The rapid pace at which mobile technologies evolve requires regular reevaluation of a mobility program to ensure it is accomplishing its security, privacy, and workplace functionality. Built-in mobile protections may not be enough to fully mitigate the security challenges associated with mobile information systems. Usability, privacy, and regulatory requirements each influence which mobile security technologies and security controls are going to be well-suited to meet the needs of an organization’s mobility program.
The goal of the Mobile Device Security: Bring Your Own Device (BYOD) project is to provide an example solution demonstrating how organizations can use a standards-based approach and commercially available technologies to meet their security needs for using mobile devices to access enterprise resources.
The draft publication will feature a BYOD architecture and guidance intended for executives, security managers, engineers, administrators and others who are responsible for acquiring, implementing, and maintaining mobile enterprise technology, including centralized device management, secure device/app security contexts, application vetting, and endpoint protection systems.
This project is the second in a series of builds that will focus on Mobile Device Security for Enterprises. A draft for the first build, Mobile Device Security: Corporate-Owned Personally-Enabled (COPE), was recently published.