With mobile security options abound, what is a security professional to do?
Well, as always, what are the requirements?
Most organizations these days leverage some type of MDM for at least the ability to check for jail broken iOS devices and / or to perform remote wipes.
With that said, what else is needed? That answer depends on the use cases for the mobile devices, what data is on these devices, what devices are supported, what jurisdiction / industries the organization is in, and yes, the requirements.
As a belt and suspenders guy, I advocate MDM / MAM with Web filtering and ATP. Especially in BYOD scenarios. But, hey, that is just me...
No comments:
Post a Comment