O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

The management of mobile access to the environment is extremely complex and requires a thorough understanding of the corporate goals for mobile communication and security requirements in the environment. The expansion of differing types of mobile devices has allowed for more flexibility by the end users and management to meet the needs of the organization. It is important to ensure that the corporate environment is not compromised in delivering the resources to the end users.

Additionally, devices and data contained on them become assets of the corporate environment when they attach to the environment; therefore, the concept of BYOD or corporate-owned assets gets fuzzy once corporate data resides on the device. Deploy the right solution ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required