Why You Need to Take a ‘Gung Ho’ Approach When Protecting Your Data and Enterprise

BrandPost By IBM
Aug 26, 20144 mins
IBMMobile Device ManagementMobile Security

There’s nothing better than having a team where all the members are gung ho about what they’re doing, right? If you have that, you know nothing is going to prevent them from getting the job done. You know that and pretty much anyone you say “gung ho” to will know it as well. That’s pretty impressive market penetration for a word that’s only been around since World War II.

The origin of “gung ho” is actually a really interesting story. If you asked most people where it came from they’d likely say it’s Chinese or it’s from the Marine Corps and those are both sort of right. Gung ho is the Anglicized version of two Mandarin Chinese characters, “gōng” and “hé,” which translate individually as “work” and “together.” At this point you’re likely thinking, “OK but that’s not exactly an interesting story.”

Gung ho as we know it was invented by Marine Corps Major Evans Carlson who said, “I was trying to build up the same sort of working spirit I had seen in China where all the soldiers dedicated themselves to one idea and worked together to put that idea over.” He had seen this spirit in the Chinese Industrial Cooperatives or “gōngyè hézuòshè”, which promoted grass roots economic development there. That got shortened to gung ho. The phrase would have gone no farther except Maj. Carlson wasn’t just some random officer in the Marines. He led the 2nd Marine Raider Battalion, a World War II commando group that was one of the forerunners of today’s Special Forces. The success of his operations helped spread the word throughout the corps and then into the rest of American society.

That gung ho team excellence and other traits the Marines are known for, like determination, vigilance and preparedness, are exactly what you want when it comes to protecting your corporate data.

To do that you need programs that work seamlessly to give you end-to-end control over the security of every device on your network from the server sitting next to you to the smartphone someone may be using in Hong Kong.

IBM has exactly the team you need, three solutions that work in tandem to let you find and manage every device on your network, ensure corporate data is secure on all mobile devices and provide them all with a multi-layered defense that attacks and defuses potential threats.

IBM Security Trusteer Apex Advanced Malware Protection provides endpoint protection against advanced malware and targeted attacks by breaking the cyber-attack chain. It exploits specific stages of an attack chain where the attacker has relatively few execution options. By tightly controlling these chokepoints at the operating system level, Trusteer Apex breaks the attack chain and prevents the attack.

IBM MaaS360 takes the complexity out of managing your mobile workforce−from supporting a large number of smartphones and tablets across multiple mobile OS platforms, to high-volume app and document distributions. Itis the fastest way to enable mobile security for devices, applications and documents. It lets you easily define and implement powerful compliance rules based on specific events, context, and location. It is also the only mobile device management solution with FISMA certification from the US government.

IBM Endpoint Manager helps you find and fix problems in minutes across all your endpoints regardless of OS or location. You’ll achieve continuous security and regulatory compliance with more than 8000+ out of the box compliance settings and up-to-the-minute reporting on the status of all endpoints. Using customizable automatic quarantine actions, IBM Endpoint Manager can isolate out of compliance endpoints and protect against zero-day malware and vulnerability attacks until remediation is complete.

Join our gung ho team of experts on September 16th, 2014 at 12 pm ET as they walk you through how you can implement a gung ho strategy to securely manage your enterprise.

Click here to register for the webcast.