Essential Guide

Put it on paper: A guide to mobile device policy creation

A comprehensive collection of articles, videos and more, hand-picked by our editors

The challenges of mobile device security policy enforcement

In this video interview, conducted at the 2012 (ISC)2 Security Congress, David Melnick, CISSP, CIPP, CISA, principal, security & privacy services with the audit & enterprise risk services practice at Deloitte & Touche LLP, discusses the challenges enterprises face with mobile device security policy enforcement. Melnick says that while it is possible, it ultimately becomes a question of will for enterprise decision makers.

Melnick discusses whether third-party mobile security technology is essential to making devices secure in a BYOD environment or whether onboard controls are enough. He also talks about the implications of regulated data accessible to mobile devices and the security ramifications of the coming wave of low-cost Android tablets in the enterprise.

View All Videos

Essential Guide

Put it on paper: A guide to mobile device policy creation

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close