Unified Communications: Click to talk

Sep 20 2009   2:51AM GMT

Secure Your Mobile Devices with DUST

Tony Bradley Tony Bradley Profile: Tony Bradley

Mobile devices are a critical component of enterprise communications and a core element of unified communications. They used to just be phones, but now they are more like tiny micro-laptops that fit in a pocket. With that increased functionality and ability to store massive amounts of data comes an acutely greater need for security.

An industry analyst firm has developed a model for managing mobile security and compliance. The DUST Model for Managing the Risk to Enterprise Mobility establishes guidelines and provides a framework for end-to-end compliance practices and security controls.

The guidelines have four primary components that make up the DUST:

  • Devices
  • Users
  • Sessions
  • Transactions

You can get more details on the DUST Model from this CRG Research Brief.

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: