Chapter 6

Conforming to Corporate Compliance Policies

In This Chapter

arrow Differentiating between personal and corporate-owned devices

arrow Determining the device types or platform versions you will allow into your network

arrow Defining passcode policies

arrow Setting device encryption policies

arrow Setting VPN and access control policies

arrow Protecting smartphones from viruses, malware, and other mobile threats

arrow Enforcing loss and theft protection on every device

arrow Managing the devices centrally from a single management console

arrow Creating a plan to regularly back up and synchronize device contents

Monitoring, inspecting, ...

Get Mobile Device Security For Dummies now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.