The challenges of mobile device security policy enforcement

The challenges of mobile device security policy enforcement

Date: Oct 02, 2012

In this video interview, conducted at the 2012 (ISC)2 Security Congress, David Melnick, CISSP, CIPP, CISA, principal, security & privacy services with the audit & enterprise risk services practice at Deloitte & Touche LLP, discusses the challenges enterprises face with mobile device security policy enforcement. Melnick says that while it is possible, it ultimately becomes a question of will for enterprise decision makers.

Melnick discusses whether third-party mobile security technology is essential to making devices secure in a BYOD environment or whether onboard controls are enough. He also talks about the implications of regulated data accessible to mobile devices and the security ramifications of the coming wave of low-cost Android tablets in the enterprise.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: