-
Book Overview & Buying
-
Table Of Contents
Mobile Security: How to Secure, Privatize, and Recover Your Devices
It is important to determine the security policies that need to be put in place within the mobile environment and how it compares to other policies within the overall corporate architecture. The current mobile space is different from traditional IT implementations or those through proprietary vendors who tightly control all aspects of the security. It is very difficult to leverage current security policies as outlined and extend them to a mobile environment. It is critical to identify the needs of the environment and what components of the security policy can and should be met, given the device ownership and uses. Corporate information needs to be secured, but limiting the use of a device, whether it is the internal GPS or camera, needs to be managed appropriately to ensure all applications function properly for all uses of the device. The mobile security industry typically identifies data, communication, and device security as the three main topics...
Change the font size
Change margin width
Change background colour