Sie sind auf Seite 1von 24

Al Imam Mohammad Ibn Saud Islamic University

College of Computer and Information Sciences


Information Systems
Department

Course Title: IS 792 - Integrated


Capstone
Course Prof. Saleh Alzahrani
Instructor:
Evaluation Assignment# 2
Type:
Date: 30/04/2017

Anas Abdulrahman Bin Rokan


Students
Abdulelah Qasim Bukhari
Names
Saud Fahad Ben Heikal
437021055

Students IDs: 437021056

437021026
Group No.: 4
Al Imam Mohammad Ibn Saud Islamic University
College of Computer and Information Sciences
Information Systems
Department

Course Integrated Capstone


Title:
Course IS-792 IS MSc Evening
Code: Program
Course Prof. Saleh Alzahrani
Instructor
:
Evaluatio Assignment # 4
n Type:
Semester
:
Date: 16/04/2017
Duration:
Marks:
Privi
leges:
Open Ope
Book n
Note
Calc s
ulato

r
Lapt
Perm
op
itted
Per
mitt
ed

Anas Abdulrahman Bin Rokan


Students
Names (in Abdulelah Qasim Bukhari
English):
Saud Fahad Ben Heikal
437021055

Students IDs: 437021056

437021026
Group No.: 4

Table of Contents
Introduction............................................................................................................
Mobile devices in the enterprise..............................................................................
How to Control of the BYOD?....................................................................................
Benefits of BYOD:....................................................................................................
Risks of BYOD:........................................................................................................
Solving the Security issues:.....................................................................................
What should we do?................................................................................................
Mobile device diversity management........................................................................
Cross Mobile Platform Development Tool..................................................................
MDM and Cross Platform Development...................................................................
Mobile Device Management (MDM).........................................................................
MDM Technologies.................................................................................................
Benefits of Mobile Device Management...................................................................
References............................................................................................................

1.Introduction
Traditionally, enterprise network and system administrators have always
managed identical groups of client devices. The process of planning and
provisioning network clients almost exclusively dealt with desktop
computers. Which simplified the deployment and management of the
network infrastructure, client hardware and applications, and help to
ensuring uniformity across all network devices.
However, the emergence of smartphones and tablets have taken the
world of consumer electronics, and change the world lifestyle and add
new ways to do the work, the number and statistics Estimate it that in
the next five years, the number of mobile devices will be about 10
billion 1.5 for every man, woman and child on the planet. With mobile
devices, increasingly embedded into all parts of our personal lives,
enterprises also finding that their employees increasingly want to use
their own personal mobile devices to conduct work.
So, Enterprises enforced to provide a broad access to the enterprises
resources but they should to ensure the appropriate security
management and controls are in place.

2.Mobile devices in the enterprise


Employees would like to use their own mobile devices at work which led
to the practice of bring your own device (BYOD)which is part of the
consumerization of information technology (COIT) trend which Mr.
Vangie Beal has defined in his article consumerization of IT as:
http://www.webopedia.com/TERM/C/consumerization_of_it.html

Consumerization of IT not only refers to the use of personal consumer


electronics at work -- like iPhones and tablet PCs -- but also online
services, including online data storage, Web-based email services ("web
mail"), and social media or social networking sites like Facebook and
Twitter.
Consumerization of IT is driven by employees who buy their own
devices, use their own personal online service accounts, install their
own applications and then connect to the corporate network with the
device, often without the organization's knowledge or approval.

What is BOYD?
BYOD (bring your own device) means that employees are using many
different types of personal devices to store and process enterprise data,
and connect to enterprise networks. The problem is that many
smartphones are not being managed as secure devices, and as the
reports shows that less than one out of five devices had anti-malware
and only half encrypt the contained date.
BYOD significantly affect the traditional security model of protecting the
perimeter of the IT organization by blurring the definition of that
perimeter, both in terms of physical location and in asset ownership.
With personal devices now being used to access corporate email,
calendars, applications and data; many organizations are struggling
with how to define the impact of BYOD to their security status and
establish appropriate procedures and support models that help to
balance both their employees needs and their security concerns.
So, giving the employees the advantage of using devices they're
comfortable with may help enterprises to reduce the expense of
purchasing separate equipment for company use, However
organizations need effectively manage the diverse devices that will
come with BYOD and protect their data from being compromised and
there are different system and applications that help to manage this
diversity which we will mention it later in Mobile device diversity
management.

3.How to Control of the BYOD?

