14The Mobile Client Itself

14.1 Overview

While we security practitioners have been working feverishly over the last 10 years to secure our traditional endpoints, our users have become less invested in their no-fun company laptop, and more enthralled with their smart phone or tablet. With the company laptop, you won the difficult battle of deploying appropriate controls: whole-disk encryption, data leakage prevention, group policy–controlled everything. When you weren’t looking, users started working on their other devices more and more; then, one fateful day, your gadget-happy executive attended a big meeting with an iPad to take notes and a new battle began. It was just a matter of time before people started talking about data breaches ...

Get Securing Cloud and Mobility now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.