Hearst Mobile Device Secuirty

Get Started. It's Free
or sign up with your email address
Rocket clouds
Hearst Mobile Device Secuirty by Mind Map: Hearst Mobile Device Secuirty

1. Laptops

1.1. LoJack

1.1.1. Provides audit trail if data is stolen

1.1.2. Locate Stolen/Lost machine

1.2. Encryption of Files

1.2.1. Folder Based File Encryption for sentive documents

1.2.2. Hard disk encryption

2. Smart Phones

2.1. Andriod

2.2. iPhone

2.2.1. Exchange Provides Mobile Wipe

3. Tablets

3.1. iPad

3.2. Kindle

3.2.1. Kindle presents unique security challenge

3.3. Andriod

4. Enterprise Policy

4.1. Require email session encryption.

4.2. Wipe devices if they are lost or stolen.

4.3. Protect devices with a passcode lock.

4.4. Autolock devices after periods of inactivity.

4.5. Autowipe devices after failed unlock attempts.

4.6. Protect the configuration profile.

4.7. Continuously refresh policies.

4.8. Portable Media

4.8.1. Flash Drives

4.8.1.1. Encrypting flash drives

4.8.1.2. Policys Can be set to only Allow Approved Drives

4.8.2. CD/DVD

5. 3rd Party Mobile Platform Secuity Solutions

5.1. Afaria by sybase

5.2. Good - For enterprise

5.3. Mobile Iron

6. Users

6.1. Training on Mobile Device during orientation

6.2. Yearly refresher