Mobile security policy overview


Mobile security policy overview

Defining a mobile security policy is an essential step towards reducing business risk. Of course, the next step is to implement that security policy by deploying required mobile security measures. This Special Report from will help you formulate and enforce an official mobile policy.

Technical Tips

Mobile policies: Secure your corporate data with acceptable use policies
Craig Mathias explains why IT managers need to take a very proactive look not just at the technologies of mobile computing, but also at the policies regarding their use.

Policies for mobile computing
The advice in this column will help you define your needs and understand the core requirements every organization should have in place, regardless of your mobile penetration.

Policies for reducing mobile risk
Lisa Phifer outlines the essential components of a security policy that deals with mobile devices -- both employee and company owned -- and their associated business risks.

News Exclusives

Mobile security policy useless if not enforced
Strong mobile policies have become necessary to ensure mobile security. But security policies aren't worth the paper they're printed on if they're not enforced.

Mobile security starts with policy
Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy.


Mobile Messenger Audiocast – Policies for managing mobility
In this podcast, SearchMobileComputing's Andrew Hickey and Daniel Taylor of the Mobile Enterprise Alliance discuss the steps that IT departments should take to develop a set of policies for managing mobility in their organizations. (This podcast is approximately 30 minutes long and we ask your patience while it uploads.)
Listen on your PC or download to your favorite mobile device.
Download this podcast here

Visit often to keep abreast of recent developments in enterprise mobility.

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy