Chapter 6

Conforming to Corporate Compliance Policies

In This Chapter

arrow Differentiating between personal and corporate-owned devices

arrow Determining the device types or platform versions you will allow into your network

arrow Defining passcode policies

arrow Setting device encryption policies

arrow Setting VPN and access control policies

arrow Protecting smartphones from viruses, malware, and other mobile threats

arrow Enforcing loss and theft protection on every device

arrow Managing the devices centrally from a single management console

arrow Creating a plan to regularly back up and synchronize device contents

Monitoring, inspecting, ...

Get Mobile Device Security For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.