Posted by: Tony Bradley
Compliance, DUST Model, Mobile, Security, Wireless
Mobile devices are a critical component of enterprise communications and a core element of unified communications. They used to just be phones, but now they are more like tiny micro-laptops that fit in a pocket. With that increased functionality and ability to store massive amounts of data comes an acutely greater need for security.
An industry analyst firm has developed a model for managing mobile security and compliance. The DUST Model for Managing the Risk to Enterprise Mobility establishes guidelines and provides a framework for end-to-end compliance practices and security controls.
The guidelines have four primary components that make up the DUST:
You can get more details on the DUST Model from this CRG Research Brief.