Essential Guide

Put it on paper: A guide to mobile device policy creation

A comprehensive collection of articles, videos and more, hand-picked by our editors

The challenges of mobile device security policy enforcement

In this video interview, conducted at the 2012 (ISC)2 Security Congress, David Melnick, CISSP, CIPP, CISA, principal, security & privacy services with the audit & enterprise risk services practice at Deloitte & Touche LLP, discusses the challenges enterprises face with mobile device security policy enforcement. Melnick says that while it is possible, it ultimately becomes a question of will for enterprise decision makers.

Melnick discusses whether third-party mobile security technology is essential to making devices secure in a BYOD environment or whether onboard controls are enough. He also talks about the implications of regulated data accessible to mobile devices and the security ramifications of the coming wave of low-cost Android tablets in the enterprise.

View All Videos

Essential Guide

Put it on paper: A guide to mobile device policy creation

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close