Chapter 4

Creating Mobile Device Security Policies

In This Chapter

arrow Understanding the importance of mobile device security policies

arrow Creating effective device policies

arrow Managing devices through provisioning policies

arrow Implementing monitoring policies

arrow Using application policies to protect against malware

This chapter delves into the universe of security policies for mobile devices — the why, how, what, and where. Clearly the danger wrought by these new age devices should be apparent by now. In this chapter, we shift the focus to how you can combat this danger with consistent, transparent, and comprehensive policies that both protect the enterprise and educate your users.

Recognizing the Importance of Enforceable Security Policies

Before we get into the nitty-gritty of the various components of security policies, it is important to understand the need for them. If every one of your users were an intelligent, security-savvy, self-regulated, and enterprise law-abiding citizen, you could do ...

Get Mobile Device Security For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.