Mobile Security in the Enterprise
Mobile Security in the Enterprise
Modern Defense for the BYOD Environment
13-Sep-2016
Europe
$3,000.00
Special Price $2,250.00 save 25 %
Description
Mobile security has been largely ignored as something that can be addressed with EMM, MAM, and mobile AV solutions. However, mobile malware and well-crafted mobile configuration profiles can evade these solutions without rooting or jailbreaking the phone. Smartphone and tablet users are line-of-business workers and do not understand the risks of using ultra-mobile devices to access enterprise data. Improved awareness of the security risks and the next-generation solutions available for mobile devices will raise the security bar for enterprises, and protect jobs and entire economies from industrial espionage. Despite changing concerns about mobile device security, the issue remains one of the top 10 security threat concerns worldwide.
Table of Contents
Mobile Apps Targeted by Adversaries
Users Access Unsecured Public Networks
Requests to Connect to Known Networks
Side Loading Apps from Un-curated Stores
Mobile Configuration Profiles
- A Mobile configuration profile of questionable provenance
Executive Privilege Abused
Plugging Devices into USB Ports
Ostrich Syndrome Security
Piecemeal Security
Modern Mobile Security
Mobile Security Vendor Comparison
Top Security Threat Concerns in DACH
Popular Topics
No Index | No |
---|---|
Podcast | No |
Table of Contents | | Modern Enterprise Mobility~ || Mobile Apps Targeted by Adversaries~ | Challenges with BYOD in Enterprise~ || Users Access Unsecured Public Networks~ || Requests to Connect to Known Networks~ || Side Loading Apps from Un-curated Stores~ || Mobile Configuration Profiles~ ||| A Mobile configuration profile of questionable provenance~ || Executive Privilege Abused~ || Plugging Devices into USB Ports~ | Three Categories of Mobile Security Today~ || Ostrich Syndrome Security~ || Piecemeal Security~ || Modern Mobile Security~ | Security Impact and End-user Transparency~ || Mobile Security Vendor Comparison~ | The Final Word~ || Top Security Threat Concerns in DACH~ | Legal Disclaimer~ | The Frost & Sullivan Story~ |
Author | Adrian Drozd |
Industries | Information Technology |
WIP Number | MB20-01-00-00-00 |
Is Prebook | No |