Enviar pesquisa
Carregar
How to-make-mdm-security-policy-more-effective pov
•
0 gostou
•
361 visualizações
Happiest Minds Technologies
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 4
Baixar agora
Baixar para ler offline
Recomendados
Tugas Anova Desti
Tugas Anova Desti
guest7afef24
Flood management
Flood management
Sompop Petkleang
Strategic Improvement Cases
Strategic Improvement Cases
Dayou Yang
Tugas Anova Desti
Tugas Anova Desti
guest7afef24
Introduction of agri finance2
Introduction of agri finance2
rajppt003
โค้ชคนให้เป็นผู้นำ ไม่ทำไม่ได้แล้ว โดย ศิริรัตน์ ศิริวรรณ
โค้ชคนให้เป็นผู้นำ ไม่ทำไม่ได้แล้ว โดย ศิริรัตน์ ศิริวรรณ
Sirirat Siriwan
Largest Electricity provider in the US- Case Study
Largest Electricity provider in the US- Case Study
Happiest Minds Technologies
BFSI GLOBAL TRENDS FY 24
BFSI GLOBAL TRENDS FY 24
Happiest Minds Technologies
Recomendados
Tugas Anova Desti
Tugas Anova Desti
guest7afef24
Flood management
Flood management
Sompop Petkleang
Strategic Improvement Cases
Strategic Improvement Cases
Dayou Yang
Tugas Anova Desti
Tugas Anova Desti
guest7afef24
Introduction of agri finance2
Introduction of agri finance2
rajppt003
โค้ชคนให้เป็นผู้นำ ไม่ทำไม่ได้แล้ว โดย ศิริรัตน์ ศิริวรรณ
โค้ชคนให้เป็นผู้นำ ไม่ทำไม่ได้แล้ว โดย ศิริรัตน์ ศิริวรรณ
Sirirat Siriwan
Largest Electricity provider in the US- Case Study
Largest Electricity provider in the US- Case Study
Happiest Minds Technologies
BFSI GLOBAL TRENDS FY 24
BFSI GLOBAL TRENDS FY 24
Happiest Minds Technologies
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
Happiest Minds Technologies
DIGITAL MANUFACTURING
DIGITAL MANUFACTURING
Happiest Minds Technologies
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Happiest Minds Technologies
AN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSE
Happiest Minds Technologies
VMware to AWS Cloud Migration
VMware to AWS Cloud Migration
Happiest Minds Technologies
Digital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdf
Happiest Minds Technologies
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
Happiest Minds Technologies
Cloud Reshaping Banking
Cloud Reshaping Banking
Happiest Minds Technologies
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Happiest Minds Technologies
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
Happiest Minds Technologies
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
Happiest Minds Technologies
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
Happiest Minds Technologies
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Happiest Minds Technologies
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
Happiest Minds Technologies
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
Happiest Minds Technologies
How to Approach Tool Integrations
How to Approach Tool Integrations
Happiest Minds Technologies
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
Happiest Minds Technologies
Contact Centre Growing Digital
Contact Centre Growing Digital
Happiest Minds Technologies
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
Happiest Minds Technologies
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
Mais conteúdo relacionado
Mais de Happiest Minds Technologies
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
Happiest Minds Technologies
DIGITAL MANUFACTURING
DIGITAL MANUFACTURING
Happiest Minds Technologies
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Happiest Minds Technologies
AN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSE
Happiest Minds Technologies
VMware to AWS Cloud Migration
VMware to AWS Cloud Migration
Happiest Minds Technologies
Digital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdf
Happiest Minds Technologies
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
Happiest Minds Technologies
Cloud Reshaping Banking
Cloud Reshaping Banking
Happiest Minds Technologies
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Happiest Minds Technologies
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
Happiest Minds Technologies
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
Happiest Minds Technologies
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
Happiest Minds Technologies
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Happiest Minds Technologies
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
Happiest Minds Technologies
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
Happiest Minds Technologies
How to Approach Tool Integrations
How to Approach Tool Integrations
Happiest Minds Technologies
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
Happiest Minds Technologies
Contact Centre Growing Digital
Contact Centre Growing Digital
Happiest Minds Technologies
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
Happiest Minds Technologies
Mais de Happiest Minds Technologies
(20)
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
DIGITAL MANUFACTURING
DIGITAL MANUFACTURING
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
Exploring the Potential of ChatGPT in Banking, Financial SERVICES & Insurance
AN OVERVIEW OF THE METAVERSE
AN OVERVIEW OF THE METAVERSE
VMware to AWS Cloud Migration
VMware to AWS Cloud Migration
Digital-Content-Monetization-DCM-Platform-2.pdf
Digital-Content-Monetization-DCM-Platform-2.pdf
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
Cloud Reshaping Banking
Cloud Reshaping Banking
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
Azure bastion- Remote desktop RDP/SSH in Azure using Bastion Service as (PaaS)
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN CPG THROUGH INTELLIGENT FREIGHT AUDIT
How to Approach Tool Integrations
How to Approach Tool Integrations
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
REDUCING TRANSPORTATION COSTS IN RETAIL THROUGH INTELLIGENT FREIGHT AUDIT
Contact Centre Growing Digital
Contact Centre Growing Digital
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
Último
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
mohitsingh558521
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Nathaniel Shimoni
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DianaGray10
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
HarshalMandlekar2
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
Último
(20)
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
How to-make-mdm-security-policy-more-effective pov
1.