Forrester Research which is an American market research company


estimated that 60 percent of companies had start to allow BYOD by
2012. And Intel Corporation estimated that 70 percent of its employees
will use personal devices for some aspect of their job by 2014. So, this
lead to the important question how to gain control over devices that
employees were using at work. There are four challenges that must be
considered and resolved which are:
1. Device control costs. One of the benefit of BYOD is reduce the costs
associated with buying computer equipment. But also it could increase
the IT costs because they should maintain control over every new and
existing mobile devices. Every personal device needs to be properly
managed for with all the apps they run on it. With more than 1.3 million
(in mid-2012) mobile apps compared to only 75,000 apps for PCs-
managing employees devices is more complex and expensive.
2. Security threats. Mobile devices and the networks they run
can be used to compromising confidential, sensitive, or classified
data. A major security hole stems from the fact that the latest
tablets, smartphones, and other handhelds often rely on unsecured
wireless networksand users dont use encryption or strong
password controls. Which can lead to data breaches or affect
organizations brand or reputation, lost customers, and financial
loss.
So, the organizations information and information systems need to
be protected from unauthorized access, including when an
employees device is lost or stolen, or an employee leaves the
organization. All cybersecurity controls authentication, access
control, data confidentiality, and intrusion detectionimplemented
on corporate-owned resources can be rendered useless on an
employee-owned device.
3. Compliance. Organizations are following the national and
international regulations and standards that specify and organized
the data collection and store, as well as how it must be available in
case of an audit or legal action needed. Companies need to insure
and prove that enterprise data that stored on personal devices are
complying, e.g., encrypted, password protected, unaltered, etc.
4. Privacy. The Controls placed on employee-owned devices can
break the employees privacy. For example organizations could
know what sites an employee visited or movies he watched, what
he was done on holidays, what texts he sent/received, and all
social media activities during work hours and off-hours.

4.

5.Benefits of BYOD:
The integration of smartphones and tablets in enterprise workflows has
different advantages as shown in next figure, regardless of whether they
are centrally deployed or brought in by employees, bellow we will
explain some of these benefits:

- Improve productivity: Offering mobile access to enterprise resources can


greatly improve productivity for remote workers and contractors.

- Working remotely (Flexibility or agility): A combination of access


controls and device management will help to make the use of employees
devices to access company resources while outside the office safe and
effective. Which mean even while Traveling employees can remotely keep
track of e-mail, calendar and notifications.

- Enterprise devices and applications often have a higher barrier to entry with
regards to usability, whereas consumer technology has often been
engineered to provide a level of familiarity to end users.
This reduces the learning curve for employees, allowing them to quickly
get used to company issued devices.

- Reduce Costs: in a BYOD environment, enterprises save money by not


having to heavily invest in device deployment. Instead of buying and
deploying new smartphones and tablets, employee devices can be
provisioned with device management software and directly used for
corporate purposes. Companies are also no longer responsible for
replacement devices in case an employee loses or breaks a smartphone or
tablet.
6.Risks of BYOD:
As we described before use Mobile devices in
the enterprise have many positive effects on
enterprise productivity and enabling
innovation and agility, but it is also introducing a
number of troubling security risks that represent
back door opportunities for cyber criminals as
Mobile devices were listed the fourth highest security
concern in the 2015 Global Information Security
Workforce Study of the (ISC) 2 Foundation 1,
Below some of these risks associated with mobility in enterprise:

- Diversified Environment: managing mobile devices with different


operating systems will be difficult. Organizations should apply crucial
security measures to manage these challenges by putting appropriate
policies across mobile operating systems to separating the personal and
corporate data.

- Anytime, Anywhere Connectivity: As the mobile devices can be


connected anytime and anywhere, that means mobile devices could
access unsecured or untrusted networks like public networks, to
mitigate these risks, organizations should ensure that these
connectivity via certificate-based network access, and utilize per-app
VPNs that encrypt data in transit. Also they should deploy app and
email proxies that block unauthorized or non-compliant devices and
apps.

- Loss and Theft: mobile


devices are vulnerable to
loss and theft. 2014
Annual State of the Net
Survey, Consumer
Reports, May 2014 shows
that 3 million
smartphones were stolen
in 2013, nearly twice as
many as in 2012, so
organizations should
consider that by enforce
appropriate password
policies for devices and
apps using multi-factor
authentication and Provide seamless access to corporate
apps and resources with certificates and single sign-on. Also
Encrypt corporate apps and data to protect them even if the
device is compromised. Finally, use full or selective device
wipe.

