Hearst Mobile Device Secuirty

Comienza Ya. Es Gratis
ó regístrate con tu dirección de correo electrónico
Hearst Mobile Device Secuirty por Mind Map: Hearst Mobile Device Secuirty

1. Laptops

1.1. LoJack

1.1.1. Provides audit trail if data is stolen

1.1.2. Locate Stolen/Lost machine

1.2. Encryption of Files

1.2.1. Folder Based File Encryption for sentive documents

1.2.2. Hard disk encryption

2. Enterprise Policy

2.1. Require email session encryption.

2.2. Wipe devices if they are lost or stolen.

2.3. Protect devices with a passcode lock.

2.4. Autolock devices after periods of inactivity.

2.5. Autowipe devices after failed unlock attempts.

2.6. Protect the configuration profile.

2.7. Continuously refresh policies.

2.8. Portable Media

2.8.1. Flash Drives

2.8.1.1. Encrypting flash drives

2.8.1.2. Policys Can be set to only Allow Approved Drives

2.8.2. CD/DVD

3. Users

3.1. Training on Mobile Device during orientation

3.2. Yearly refresher

4. Smart Phones

4.1. Andriod

4.2. iPhone

4.2.1. Exchange Provides Mobile Wipe

5. Tablets

5.1. iPad

5.2. Kindle

5.2.1. Kindle presents unique security challenge

5.3. Andriod

6. 3rd Party Mobile Platform Secuity Solutions

6.1. Afaria by sybase

6.2. Good - For enterprise

6.3. Mobile Iron