Mobile Device Security: Enterprise Builds

Current Status

This project is in the build phase of the project lifecycle.  Read our two-page fact sheet for an overview of this project.

Sign up for email alerts from the NCCoE to receive updates on our Mobile Device Security projects. If you have questions or would like to join our Community of Interest, please email the project team at


The rapid pace at which mobile technologies evolve requires regular reevaluation of a mobility program to ensure it is accomplishing its security, privacy, and workplace functionality. Built-in mobile protections may not be enough to fully mitigate the security challenges associated with mobile information systems. Usability, privacy, and regulatory requirements each influence which mobile security technologies and security controls are going to be well-suited to meet the needs of an organization’s mobility program.

The goal of the Mobile Device Security for Enterprises (MDSE) project is to help organizations across business sectors develop a series of clear and repeatable reference mobile architectures that any organization can adapt and adopt to ease design, accelerate deployment, and build in security for their mobility program from the outset.

This project will result in two separate Practice Guides to demonstrate different management technologies, each detailing how commercially available technologies can be used to manage and secure mobile devices while supporting a variety of usage scenarios:

  • Scenario 1 in which an organization wants to grant secure access while preserving privacy for end users or other organizations that own data on the device
  • Scenario 2 in which strong data confidentiality is implemented using certified and validated technologies

Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

Appthority logo
IBM logo
Kryptowire logo
Mobile Iron logo
Palo Alto Networks logo