- Compromised Devices: mobile devices Users can jailbreak


or root devices operating system to gain high privileges and
install apps from unauthorized app stores. According to
Forbes, 18 million iOS devices had been jailbroken within six
weeks of jailbreak tool availability and 24 percent of mobile
phones currently on corporate networks are jailbroken. To
counter this threat, you must continuously monitor device
compliance, and identify and block compromised devices
from accessing enterprise networks and apps.

- Data Leaks: while employees using their own mobile devices to


do the work and use them to save the organization information,
this mean unmanaged file sharing is causing data leaks.
- Bring Your Own Apps: Employees are relying on personal apps,
such as file sync and sharing tools, for work purposes, increasing
the risk of data loss and potential breaches.

- Malicious and Risky Apps: According to Norton Mobile Insight,


as of October 2014, there were three million malicious appsand
eight million apps with risky behaviorscirculating. These risky
behaviors included stealing information (19%), tracking the user
(22%), posing traditional threats (26%), sending content (13%),
and reconfiguring the device (13%), so organizations should be
managed these threats by detect or block these apps based on its
behavior.

7.Solving the Security issues:

As we described before there are many issues associated with using


mobile devices in organizations, so Securing how employees can use any
kind of mobile devices to access corporate content is becoming
increasingly important. The proliferation of Bring-Your-Own-Device
(BYOD) initiatives where employees can use their own devices, which
may not have any security software installed.
Giving your employees remote access through their own devices to
corporate data and information is great, but there are risks involved.
These risks are often what put companies off incorporating a BYOD policy
into their firm, regardless of whether or not it would be beneficial to the
businesss bottom line.
Many security managers have officially found the disconcerting
implications: less control than ever over enterprise data access from a
myriad of consumer devicesincluding a groundswell of bring your own
devices (BYODs)and more difficulty determining which devices are
accessing which systems and data.
So, it's nothing unexpected that as utilization of individual mobile
devices grows and becomes pervasive inside and outside the office,
employers are struggling to enable secure use of BYODs.
Common Mobile Spyware Features:
Here it is mentioned what are the ways and from where can the hackers
take the chance for attacking.

Call Log Each approaching and active number is logged along with
duration and time stamp.
SMS (Text Messages) Log Every text message is logged even if the
phone's logs are deleted. Includes full text.
GPS Locations Log GPS positions are exchanged at general intervals
with a connection to a guide. Contacts Every contact on the phone is
logged. New contacts exchanged at general. Tasks all individual tasks
that are created are logged and viewable.
Cell ID Locations ID data on all cell towers that the device goes into
scope of is recorded. E-Mail Log all inbound & outbound email activity
from the essential email account is recorded. Calendar Events every
calendar event is logged. Date, time, and locations are recorded.
URL (Website) Log all URL website addresses visited using the phone's
browser are logged.
Photo & Video Log all photos & videos taken by the phone are recorded
& are viewable.

Mobile device + Camera + GPS + social media?


Now a day all the mobiles have these features which are good for the
users but it is risky because it can be used by the hackers as:
Risky
No Privacy
Criminal
Human trafficking

Security Risk = Threat VS Vulnerability


8.What should we do?
We must work together to reduce the gap for these issues by these 9
Simple Solutions to BYOD Security Risks That Affect Your Company.
1. Encrypt all data passing between the network and the
users mobile device

Network encryption secures all data passing from a mobile device to a


server and back, preventing external parties from being able to read it.
Common types of encryption include Virtual Private Networks (VPN) or
Secure Socket Layer (SSL) depending on the type of service that needs
to be secured.
Alternatively (or additionally), you can choose to encrypt at an app level.
In doing so, if the device is lost or stolen, all the data held within the app
is useless without a secure username and password. These details are
stored and controlled in a central location, which means you have
complete control over your data.
2. Limit mobile devices to access only certain safe resources,
such as corporate email or internal documents

Restrict the access that mobile devices owned by your employees have,
and limit the files/documents that they can reach. For example, you may
have sensitive data that employees will more than likely not need to
access whilst theyre commuting or on a portable device.
3. Block undesirable apps from being downloaded

As a further measure, you can restrict which apps can or cannot be


downloaded on your employees devices. This decreases the probability
that the corporate data will be impacted by any external parties
attempting to hack into the respective devices.
4. Delete mobile data contained on the device remotely

You can wipe all corporate data remotely from a mobile device. This
means that if an employee loses their mobile device or if they leave the
company, all sensitive app data can be deleted and if the mobile
device is found, content can easily be restored.
5. Remotely lock down the app until the device can be fixed

