Mechanisms exist to protect mobile devices from tampering through inspecting devices returning from locations that the organization deems to be of significant risk, prior to the device being connected to the organization’s network.
Mechanisms exist to protect mobile devices from tampering through inspecting devices returning from locations that the organization deems to be of significant risk, prior to the device being connected to the organization’s network.
Mechanisms exist to remotely purge selected information from mobile devices.
Mechanisms exist to restrict the connection of personally-owned, mobile devices to organizational systems and networks.
Mechanisms exist to prohibit the installation of non-approved applications or approved applications not obtained through the organization-approved application store.
Mechanisms exist to limit data retention on mobile devices to the smallest usable dataset and timeframe.
Mechanisms exist to restrict the functionality of mobile devices based on geographic location.
Mechanisms exist to enforce a separate device workspace on applicable mobile devices to separate work-related and personal-related applications and data.
Mechanisms exist to restrict the connectivity of unauthorized mobile devices from communicating with systems, applications and services.
Mechanisms exist to develop, govern & update procedures to facilitate the implementation of Network Security Controls (NSC).
Mechanisms exist to treat all users and devices as potential threats and prevent access to data and resources until the users can be properly authenticated and their access authorized.