Mobile Security:How to Secure,Privatize,and Recover Your Devices
上QQ阅读APP看书,第一时间看更新

Summary

In this chapter, we learned about the impacts of the mobile device on the end user. This is a very big topic for managers and administrators. The important point for end users is that you can be forced to follow specific rules on your device; yes, even the device that you really own. Bring Your Own Device does not really mean that you can use it for anything on a corporate network. Some of the items we discussed in this chapter included:

  • What is MDM and how does it impact you
  • Why do companies use MDM solutions
  • What rules can be applied (such as passwords) and how you can be locked out
  • We discussed what jailbreak means
  • Also we reviewed a few MDM solutions that may be used at your company
  • Acceptable use policies were reviewed and why you may need to sign one if you want to use your device on your company's network
  • Power users were defined and some of the risks were identified; not all power users are the same
  • Finally, we learned about some power user tools (or administrators) that may be used to help manage your device

In the next chapter we will review privacy.