You can essentially block the app ensuring that no unwanted users have
access through it. This prevents any data being lost or corrupted.
6. Implement a login system that ensures the account
belongs to a valid employee

Single Sign-On (SSO) is a secure and convenient way of doing this


because it allows employees to log into all their apps and accounts using
a single password and it enables IT to centrally manage all accounts.
7. Require users to regularly change the password on their
mobile device

To decrease the chances of hacking and virus attacks, a password policy


can be implemented, requiring employees to set strong passwords for
their mobile devices and to change them regularly.
8. Add additional layers of security and password protection
to apps
The email authentication system uses the unique email domain name of
your company to verify the user. If a user doesnt have a company email
address, they cant verify themselves and will be unable to log in.
By using this system, you can ensure that key content isnt being
accessed by non-company users. Which is great if you dont have a
private app store or a mobile device management system and you want
to list your employee apps in the public app stores.
9. Use enterprise app stores to distribute apps privately to
employees only

The main benefit of enterprise app stores is that they ensure apps can
only be downloaded by people who are given access, often employees.
Using an enterprise app store rather than the public app stores also
means that apps are not subject to the public app stores guidelines for
submission and approval times, that can take as long as 15 days for
Apple.

Mobile device diversity management


Part of the beauty of mobile devices is the fact that their default
functionality can be expanded by installing apps. Even in a corporate
context, this can be extremely useful: productivity tools or configuration
apps can significantly increase the amount of use cases for mobile
devices. At the same time, corporate devices should provide a
controlled environment, making sure that apps cannot cause
compatibility problems, leak sensitive information, or spread malware.

App management is a powerful way to control the functionality of a


mobile device, balancing security with usability. Separating the good
apps from the bad can be a difficult task. Some apps are clearly
unsuitable for corporate environments, such as games. Others may
serve some purpose, but can possibly harbor privacy risks, such as
online file storage services. Even apps that seem risk-free may later
turn out to be compromised, either because the app itself contains
security flaws, because its backend services are
Compromised, or because it insecurely transmits information.
Productivity is also a factor: for example, employees that only need a
smartphone in order to call and make appointments, would only get
access to phone and calendar components, while employees that are
working on documents on the road get access to browser, office apps
and other required components.
9.Cross Mobile Platform Development Tool.
There are different advantages gave by cross-stage tools (CPT): low
incremental expenses and large amounts of code reuse, brief time-to-
market, expanded general application quality. Utilizing CPTs gives the
designers a chance to address different stages. The developers in IT
offices can team up just with one tool, and utilize a similar development
language. Please, find the following table for CPT:
3
Develope Website
Technol r
ogy
name
1. AMPchro Antenna http://info.antennasoftware
ma(Ante Software, .com/ampchroma
nna) Inc.
2. Appmob appMobi http://www.appmobi.com/
i
3. Bedrock Metismo(A http://www.metismo.com/b
quired by edrock.html
Software
AG)
4. Corona Ansca http://www.anscamobile.co
m/corona/
5. Dragonr Seregon http://dragonrad.com/
ad Solutions
Inc.
6. Dynamic DHTMLX http://dhtmlx.com/touch/
X LTD.
7. expanzP Expanz http://www.expanz.com/
LATFOR
M
8. FeedHen FeedHenry http://feedhenry.com/
ry
9. Flex Adobe
10. iFactr itr- http://itr-mobility.com/
mobility
11. Ipfaces Edhouse http://www.ipfaces.org/
12. Jmango Jmango http://jmango.net/
13. jQTouch David http://www.jqtouch.com/
Kaneda,
creative
director at
Sencha
and
maintaine
d by
Jonathan
Stark
14. Jquery The http://jquerymobile.com/
mobile jQuery
Project
15. Kony Kony http://www.kony.com
16. Marmala Ideaworks http://www.madewithmarm
de 3D alade.com/
17. Mincom mobile platform http://www.ventyx.com/
18. Monocro itr- http://www.monocross.net/
ss mobility
19. Monotou Xamarin http://xamarin.com/monot
ch ouch
20. Mosync MoSync http://www.mosync.com/
AB
21. Netbiscu Netbiscuit http://www.netbiscuits.com
its s /
22. Openplu Alcatel- http://www.openplug.com
g ellipse Lucent
studio
23. Phonega Adobe http://phonegap.com/
p
Nitobi
24. Pyxis Verivo http://www.verivo.com
Mobile(V Software,
erivo Inc
Software
)
25. Ramp Virtual http://ramp.virtualmobilete
Mobile ch.com/
Technologi
es
26. Rhodes Rhomobile http://www.rhomobile.com
Inc
(Motorola)
27. Runrev RunRev http://www.runrev.com/
28. SAP- Sybase http://www.sybase.com/mo
Sybase Inc. (An bileservices
SAP
company)
29. Sencha Sencha http://www.sencha.com/
Touch Inc
30. Sproutc Strobe Inc. http://sproutcore.com/
ore
31. Strobe Strobe Inc. http://www.strobecorp.com
/
32. Syclo Syclo http://www.syclo.com/
33.Syncfusion onebase Syncfusion http://www.syncfusion.com

