Guidelines for managing the security of mobile devices in the enterprise ii authority this publication has been developed by nist to further its statutory responsibilities under the federal information security management act fisma public law pl 107 347. These steps are similar to those involved with other security issues such as robust program and policy creation communication risk assessment technology implementation and continuous monitoring and evaluation but are tailored to the unique challenges associated with mobile devices. On the enterprise mobile device this could result in inadvertent disclosure of personal or corporate information to public sources us healthcare regulations the healthcare industry is another area of concern regarding mobile devices. For more information and concrete recommendations to enterprises mobile device manufacturers and application developers please refer to kuppingercoles advisory note dealing with privacy risks in mobile environments. Enterprise mobile security needs to be included at the beginning of enrolling the device with physical security controls like minimum password length and complexity screen lock out time etc app
How it works:
1. Register a Free 1 month Trial Account.
2. Download as many books as you like ( Personal use )
3. No Commitment. Cancel anytime.
4. Join Over 100.000 Happy Readers.
5. That's it. What you waiting for? Sign Up and Get Your Books.