Chapter 4. Mobile Security
Before you get started with the deployment of your mobile devices, you need to fully understand the risks associated with Mobility and what you can do to best secure the devices for your users. With the ever-growing threat of cyber-crime and the continued increase of data leakage, we need to provide the best possible security available. At the same time, we also need to be conscious of the usability of the mobile solution. If we secure something to a level that makes the solution unusable, the users will circumvent the controls and find other ways to get what they need. This in turn creates more risk to the environment. With this, we need to ensure that the mobile solution being provided is secure, meets regulations, ...
Get Learning AirWatch now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.