BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

This content is part of the Essential Guide: Put it on paper: A guide to mobile device policy creation

The challenges of mobile device security policy enforcement

In this video interview, conducted at the 2012 (ISC)2 Security Congress, David Melnick, CISSP, CIPP, CISA, principal, security & privacy services with the audit & enterprise risk services practice at Deloitte & Touche LLP, discusses the challenges enterprises face with mobile device security policy enforcement. Melnick says that while it is possible, it ultimately becomes a question of will for enterprise decision makers.

Melnick discusses whether third-party mobile security technology is essential to making devices secure in a BYOD environment or whether onboard controls are enough. He also talks about the implications of regulated data accessible to mobile devices and the security ramifications of the coming wave of low-cost Android tablets in the enterprise.

View All Videos

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close