Organizations understand the value mobile devices can add to their employees’ productivity by providing access to business resources at any time. Not only has this reshaped how traditional in-office tasks are accomplished, but organizations are devising entirely new ways to work. Yet mobile devices may be lost or stolen. A compromised mobile device may allow remote access to sensitive on-premises organizational data, or any other data that the user has entrusted to the device. The NCCoE mobile device security efforts are dedicated to solving businesses most pressing mobile cybersecurity challenges.
You can learn more about the NCCoE's Mobile Device Security building block by reading the Project Description.
Sign up for email alerts from the NCCoE to receive updates on our Mobile Device Security projects. If you have questions or would like to join our Community of Interest, please email the project team at email@example.com.
Mobile devices offer convenience and flexibility for organizations. This video provides an overview of how the NCCoE’s efforts can help organizations improve their mobile device deployments, while taking into consideration their security and privacy needs.
Provides a clear and repeatable reference mobile architecture in which strong data confidentiality is implemented using certified and validated technologies. Learn more about this project and download NIST Cybersecurity Practice Guide 1800-22.
Provides a clear and repeatable reference mobile architecture that an organization can use to grant secure access while preserving privacy for end users or other organizations that own data on the device. Learn more about this project and download NIST Cybersecurity Practice Guide 1800-21.
Demonstrates how to secure sensitive enterprise data accessed by and/or stored on employees’ mobile devices. Learn more about this project and download NIST Cybersecurity Practice Guide 1800-4.
Identifies threats to mobile devices and associated mobile infrastructure to support development and implementation of mobile security capabilities, best practices, and security solutions to better protect enterprise IT. Learn more about this project and view the Mobile Threat Catalogue.