strategies will help you and your Matrix Integration representative develop a plan to secure your network.
Identify where sensitive data is located, who controls it, who and what has access to it, how it is stored and how it is protected.
The policy should cover the types of information employees can access, as well as they types of removeable media employees can use.
Let employees know how to keep company information secure, and the procedure to follow if a device is lost or stolen.
Anti-virus software is commonplace on notebooks and tablet PCs, but should also be used for other mobile devices such as smartphones and PDAs, especially for devices with network connectivity.
Detect and block personal devices or auto-provisioning security software.
Authenticate that it is an authorized user AND an authorized device which includes up-to-date security software before granting access to the network.
Use software that will automate the distribution of security software and policies as they are defined for new users or updated to ensure ongoing compliance.
Protect enterprise data as it is transmitted to and from the enterprise network using link-level encryption such as Secure Socket Layer (SSL) or Virtual Private Network (VPN) technology.
Automated backup and recovery software can secure company information without interfering with employee access or productivity.