IT Examiner School, Providence, RI

BYOD Security: Technical Solutions

 Mobile Device Management ( MDM )  Software that secures, monitors, manages and supports mobile devices regardless of type, brand, carrier, and ownership. Includes enrollment services, over-the-air (OTA) distribution of applications, data and configuration settings, including the ability to remotely wipe data. (ActiveSync, GoodTechnology)  Mobile Application Management (MAM)  Software that is used for provisioning and controlling mobile apps only.Administration of an enterprise app store. Limited to application layer ONLY. (AirWatch, MobileIron)  Network Segmentation for Mobile Devices  Encrypting the Device

Administrative Strategies

 BYOD policy  Open? More restrictive?  Restrict backup to cloud service providers (e.g., iCloud)  Mobile Hotspot usage- yes/no?  Set mobile device standards (for support)  iOS vs.Android vs. Blackberry, OR ask “Do you want to manage and support the endpoint hardware or leave it to the user?”  What about business continuity needs? Do we replace mobile devices?  Training for employees (transparency of management of devices)

Made with FlippingBook Annual report