How to make
Mobile Device Management Security Policy more effective By Thiruvadinathan Happiest Minds, Infrastructure Management and Security Services © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
2.
Mobile Device Management
and Security - Making it more effective Mobile communication devices are changing the way organizations work today. As more and more corporate data access and collaboration activities converge to hand-held devices such as smartphones, the line between corporate data and personal data is becoming increasingly blurred. Though laptops have been in use for more than 20 years now, securing them can still be a challenge as a tight security policy can take away most of the users’ freedom. Personal use of laptops is unavoidable and preventing it can lead to employee dissatisfaction. This leads to inconsistent implementation of security policies on laptops when compared to desktops. Disabling USB ports on desktops is much easier than on laptops from a user acceptance point of view. A win-win situation As acceptance of the Bring Your Own Device (BYOD) trend is fast becoming inevitable, applying corporate security policies to smartphones can pose even bigger challenges. Especially, if employees use personal devices for work (BYOD), then any policy that restricts users’ ability is likely to attract their resistance. Implementing a BYOD security policy offers certain distinctive advantages. The BYOD trend can potentially increase responsible use of devices. The other major advantage for users is that their personal device and data are protected for free using a robust corporate security policy and solution. Making it more effective Organizations are gearing up to roll out a Mobile Device Management (MDM) policy and platform in a phased manner to control associated risks better while ensuring higher business productivity. 1. An MDM policy must take into account every type of mobile device including laptops and there are solutions available for that. For example, mitigating data leakage or theft risks through encryption should be applicable to both laptops and smartphones as long as data access through such devices is allowed. 2. Policies need to be either data-centric or user-centric so that consistent security policies are applied irrespective of devices and access methods used. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
3.
3. Also, organizations
can increase protection if users have to use corporate WLAN while in the office as all data traffic pass through it and provided WLAN is adequately protected. 4. Protection against virus and other malware is also a must as the devices would remain vulnerable whenever there is traffic that is outside of the MDM policy. 5. Policy enforcement needs to be reviewed more periodically than for any other policies. Exceptions to the policy need to be tracked as mobile devices have become a very lucrative target for personal as well as corporate data. Other areas an MDM security policy should address are enrolment, user and device authentication, password policy, segregation between personal data and corporate data, whitelisted applications, secure web access, data encryption, remote lock and back-up, removal of data during separation, etc. CONCLUSION Making the MDM security policy effective would be a long journey as every aspect of the policy can impact personal use of BYOD. An effective policy will also help address the challenges in regulated environments. Protection of privacy and personal data from loss, theft, disclosure and misuse must be dealt with as some of the staff will have access to these. Data ownership, protecting the rights and interests of personal and corporate stakeholders remain the core of the policy. The user gets corporate protection for his/her personal data, while the corporate also benefits from a more security-conscious user. An MDM security policy has the potential to transform security into a more collaborative effort and a win-win deal between users and the organization. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
4.
To learn more
about the Happiest Minds Mobile Device Management & Security, please write to us at business@happiestminds.com About Happiest Minds Happiest Minds is a next-generation IT services company helping clients differentiate and win with a unique blend of innovative solutions and services based on the core technology pillars of cloud computing, social computing, mobility and analytics. We combine an unparalleled experience, comprehensive capabilities in the following industries: Retail, Media, CPG, Manufacturing, Banking and Financial services, Travel and Hospitality and Hi-Tech with pragmatic, forward-thinking advisory capabilities for the world’s top businesses, governments and organizations. Founded in 2011, Happiest Minds is privately held with headquarters in Bangalore, India and offices in the USA and UK. Corporate Office United States Happiest Minds Technologies Pvt. Ltd. 116 Village Boulevard, Suite 200 Block II, Velankani Tech Park Princeton, New Jersey, 08540 43 Electronics City Phone:+1 609 951 2296 Hosur Road, Bangalore 560100, INDIA 2018 156th Avenue NE #224 Phone: +91 80 332 03333 Bellevue, WA 98007 Fax: +91 80 332 03000 United Kingdom 200 Brook Drive, Green Park, Reading Berkshire, RG2 6UB Phone: +44 11892 56072 Fax: + 44 11892 56073 About the author Thiruvadinathan A (thiruvadinathan.a@happiestminds.com) is the Technical Director and Practice Lead for IT Governance, Risk Management, Security & Compliance services. He credits his rich experience in the field to his global clientele across industry verticals gained in the last 16 years. One of his recent achievements is having successfully led Happiest Minds Technologies to meet the stringent requirements of ISO27001 global standard. © Happiest Minds Technologies Pvt. Ltd. All Rights Reserved
Baixar agora