O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Mobile security policies in the environment

It is important to determine the security policies that need to be put in place within the mobile environment and how it compares to other policies within the overall corporate architecture. The current mobile space is different from traditional IT implementations or those through proprietary vendors who tightly control all aspects of the security. It is very difficult to leverage current security policies as outlined and extend them to a mobile environment. It is critical to identify the needs of the environment and what components of the security policy can and should be met, given the device ownership and uses. Corporate information needs to be secured, but limiting the use of a device, whether it ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required