Mobile Security for Smart Phones, Tablets & other BYOD Devices

There is an app for every conceivable purpose, and some of them will damage your systems, services, or reputation.

Understanding the risks these smart phone and tablet devices pose to the enterprise, developing appropriate policies (e.g., are your going to allow personally owned devices to download corporate email [BYOD]), developing baseline mobile device security settings, remotely wiping corporate data when devices are lost or stolen, and securely integrating these hand held devices into the IT authentication infrastructure is no small challenge.