Chapter 6
Conforming to Corporate Compliance Policies
In This Chapter
Differentiating between personal and corporate-owned devices
Determining the device types or platform versions you will allow into your network
Defining passcode policies
Setting device encryption policies
Setting VPN and access control policies
Protecting smartphones from viruses, malware, and other mobile threats
Enforcing loss and theft protection on every device
Managing the devices centrally from a single management console
Creating a plan to regularly back up and synchronize device contents
Monitoring, inspecting, ...