Mobile Device Security For Dummies®
(Sprache: Englisch)
The information you need to avoid security threats on corporate mobile devices
Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential...
Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential...
Leider schon ausverkauft
versandkostenfrei
Buch
20.40 €
Produktdetails
Produktinformationen zu „Mobile Device Security For Dummies® “
Klappentext zu „Mobile Device Security For Dummies® “
The information you need to avoid security threats on corporate mobile devicesMobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate information.
Provides a practical, fast-track approach to protecting a mobile device from security threats
Discusses important topics such as specific hacker protection, loss/theft protection, backing up and restoring data, and more
Offers critical advice for deploying enterprise network protection for mobile devices
Walks you through the advantages of granular application access control and enforcement withVPN
Business can be mobile without being vulnerable-and Mobile Device Security For Dummies shows you how.
Factor mobile devices into your IT equation and learn to work securely in this smart new world Smartphones and tablets have invaded the workplace, and your employees are using them to access the Internet, transmit information, and even communicate with internal systems every day. Security nightmare?
It doesn't have to be! Read this book and you'll uncover how to lock down those mobile devices so doing business on the go doesn't do you in.
- You can't beat 'em -- see how to assimilate smartphones, tablets, and other mobile devices safely into your organization
- Know the players -- understand and accommodate the needs of users, admins, management, and vendors; they all have a stake in mobile device security
- Explore your options -- compare mobile device management solutions, including Exchange ActiveSync and Open Mobile Alliance Device Management
- Make policies work together -- learn to structure policies for mobile devices that comply with existing company policies
- Examine the tools -- discover all the advantages your VPN can provide
- The big picture -- create loss/theft protection, anti-virus, and backup/restore protocols
- Real-world application -- review case studies that use Junos Pulse and learn how solutions have been applied
Open the book and find:
- Threats posed by mobile apps
- Why remote management is important
- What you can and can't control
- Tips for effective enforcement
- Advice on keeping policies up to date
- Options for anti-hacker protection
- Loss/theft procedures for Apple iOS, Symbian, and Android devices
- Ten steps to take when allowing smartphones on your network Learn to:
- Protect your company's mobile devices against online threats, loss, or theft
- Back up and restore critical data and documents
- Control and enforce granular access with VPNs
- Develop and implement a corporate mobile security plant protection, anti-virus, and backup/restore protocols
- Real-world application -- review case studies that use Junos Pulse and learn how solutions have been applied
Open the book and find:
- Threats posed by mobile apps
- Why remote management is important
- What you can and can't control
- Tips for effective enforcement
- Advice on keeping policies up to date
- Options for anti-hacker protection
- Loss/theft procedures for Apple iOS, Symbian, and Android devices
- Ten steps to take when allowing smartphones on your network Learn to:
- Protect your company's mobile devices against online threats, loss, or theft
It doesn't have to be! Read this book and you'll uncover how to lock down those mobile devices so doing business on the go doesn't do you in.
- You can't beat 'em -- see how to assimilate smartphones, tablets, and other mobile devices safely into your organization
- Know the players -- understand and accommodate the needs of users, admins, management, and vendors; they all have a stake in mobile device security
- Explore your options -- compare mobile device management solutions, including Exchange ActiveSync and Open Mobile Alliance Device Management
- Make policies work together -- learn to structure policies for mobile devices that comply with existing company policies
- Examine the tools -- discover all the advantages your VPN can provide
- The big picture -- create loss/theft protection, anti-virus, and backup/restore protocols
- Real-world application -- review case studies that use Junos Pulse and learn how solutions have been applied
Open the book and find:
- Threats posed by mobile apps
- Why remote management is important
- What you can and can't control
- Tips for effective enforcement
- Advice on keeping policies up to date
- Options for anti-hacker protection
- Loss/theft procedures for Apple iOS, Symbian, and Android devices
- Ten steps to take when allowing smartphones on your network Learn to:
- Protect your company's mobile devices against online threats, loss, or theft
- Back up and restore critical data and documents
- Control and enforce granular access with VPNs
- Develop and implement a corporate mobile security plant protection, anti-virus, and backup/restore protocols
- Real-world application -- review case studies that use Junos Pulse and learn how solutions have been applied
Open the book and find:
- Threats posed by mobile apps
- Why remote management is important
- What you can and can't control
- Tips for effective enforcement
- Advice on keeping policies up to date
- Options for anti-hacker protection
- Loss/theft procedures for Apple iOS, Symbian, and Android devices
- Ten steps to take when allowing smartphones on your network Learn to:
- Protect your company's mobile devices against online threats, loss, or theft
Inhaltsverzeichnis zu „Mobile Device Security For Dummies® “
Introduction 1Part I: Living Securely in the Smart World 7
Chapter 1: What's So Smart About a Phone, Anyway? 9
Chapter 2 : Why Do I Care? The Mobile Device Threat 33
Chapter 3 : Planning for Mobile Devices in the Enterprise 57
Part II: Implementing Enterprise Mobile Security 77
Chapter 4: Creating Mobile Device Security Policies 79
Chapter 5: Managing and Controlling Devices 105
Chapter 6: Conforming to Corporate Compliance Policies 127
Part III: Securing Smart Device Access 147
Chapter 7: Securing Data in Transit with VPNs 149
Chapter 8: Connecting to Wi-Fi Networks 177
Part IV: Securing Each Smart Device 187
Chapter 9: Device Security Component Overview 189
Chapter 10: Hacker Protection and Enforceable Encryption 209
Chapter 11: Protecting Against Loss and Theft 233
Chapter 12: Educating Users about Backing Up Data 247
Chapter 13: Securing Mobile Applications 263
Part V: The Part of Tens 273
Chapter 14: Top Ten Online Information Sources 275
Chapter 15: TopTen Mobile Security Vendors 279
Index 283
Bibliographische Angaben
- Autoren: Rich Campagna , Subbu Iyer , Ashwin Krishnan
- 2011, 1. Auflage., 408 Seiten, mit Schwarz-Weiß-Abbildungen, mit Abbildungen, Maße: 23,6 cm, Kartoniert (TB), Englisch
- Verlag: Wiley & Sons
- ISBN-10: 0470927534
- ISBN-13: 9780470927533
Sprache:
Englisch
Kommentar zu "Mobile Device Security For Dummies®"
0 Gebrauchte Artikel zu „Mobile Device Security For Dummies®“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Mobile Device Security For Dummies®".
Kommentar verfassen