LB1234
asked on
How are you admins addressing the BYOD revolution, security- and administration- wise?
How are you admins addressing the BYOD revolution, security- and administration- wise?
What steps, policies, or software solutions have you put in place to minimize the risk to your organizations?
Note: this relates to non-Blackberry devices, namely iPhones and Droids.
What steps, policies, or software solutions have you put in place to minimize the risk to your organizations?
Note: this relates to non-Blackberry devices, namely iPhones and Droids.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Actually even development codes by original for mobile apps need to be stand guarded by admin as it is part of the push out package to end user, close working with development and it services team. See this interesting summary
http://www.veracode.com/blog/2013/08/developers-guide-to-building-secure-mobile-applications-infographic/
http://www.veracode.com/blog/2013/08/developers-guide-to-building-secure-mobile-applications-infographic/
Actually even development codes by original for mobile apps need to be stand guarded by admin as it is part of the push out package to end user, close working with development and it services team. See this interesting summary
http://www.veracode.com/blog/2013/08/developers-guide-to-building-secure-mobile-applications-infographic/
http://www.veracode.com/blog/2013/08/developers-guide-to-building-secure-mobile-applications-infographic/
Your management may overrule you, but the devices still belong to the user and you have no control over them.
.... Thinkpads_User