34.Titanium Appcelerator Inc http://www.appcelerator.com

35.Unify/unity Unity Technologies http://unity3d.com/unity/

36.Unreal Epic Games Inc. http://www.unrealengine.com/

37.Worklight Worklight Inc.(IBM) http://www.worklight.com/

In the wake of exploring all CPTs, we prototyped a basic situation and


looked at client encounters and execution in our outcomes made by the
three cross stage innovations for three unique stages: android, iOS and
windows.

These three advancements were picked in light of our necessities. In


light of the thirty-seven CPTs' abilities, it was understood that CPTs are
not develop enough to cover our necessities in security and consistence,
as well as in user interface and execution. It was found that the majority
of the CPTs are not solid as for security, consistence and device
management as:

I. Device Usage Monitoring: The mobile platform should support the


monitoring of the usage of the devices. For example, battery status,
online time, network bandwidth usage etc.
II. Application usage monitoring/diagnostics: The mobile platform should
be able to monitor the usage of applications and provide diagnostics
support in the case of failures.
III. Remote Device Management: The mobile platform should allow the
remote management of devices in the field. For example, change the
configuration of a device or the provisioned set applications for a user.
IV. Security: The platform should support identification/authentication and
access rights (log in, access to certain functions), including encryption
support, i.e., encrypt messages between server and mobile application
and encrypt any data stored on device.
V. Integration/Interoperation :

MDM and Cross Platform Development


On the top left side of the following Figure, the source code of two
different mobile applications is depicted as mobile application code.
Below these two is the cross-platform development platform visualized
which besides providing general application functionality (e.g. logging,
data structures, UI toolkit, backend integration etc.) transforms the
mobile application code into mobile OS specific binaries, i.e. a package
that could be executed on a specific mobile operating system. The
Mobile Device Management (MDM) software (lower middle part of Figure)
offers these binaries in a company specific app store. Besides this
functionality another key feature is that MDM software can act as a VPN
endpoint or mobile application endpoint, providing a secure and
authenticated connection between the Mobile Application on the Client
(i.e. a mobile device) and the Mobile application specific backend on the
Server side. It is important to note that most MDM technologies also
deploy a MDM agent on the Client, which interacts with the mobile
operating system to create a policy area around the Mobile Application.
Some MDMs also offer an API that the MDM agent can expose to a Mobile
application.

Mobile Device Management (MDM)


Organizations that decide to use a mobile solution in their enterprises
are faced with security challenges for their privacy and data
management. This section describes why there is a need to manage
multi-platform mobile device and data security as well as what kind of
risks organizations face from letting mobility solutions in their workplace.
1. RAPID GROWTH IN THE MOBILE DEVICE MARKET.
2. GROWING USE OF PERSONAL DEVICES IN THE WORKPLACE.
3. WRESTLING WITH CORPORATE/PERSONAL DEVICE USE.
4. MANAGING MOBILE DEVICES IS DIFFICULT AND RISKY.
5. The Need to Use Policy Management

MDM Technologies
After investigating the MDM market; the most popular suppliers were
selected for further investigation. In this process, large numbers of MDM
providers were discovered. 36 of them that are more capable in todays
market. Some of them are listed as the following table:

MDM solution Name WebSite


Fancyfon www.fancyfon.com/
McAfee http://www.mcafee.com/us/
campaigns/mobile-
security/index.html
BoxTone http://boxtone.com/
Mobile Active Defense http://www.mobileactivedef
ense.com/
Zenprise http://www.zenprise.com/
Sybase http://www.sybase.com/
MobileIron http://www.mobileiron.com/
Fiberlink http://www.maas360.com/
AirWatch www.air-watch.com/
Excitor http://www.excitor.com/
Good Technology http://www1.good.com/
Symantec http://www.symantec.com

