How can you ensure that a user does not tamper with or disable mobile device security?
Requires Free Membership to View
All your security components should provide for proper protection, locking and monitoring. For example, your mobile device management tool should identify changed states. Based on the compliance check, the system can initiate several actions, such as wiping the device and/or sending an alert to the administrator. Your security should protect software against any kind of modifications and particularly prevent the uninstallation of applications from the device.
This was first published in March 2013
Network Management Strategies for the CIO

Join the conversationComment
Share
Comments
Results
Contribute to the conversation