Pau Lo
asked on
Smartphone tablet asset management
What processes could be used to identify either unused smartphone or tablet devices which have not communicated or synched with corporate systems and what tools can be used to enforce security controls on such devices.
We have a process for identifying stale laptpps which have no recent login in Ad but want sinilar from smartphones / tablets to ensure they havent been lost or stolen or that when an employee leaves the company they return devices and they are added to the stock room and redistributed as possible.
Also - what security controls do you enforce on mobile devices such as smartphone or tablet and how do you prevent users amending the security controls.
We have a process for identifying stale laptpps which have no recent login in Ad but want sinilar from smartphones / tablets to ensure they havent been lost or stolen or that when an employee leaves the company they return devices and they are added to the stock room and redistributed as possible.
Also - what security controls do you enforce on mobile devices such as smartphone or tablet and how do you prevent users amending the security controls.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.