Mobile Security Technologies
In this chapter, you will
• Learn about encryption methods used in mobile devices to secure data in-transit and at-rest
• Explore access control methods used on mobile devices
The last chapter discussed some of the security risks inherent to enterprise mobile device infrastructures. This chapter covers some of the different security technologies that you can use to help mitigate these risks. Many of the technologies explored here involve using encryption in various ways. This includes encrypting data both at rest (in ...