|25||Securing Mobile Devices|
This chapter focuses on mobile platforms such as smartphones and tablets—devices that contain computing functionality along with messaging and voice capabilities. Typically including substantial storage capacity as well, these devices represent a blended threat to the enterprise—through data leakage, malware, unauthorized applications, and inappropriate access.
Many mobile devices such as smartphones and tablets are typically designed from a consumer perspective. They’re meant to be user friendly, and they typically come with a built-in security model as part of the operating system to protect the user from a variety of threats. They are productivity-focused first; and security is only a secondary ...