You are on page 1of 3

SOLUTION BRIEF:

BEST PRACTICES FOR


SECURE MOBILE ACCESS
Stay operational regardless of what tomorrow's headlines may bring

Abstract environment without losing availability, but deploying a highly


available service can be complex, costly and time consuming.
Supporting business goals for today’s digital workspace requires
secure mobile access, yet obstacles stand in the way of balancing Effective cybersecurity must include secure mobile access
security, access, performance and value. Best practices for
Providing mobile access in today's anywhere/anytime, hyper-
effectively implementing a protected mobile workforce include
distributed world opens an explosion of exposure points over a
maintaining high security, connectivity, robust performance, and
myriad of potentially insecure mobile endpoint devices.
low total cost of ownership. This solution brief details practical
steps to achieve those best practices. Human fallibility and risky online behavior mandate that
employees cannot be trusted to ensure the security of their own
Introduction
mobile devices.
Whether for ensuring business continuity or enhancing workforce
Moreover, the array of threat types is expanding, deepening and
retention and productivity, more organizations are embracing
getting smarter, including targeted ransomware, never-before-
mobility, work-at-home and flex-time for their employees. To
seen threats, memory-based malware, side-channel attacks and
achieve business goals with a mobile and remote workforce,
encrypted threats.
having a robust and reliable access security service has never been
more critical. A key element of ensuring reliable mobile access is Ultimately, the security of your mobile network must match that
maintaining security updates, but maintenance can disrupt service of your wired network.
and performance. Organizations need to maintain a flexible work
The SonicWall SMA 1000 Series Conclusion
provides distributed enterprises with
Stay operational Best practices for mobile security include
comprehensive end-to-end secure
regardless of what remote access to corporate resources zero-trust access control, seamless
tomorrow's headlines hosted across on-prem, cloud and dependability and low total cost of
ownership. Fortunately, there is a viable
may bring. hybrid datacenters. It applies identity-
based, policy enforced access controls, solution to help you implement all of
context-aware device authentication, and these best practices.
Best Practices: Simple, safe and agile application level VPN to grant access to To learn how you can be more successful
mobility data, resources and applications after in maintaining a healthy access security
establishing user and device identity and environment while achieving zero
To be effective, cybersecurity must
trust. Flexibly deployed as a hardened downtime, visit www.sonicwall.com/
provide mobile employees with easy
Linux appliance or virtual appliance in products/secure-mobile-access.
and secure 24/7 access to key business
private clouds on ESXi or Hyper-V, or in
resources in an agile, easy-to-use, cost-
AWS or Microsoft Azure public cloud
effective and scalable way.
environments. It supports up to 20,000
This requires a zero-trust posture concurrent connections with a single
regarding any mobile device attempting unit and scale upwards of hundreds of
to connect with corporate resources, thousands of users through horizontal
whether those resources be on-prem or clustering.
in the cloud. Secure mobile access is a
SMA streamlines your company's flex
core component of a zero-trust approach
work initiatives with:
to anywhere, anytime access.
• Always-On VPN
IT must also secure access from these
mobile endpoints with limited budgets • Single Sign On (SSO) using SAML
and skilled staff resources. Identity Provider

This means streamlining deployment, • High Availability


availability and support to lower total
• Multi-Factor Authentication (MFA)
cost of ownership.
• Capture Advanced Threat Protection
SonicWall Secure Mobile Access (ATP) sandboxing
The SonicWall Secure Mobile Access • TLS 1.3 Support
(SMA) solution enables anywhere,
anytime access across hyper-distributed • Flexible and Scalable Deployment
enterprises. This gives your business the • Centralized management
agility to stay operational regardless of
what tomorrow's headlines may bring. • Low TCO

2
© 2020 SonicWall Inc. ALL RIGHTS RESERVED. BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE,
SonicWall is a trademark or registered trademark of SonicWall OR NON- INFRINGEMENT. IN NO EVENT SHALL SONICWALL
Inc. and/or its affiliates in the U.S.A. and/or other countries. All AND/OR ITS AFFILIATES BE LIABLE FOR ANY DIRECT,
other trademarks and registered trademarks are property of INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR
their respective owners. INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION,
DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION
The information in this document is provided in connection OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR
with SonicWall Inc. and/or its affiliates’ products. No license, INABILITY TO USE THIS DOCUMENT, EVEN IF SONICWALL
express or implied, by estoppel or otherwise, to any intellectual AND/OR ITS AFFILIATES HAVE BEEN ADVISED OF THE
property right is granted by this document or in connection with POSSIBILITY OF SUCH DAMAGES. SonicWall and/or its
the sale of SonicWall products. EXCEPT AS SET FORTH IN THE affiliates make no representations or warranties with respect to
TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE the accuracy or completeness of the contents of this document
AGREEMENT FOR THIS PRODUCT, SONICWALL AND/OR and reserves the right to make changes to specifications and
ITS AFFILIATES ASSUME NO LIABILITY WHATSOEVER product descriptions at any time without notice. SonicWall Inc.
AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY and/or its affiliates do not make any commitment to update the
WARRANTY RELATING TO ITS PRODUCTS INCLUDING, information contained in this document.

About SonicWall
SonicWall has been fighting the cybercriminal industry for over
28 years defending small and medium businesses, enterprises
and government agencies worldwide. Backed by research
from SonicWall Capture Labs, our award- winning, real-time
breach detection and prevention solutions secure more than a
million networks, and their emails, applications and data, in over
215 countries and territories. These organizations run more
effectively and fear less about security. For more information,
visit www.sonicwall.com or follow us on Twitter, LinkedIn,
Facebook and Instagram.

If you have any questions regarding your potential use of this


material, contact:

SonicWall Inc.
1033 McCarthy Boulevard
Milpitas, CA 95035
Refer to our website for additional information.
www.sonicwall.com

SolutionBrief-BestPracticesSMA-US-VG-1767

You might also like