DOC RABE Media - Fotolia
Organizations often wonder if Google Android is secure enough for enterprise use, often as a result of hearing news of the latest Android exploit or a competitor's claims.
No OS is 100% secure, but current versions of Android OS are comparable to its competitors. However, IT must fully enable all the necessary security features inherent in the OS. IT should include three critical areas to heighten Android security for the enterprise.
Three steps to maximize Android security
First, IT should determine how many older Android devices are in use within the organization. IT shouldn't deploy any devices that are more than two generations behind the most current version of Android. It's critical to upgrade older devices to ensure that end users can take advantage of the latest Android security features. Newer devices that use Android Enterprise and vendor products such as Samsung Knox offer even higher levels of security. In BYOD environments, IT should restrict users from connecting to corporate systems with older, outdated devices.
Second, IT pros should load all devices with the periodic updates from Android, many of which address security issues. IT should check devices at least every 30 days for available updates and download new updates as soon as possible. This guarantees that the latest and most secure OS version is on each device. If IT admins cannot upgrade current devices, they should replace them.
Third, IT should deploy some form of management software, whether through a third-party service such as a mobile carrier, or through a unified endpoint management (UEM) product that IT manages. This allows IT to implement profiles and required settings to enable the most secure settings that will protect the organization and end users.
UEM products also allow organizations to take an inventory of all devices, which provides valuable information about the devices themselves such as model number and OS version. It also allows IT to automate updates and alerts to non-complaint devices and users.
Dig Deeper on Enterprise mobile security
Related Q&A from Jack Gold
To tackle the issues of mobile user privacy and security at the same time, IT can deploy Android Enterprise Recommended devices and partition them ... Continue Reading
Zero-touch enrollment can simplify the logistics of Android device provisioning for IT. This option has some restrictions, but some organizations can... Continue Reading
AI can help IT better detect mobile security threats, so determine how to take advantage of this nascent technology. Prep for AI-based systems to ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.