Risks and Options to Control Mobile, Wireless and Endpoint Devices
Written by distinguished security industry analyst Mike Rothman of Securosis
Users want access to information on any device, from anywhere, at anytime. Whatever control you thought you had over the IT environment is gone. Users are bringing in their own personal mobile devices. Then there's the dynamics of virtualization and coping with new world threats. This provocative paper exposes issues, processes and technical options with regards to real-world mobile, wireless and endpoint security. The comprehensive paper examines:
- Data classification and network segmentation
- Endpoint and network integration
- Policy development and enforcement
- Different available security controls
- Getting the win; defining success, planning implementation and assessing progress
Related Items
pdf Mobile Security and Risk Management
pdf Mobile security compliance for personal device use and apps
pdf Mobile Risk Management: Executive Overview
pdf CISO Handbook: Enterprise iPhone & iPad Security & Compliance
pdf IDC Report: Architecting a Flexible Bring Your Own Device Strategy