Mobile Security: Configuration and Policy Management Best Practices

What is your mobility policy? Have you ever considered the impact of your mobility policy on your organization? On your employees?

Whether it is BYOD, CYOD or corporate owned, traditional mobile management will not cover the security aspect.


  • Threats on mobile devices
  • BYOD Vs. CYOD considerations
  • Recorded and live demo of the SideStepper attack
  • Live demo of how this attack is mitigated 3 times (SMS, Network, App) if this device was protected with SBM
  • Discuss and show the security integration with EMM (Tagging)

via Check Point Software

About The Author
- Worldwide Leader in Securing the Future Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership. We are committed to staying focused on customer needs and developing solutions that redefine the security landscape today and in the future.

Tell us what you think...