O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Bring your mobile device to work day

A recent poll by an access-management company Courion found that 69 percent of the corporations contacted said their employees use personally-owned mobile devices to connect to the corporate network (http://www.informationweek.com/mobility/security/personal-mobile-devices-still-vex-it/231002676). This practice introduced a whole new security risk to companies through devices over which they have little control. Initially, companies fought the practice but eventually chose to accept the inevitable. Employees won the battle by sheer numbers. "Mobile devices are now accepted as necessary tools for productivity in the enterprise, regardless of how they affect data security. That is the new reality" (www.informationweek.com/news/mobility/security/231002676 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required