Chapter 4
Creating Mobile Device Security Policies
In This Chapter
Understanding the importance of mobile device security policies
Creating effective device policies
Managing devices through provisioning policies
Implementing monitoring policies
Using application policies to protect against malware
This chapter delves into the universe of security policies for mobile devices — the why, how, what, and where. Clearly the danger wrought by these new age devices should be apparent by now. In this chapter, we shift the focus to how you can combat this danger with consistent, transparent, and comprehensive policies that both protect the enterprise and educate your users.
Recognizing the Importance of Enforceable Security Policies
Before we get into the nitty-gritty of the various components of security policies, it is important to understand the need for them. If every one of your users were an intelligent, security-savvy, self-regulated, and enterprise law-abiding citizen, you could do ...