Solutions

Regulatory Compliance

Regulatory Compliance

From a cashier accepting payments at a retail store to doctors accessing patient records in hospitals, mobile has become an important enterprise productivity tool. Oftentimes there are industry specific security requirements, and enabling mobile productivity means IT must meet these standards. Our mobile security solution helps organizations meet such compliance requirements without compromising the user experience.

Regulatory Compliance

Payment Card Industry Data Security Standard (PCI-DSS) Version 3.0

Read the Whitepaper

Payment Card Industry Data Security Standard (PCI-DSS) Version 3.0

This document outlines best practices in mobile policy and data leakage controls for PCI DSS V3 guidelines, including requirements for the PCI Mobile Payment Acceptance Security Guidelines Version 1.0, which focuses on Mobile POS (Point-of-Sale) devices. PCI-DSS V3 guidelines are applicable to merchants and Service Providers that store, process, or transmit customer payment card data.

Health Insurance Portability and Accountability Act (HIPAA)

Read the Whitepaper

Health Insurance Portability and Accountability Act (HIPAA)

This document outlines best practices in mobile policy and data leakage controls for HIPAA compliance. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) established standards for the security and privacy of health data, especially individually identifiable information. Healthcare providers and related entities in the United States must abide by these regulations.

Criminal Justice Information Services (CJIS) Security Policy

Read the Whitepaper

Criminal Justice Information Services (CJIS) Security Policy

This document outlines best practices in mobile policy and data leakage controls for compliance with the [2]CJIS Security Policy. The CJIS Security Policy provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI. This Policy applies to every individual – contractor, private entity, noncriminal justice agency representative, or member of a criminal justice entity – with access to, or who operate in support of, criminal justice services and information.

Mobile Security: Threats and Countermeasures

Read the Whitepaper

Security for the Mobile First Era

Read the Infographic

Financial Services CISO Guide: Data Loss Prevention Controls for BlackBerry to iOS Migration

Read the Whitepaper