SHARE
Facebook X Pinterest WhatsApp

Managing the Security of Mobile Devices in the Enterprise

Managing the Security of Mobile Devices in the Enterprise This publication provides recommendations for selecting, implementing, and using centralized management technologies, and provides recommendations for securing mobile devices throughout their life cycles. Mobile devices, such as smart phones and tablets, typically need to support multiple security objectives: confidentiality, integrity, and availability. To achieve these objectives, […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Jul 9, 2013

Managing the Security of Mobile Devices in the Enterprise

This publication provides recommendations for selecting, implementing, and using centralized management technologies, and provides recommendations for securing mobile devices throughout their life cycles.


Mobile devices, such as smart phones and tablets, typically need to support multiple security objectives: confidentiality, integrity, and availability. To achieve these objectives, mobile devices should be secured against a variety of threats. The purpose of this publication is to help organizations centrally manage the security of mobile devices. Laptops are out of the scope of this publication, as are mobile devices with minimal computing capability, such as basic cell phones. This publication provides recommendations for selecting, implementing, and using centralized management technologies, and it explains the security concerns inherent in mobile device use and provides recommendations for securing mobile devices throughout their life cycles. The scope of this publication includes securing both organization-provided and personally-owned (bring your own device, BYOD) mobile devices.

The attached zip file includes:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • ManagingMobileDeviceSecurity.pdf

Recommended for you...

Is 5G Enough to Boost the Metaverse?
Litton Power
Apr 18, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
Best Enterprise 5G Network Providers 2022
5G Cybersecurity Risks and How to Address Them
Kihara Kimachia
Dec 17, 2021
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.