Administration & Professional Networking

Sorted by:  

Mobile Device Security Challenges for Enterprise E-mail

Mobile device security for the enterprise is essential because smartphone users can now easily access corporate e-mail. Employees are using these devices not just to check e-mail but also to check the [more…]

Overview of Mobile Device Security thru Cloud-based Protections

Using cloud-based endpoint security is one method of protecting enterprise mobile devices from viruses, malware, spam, and other threats. The actual threat protection happens in the cloud or centralized [more…]

Overview of Mobile Device Security thru Configuration and Application Management

After you’ve considered how you can secure the mobile devices on your corporate network from viruses and malware, you need to plan for remotely enforcing policies for device management and security. Remote [more…]

Overview of Mobile Device Security thru Device Management

Now that you’ve thought about securing the mobile devices on your network from threats like viruses and malware, it’s time to plan for remotely enforcing policies for device management or security. [more…]

The Importance of Enforceable Mobile Device Security Policies

Before you get into the nitty-gritty of the various components of mobile device security policies for your enterprise, it is important to understand the need for them. If every one of your users were an [more…]

Overview of Mobile Device Security thru Client-based Applications

Using client-based endpoint security is one method of protecting mobile devices from malware. Protecting your corporate data and network begins with protecting its connecting devices. In this solution [more…]

Enterprise Mobile Device Management Over the Air

One of the most important elements of any mobile device security management product is the ability to manage devices over the air (OTA). Given the mobile nature of these devices, no strategy would be successful [more…]

Enterprise Mobile Device Initial Provisioning Workflow

Understanding the processes of initial provisioning and ongoing management of an enterprise mobile device is important because of security policy implications. The processes described here are the most [more…]

Enterprise Mobile Device Password Policies

Just about every mobile device has the ability to set a password that is required to access any of the device's features, unfortunately this functionality almost always is turned off by default. You must [more…]

Data Encryption on Enterprise Mobile Devices

Encryption of data at rest, data that has been downloaded to and will be stored on the mobile device itself, is an important security policy to establish. Encrypting data prohibits someone from connecting [more…]

Enterprise Mobile Device Network Configuration Settings

Most mobile device management (MDM) solutions gives you control over network connections and the way that each enterprise mobile device connects to the corporate environment. Here are several ways that [more…]

Enterprise Mobile Device Function Restriction

There is a wide range of device functionality that you may want to control on your organization’s mobile devices in the interest of security. Not all of the following features are available in all mobile [more…]

Enterprise Mobile Devices and Exchange ActiveSync

Microsoft developed Exchange ActiveSync (EAS) as a synchronization protocol for Microsoft Exchange, but it has been adapted to include more mobile device security and management functionality. EAS is a [more…]

Enterprise Policies for Mobile Device Physical Protection

The policies for physical mobile device protection and security are mostly common sense – and yes, how uncommon is that? Yet these concepts bear repeating because your users take a lot of this for granted [more…]

Enterprise Security Policies for Mobile Device Backup and Restore

The storage of enterprise data and intellectual property on the mobile devices makes the ability to back up and quickly restore the devices to an operational state paramount. Both the critical tasks of [more…]

Communication of Enterprise Mobile Device Software Updating Policy

Regular provisioning policies should be used to change the software on enterprise mobile devices to keep them secure and up to date. When communicating with your users, you need to note that the software [more…]

Enterprise Mobile Device Profile Policies

These enterprise mobile device profile settings policies are fundamental configuration settings that need to be provisioned on the devices to get them to function per enterprise guidelines. Typically, [more…]

Enterprise Mobile Device Decommissioning Policies

Enterprise asset security sometimes requires the decommissioning of mobile devices. The suggested decommissioning policies apply only to enterprise-issued mobile devices. You may be called upon to decommission [more…]

Effective Mobile Device Monitoring Policy Creation

Mobile device monitoring policies have for the longest time been veiled under shrouds of secrecy so that employees are not quite aware of how, why, and when their actions are being monitored, and the IT [more…]

Enterprise Mobile Device Protection with Application Policies

Application policies outline what applications users are permitted to use while accessing the enterprise network with a mobile device. Application policies are particularly crucial because the plethora [more…]

Overview of Mobile Device Security Policies

Security policies for mobile devices attaching to the business network can be split into two categories: policies for approved devices and policies for other devices. [more…]

Enterprise Mobile Device Backups

Regular backups of mobile device contents are just as important as backing up the contents of desktop computers. To the user’s regular backups are extremely useful when a device is lost or stolen because [more…]

Enterprise Mobile Device Content Control

Corporate policies regarding security and risks, may require you to inspect and tightly control data and applications residing on corporate-owned mobile devices. This includes Windows and Mac computers [more…]

Enterprise Mobile Device Security: Comparing IPSec and SSL VPNs

Two types of VPNs represent the majority of global remote access use cases: IPsec and SSL. Extending remote access to mobile devices will work with either type of VPN. Your choice will likely depend on [more…]

Authentication of VPN Enterprise Mobile Device Users

Before you allow access to the corporate network from any mobile device, you should first identify the user. One type of user identity validation is authentication. User authentication is the validation [more…]

Sign Up for RSS Feeds

Computers & Software