BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
Enterprise mobility management must cover all the security bases
A solid and secure EMM framework starts with a formal policy and covers devices, apps, data, identity and more. Watch Now
Mobility has rendered the network perimeter moot. Laptops, smartphones and tablets extend the enterprise to new limits, taking data and applications to those same new limits. In the meantime, securing those devices and data becomes a much more difficult proposition, not only because of geography but also because of the multitude of platforms that must be supported. This Security School lesson will break down those challenges and help you develop and over-arching security strategy that cuts across the myriad threats and platforms inside your organization.
Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned. Passing the quiz earns you one CPE credit from (ISC)².
View our Security School Course Catalog to view more lessons eligible for CPE credits.
1Tactical success for BYOD security
In this webcast, Mathias offers key recommendations for a successful BYOD program.
2Why an iOS and Android strategy makes sense
Learn about key considerations for BYOD platform support choices and why an enterprise BYOD program should consider iOS and Android as its default platforms.
3Five steps to a successful BYOD security strategy
The BYOD paradigm has many quantifiable benefits, but introduces new challenges in securing enterprise networks and sensitive data. In this podcast, Craig Mathias countdowns to the top five steps in ensuring a successful BYOD security strategy. The discussion focuses on policies, procedures and employee education.
4Managing BYOD endpoint security
In this six question quiz, test your knowledge of our Security School lesson on managing BYOD endpoint security.