Mobile Security: Configuration and Policy Management Best Practices
What is your mobility policy? Have you ever considered the impact of your mobility policy on your organization? On your employees?
Whether it is BYOD, CYOD or corporate owned, traditional mobile management will not cover the security aspect.
- Threats on mobile devices
- BYOD Vs. CYOD considerations
- Recorded and live demo of the SideStepper attack
- Live demo of how this attack is mitigated 3 times (SMS, Network, App) if this device was protected with SBM
- Discuss and show the security integration with EMM (Tagging)
via Check Point Software