Part II

Implementing Enterprise Mobile Security

9780470927533-pp0201.eps

In this part . . .

You’ve just finished taking down all those No Mobiles Permitted on Site signs, not because you secretly don’t agree but because no one was paying attention to them.

But luckily, Part II helps you put together a plan for mobile device security. Chapter 4 gets you on the road to recovery by helping you create policies, those glowing rock star plans that architect your security structure. Chapter 5 continues the euphoria by outlining how to manage and monitor the policies you implement. It’s not rocket science, and chances are you’ve already implemented many of them — but who knows. Maybe we are actually rocket scientists, minus the rocket scientist paycheck.

Chapter 6 is the real trick: making sure your plans conform to existing corporate compliance policies so there’s a united voice to the user about future compliance.

And as a mobile security bonus, each chapter in this part has a case study at the end, explaining how our book’s model company, AcmeGizmo, implements the concepts discussed in that chapter.

Get Mobile Device Security For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.