Mobile Security and Governance

Today’s workforce is constantly shifting, from remote workers and Bring Your Own Device Policies to companies with satellite offices across the globe. We work with clients every day who face bigger mobile security and governance challenges than ever before—and who need a partner to help them determine the right way to protect their most sensitive data against external hackers and internal leaks.

Recently, Champion’s Enterprise Mobility Services team worked with a client to develop mobile security solutions that balanced their team’s desire for flexible device access with the reality that they were regularly handling protected data. Each employee purchasing their own devices and handling (or ignoring) software updates created challenges—and when your CEO uses an iPhone and your CFO is committed to Android, mobility security is even more complex.

To understand how BYOD was impacting this client’s mobile security, we ran a test on the company’s mobile devices and learned that one of the IT team’s phones was rooted. A rooted phone is one that’s running an unlicensed version of its operating system, with holes that make it very unsecure. Identifying this security risk demonstrated the importance of clarifying the company’s Enterprise rights and policies—and implementing advanced mobility security systems to keep their mobile environment secure. The company established a minimum security policy for employee mobile devices and incorporated customized systems to help them monitor ongoing risk and compliance.

After implementing an advanced EMS system that used machine learning to allow for more sophisticated data collection, it was easy for the IT team to identify and address potential issues. Managers could tell at a glance when a device inside the network attempted to log into other systems, ensuring secure internal operations and a secure perimeter. This monitoring system also allowed the client’s IT department to understand the web applications employees were using and address any related security threats. They learned, for example, that employees were using mobile devices to access ten times the number of web applications the company originally planned for. The IT team was able to establish clear policies and management practices around access rights to web applications and social channels, taking all the necessary steps for a fully secure mobile environment.

Our latest tools and a customized plan—backed by 35 years of service and our proprietary analysis and implementation strategies—can also help you develop an integrated Enterprise Mobility strategy that meets your company’s individual needs.

How We Protect Your Data

  • Our Cloud Business Unit, MessageOps, is staffed with experts in the mobility and security marketspace. Our word is backed by implementations across multiple industries, with thousands of devices under our management.
  • Our team of security experts keeps constant tabs on the latest developments in mobile security and the latest risks in an evolving mobile landscape. We’re on top of our game.
  • Our consultants work with your team to develop policies for Enterprise Mobility Services. We assist you with established best practices related to password management and mobile device policy enforcement, encryption, BYOD policy initiatives, and other initiatives to assist CIOs, CISOs, IT administrators, and third-party IT solution providers.
  • We provide support for both company-owned and BYOD devices via the following solutions:
  • A secure, cloud-based platform that can easily scale to manage 10 to 100,000 devices
  • Secure containers to separate work and play
  • Anti-malware and antivirus applications
  • Expert guidance in policy development
  • Seamless integration with existing infrastructure and EndPoint Security such as BigFix
  • Integration into Unified Endpoint Manager
  • Proactive management of mobile threats in near real-time
  • Risk reduction for corporate or sensitive data loss
  • Safe disposal of all redundant mobile equipment

We’d be honored to become part of your mobile community watch program. To fight the constant barrage of outside threats, user errors, and technical flaws, security and risk management require teamwork, and we are truly excited to become part of your team.

Champion Solutions Group has over 35 years of expertise in delivering customized information technology solutions across all platforms for mid-size to large organizations. Our people want to work with your people. Contact us today to learn how our proven methodology can help your organization increase productivity, reduce costs, and mitigate risks.

Erick Bacallao joined Champion Solutions Group in 2015 after a career of Software Development in Cuba at the National Cancer Care Institute of Cuba, followed by moving to the States with allAware.


Champion acquired allAware and its properties and Erick has utilized his extensive background and expertise in IT and Software Development to rise to VP of Product Development in less than 5 years. During this time, Erick has been involved with key projects that led to the launch of numerous products including CSP Boss, Inscape platform and 365 Productivity Insights.


Erick has a Bachelor of Science in Computer Science from the University of Havana. He won Gold Medals for Programming from the Ministry of Education in Cuba, and he is certainly still a Gold Medalist for Champion!


As President and CEO, Chris is responsible for the development of key strategic alliances and solution portfolio. He leads Champion’s go-to market and execution strategies for integrated offerings in the cloud, in security, and in digital infrastructure, always focusing on improving the customer experience and driving transformative business outcomes.


He also aligns key partner initiatives with company strategy and oversees corporate marketing and messaging to gain mindshare with customers and partners. It’s his vision and innovativeness that have catapulted Champion up the ranks to become a $100M+ organization—and one of the most respected solution providers in the industry.


Over the past two decades, Chris has also focused on mergers and acquisitions, as well as innovative product development. He is the original founder and an active member on the Board of Managed Maintenance, Inc., a SAAS provider and consulting firm that utilizes their award-winning One-View Portal to help the IT Channel and its customers manage their IT Maintenance.


Chris is also the original founder and chief strategist behind one of the original storage cloud providers, Storage Access / BluePoint. During the course of a few short years, he had raised $20M and took that company public on the Toronto Stock Exchange. It has since been acquired by Pomeroy.


In 2012, Chris led the acquisition of MessageOps and continued the product development and worldwide launch of its premier SAAS, 365 Command. Built on Microsoft Azure, 365 Command is currently managing over 1 million seats of Microsoft’s Office 365. After achieving this phenomenal milestone, 365 Command and other MessageOps O365 utilities were sold to Kaseya.


Over the past 35 years, Chris as worked tirelessly to not only advance his own career, but those of his employees. In addition to leading a $100M organization, Chris can also be found sitting with sales teams, cold calling and coaching, and validating why Champion has been listed on Best Places to Work by both South Florida Business Journal and Computerworld.

Ultimately, the success garnered by Champion Solutions Group, its associated companies, and their employees is due in large part to the leadership of its President and CEO. Perhaps the most fitting award Chris has earned is South Florida Business Journal’s 2013 Ultimate CEO Award.