Mobile security
From strategy to implementation
Five steps to secure mobile solutions.

Skills and know-how
Use cases
The five strategic dimensions (user groups, devices, services and data, accesses and guidelines) are examined and mapped in the USP mobile matrix. The relevant use cases and the guidelines required are derived from the five dimensions. The requirements are examined in the light of the actual circumstances and the action requirements are thus determined.
Proposed solutions and recommendations
Routes for the implementation of the organisational and technical requirements are laid out and prioritised in joint deliberations. A risk analysis is performed so that the right solution can be chosen, taking account of the acceptable risks. You have an implementation-oriented strategy for the secure deployment of your mobile end devices in your hand.
Implementation and project management
You can also count on our support during implementation. Our professionals will support you in all aspects of security elements in the mobile environment, from complete project planning through to evaluation and implementation. We also concern ourselves with your users and support you in running an IT security awareness campaign.

Reference projects
Contact
Contact us for further information and queries regarding IT security consultancy.
Newsletter
Keep yourself up-to-date with news from the world of information security.