Craft security policy for mobile devices
Understanding the four variables that shape a cloud mobile security policy
From the developerWorks archives
Date archived: November 29, 2016 | First published: October 17, 2011
Enterprise users are not bound to one mobile device to access a cloud service: A user can choose to enroll more than one mobile device to an enterprise server for better device access flexibility. This flexibility makes having corporate security policy more critical than ever. To help you understand security for mobile device access to the cloud, the author illuminates the service delivery model view and the device view of the environment and presents service delivery model scenarios with checklists.
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.