O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we learned about the impacts of the mobile device on the end user. This is a very big topic for managers and administrators. The important point for end users is that you can be forced to follow specific rules on your device; yes, even the device that you really own. Bring Your Own Device does not really mean that you can use it for anything on a corporate network. Some of the items we discussed in this chapter included:

  • What is MDM and how does it impact you
  • Why do companies use MDM solutions
  • What rules can be applied (such as passwords) and how you can be locked out
  • We discussed what jailbreak means
  • Also we reviewed a few MDM solutions that may be used at your company
  • Acceptable use policies were reviewed and why you may need ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required