Benefits of Mobile Device Management


Regulatory Compliance
For many organizations, adherence to regulatory compliance standards is
a necessity for their business. This requires that security not be
circumvented on an unauthorized mobile device and that reporting
capabilities allow for network integrity to be confirmed. One of the
benefits of mobile device management services is that compliance
initiatives can be monitored and tracked through a centralized console.
Supports BYOD
While traditional technology support may shy away from any device that
isnt owned by the company touching the network, BYOD has huge cost
savings and productivity benefits. In the past several years, many
organizations have begun to loosen their grip on policies around
employees using mobile devices to access certain data, such as email
and calendars. However, attention does still need to be paid to ensuring
that company security is not compromised for the sake of efficiency.
Properly managing these devices means that no security will be
compromised when these personal devices are being used.
Remote Management of Users and Devices

Being able to manage users and their devices remotely are huge
benefits of mobile device management. By remotely monitoring and
managing your mobile devices, you can guarantee the security and
health of all mobile devices connected to your network 24/7.
Additionally, having remote control over mobile devices provides the
ability to remotely disconnect or disable any unauthorized users or
applications.

Controlled Device Updates

As with most technology management, making sure that all systems


are up-to-date and patched is a vital component of security. One of the
benefits of mobile device management, especially when outsourced to
a managed security services provider, is that these updates can be centrally
controlled and audited. This not only protects your devices and data,
but is also a requirement for government compliance regulations, such
as HIPAA, SOX, and PCI.

Application Control

Any applications that are necessary in order for your workforce to


remain productive on their mobile devices also needs to be controlled
and regulated. Mobile device management provides centralized control
to allow for users to install these applications on their devices. The
centralization of mobile device management provides for several
additional benefits such as role-based access management and the
ability to remove or disable an application if a business process
changes.

Security Policy Enforcement

Another one of the benefits of mobile device management is that the


same security procedures and protocols that are in place for your
organization will be able to extend to protect the mobile devices on
your network in addition to the static ones. This means things such
as identity management, password regulations, access limitations, and
blacklists will all carry across to mobile devices, so no loop in security
protocols will be created.

Automated Device Registration

Mobile device management solutions are usually equipped to be able


to support new device registration automatically. For many, the user or
owner of a specific device can be sent and email that will allow them to
register the device and then gain access to their various programs and
applications that they need. This removes the need to pass around a
protected key that would cause serious disruption if it was misplaced or
even fell into the wrong hands. It also removes the IT department from
the responsibility of having to manually set up every device when one
of the employees gets a new phone or tablet and wants to check their
email.

Provide for Data Backup & Restore of Corporate Data

When a device is connected to a mobile device management solution,


data that is connected to one of the corporate applications will
automatically be backed up in accordance with the companys
traditional backup policies. This supports business continuity
measures through alleviating mobile devices from being a single point of
failure for information loss.

With all the benefits of mobile device management allow you to be able
to accept mobile devices, and the increased worker productivity they
provide, into your organization without worrying about whether or not
you are compromising your data or security.

Conclusion

As we discussed before we condoled that the way of doing work are


changes and organization should follow these changes to follow the
market needs and use whatever technologies that will bring them a
competitive advantage, as we discovered in this reports the use of
mobile devices in enterprise can bring a lot of benefits, but when use it
they should consider the security and privacy issues that comes with it
and make sure the appropriate controls are in place.

References
Collar, A. (2015, 07 30). 7 Benefits of Mobile Device Management. Retrieved
from Orion Technology Services : http://www.oriontech.com/7-benefits-
of-mobile-device-management/
EYGM Limited. (2013, 09). Bring your own device - Security and risk
considerations for your mobile device program. Retrieved from
www.ey.com: http://www.ey.com/gl/en/issues/insights
G DATA Software AG . (n.d.). Mobile Device Management . Retrieved from G
DATA Software AG:
https://file.gdatasoftware.com/web/en/documents/techpaper/G_DATA_Te
chPaper_Mobile_Device_Management_English.pdf
Majdi, E. B. (2013). EVALUATION OF MOBILE DEVICE MANAGEMENT TOOLS
AND ANALYSING INTEGRATION MODELS FOR MOBILITY ENTERPRISE.
Ume, Sweden: Ume University.
Terry, R. (2015, 03 23). Top 7 Risks of Enterprise Mobility. Retrieved from
Symantec Official Blog: https://www.symantec.com/connect/blogs/top-7-
risks-enterprise-mobility-1

Das könnte Ihnen auch gefallen