Craft security policy for mobile devices

Understanding the four variables that shape a cloud mobile security policy

From the developerWorks archives

Judith Myerson

Date archived: November 29, 2016 | First published: October 17, 2011

Enterprise users are not bound to one mobile device to access a cloud service: A user can choose to enroll more than one mobile device to an enterprise server for better device access flexibility. This flexibility makes having corporate security policy more critical than ever. To help you understand security for mobile device access to the cloud, the author illuminates the service delivery model view and the device view of the environment and presents service delivery model scenarios with checklists.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Cloud computing, Security
ArticleID=765929
ArticleTitle=Craft security policy for mobile devices
publish-date=10172011