WHAT IS A MOBILE DEVICE MANAGEMENT CONFIGURATION REVIEW?
A Mobile Device Management (MDM) Configuration Review is a security assessment designed designed to ensure the configuration deployed to company mobile devices is secure.
The review assesses the current configuration against best practice guidelines to ensure the threat posed by company devices is managed and the potential impact of a compromised corporate mobile device is reduced.
WHY CONDUCT AN MDM CONFIGURATION REVIEW?
Mobile phone devices are commonly used to facilitate enterprise communication, data access and more recently feature heavily in 2-factor authentication system integration.
Emerging threats and vulnerabilities are not confined to any one device or system and as the growth of mobile devices has occurred, the identification of vulnerabilities within these devices has also grown exponentially.
Due to the increasing use and threat, it is vital to ensure that mobile devices are securely configured.
During a MDM Review we examine the configuration and operating system to determine if a secure setup has been established and to ensure there are no identifiable weaknesses. The assessment is designed to pinpoint and rectify any holes within the configuration and covers patching levels, weak authentication, application white listing, logging and auditing as well as any antivirus system in place.
As part of our approach, our Penetration Testers use a combination of the most effective automated tools and manual exploitation techniques to identify vulnerabilities across your devices. Our extensive reports provide a thorough assessment of each vulnerability and provide business context alongside each finding.
This is supplemented by technical and non-technical descriptions to assist in prompt remediation activities and provide a thorough understanding of each issue.
An MDM Configuration Review will allow your business to:
- Receive assurance around the secure configuration of your MDM and mobile devices.
- Make ongoing improvements to your MDM via specialist support, advice and consultancy.
- Adhere to regulatory bodies who require an MDM Configuration Review to be performed.
- Gain access to a dedicated team of specialist CREST Registered penetration testers who use the latest tools and techniques to accurately assess and identify emerging threats