Purchase this Document
Price: $195.00 USD (PAGES: 7)
To purchase this document, you will need to register or sign in above.
There are a variety of security approaches to securely enable the use of employee-owned or consumer-driven smartphones and tablets. Security programs need to match the use case to the best mixture of these tools.
Table of Contents
How Much Security Do You Need?
- How Much Security Do You Need?
Tools in the Mobile Security Tool Belt
Use-Case Examples (From Gartner Clients)
- Financial Services Firm Uses NAC and MDM for iPad Access to Email and Requires Citrix Receiver for Access to Sensitive Customer Applications
- Field Service Organization Uses MDM for iPad Access to Support System
- Government Agency Uses MDM With Containerization for Email Access
- DoD Investigates Secure MVNOs
- Tools in the Mobile Security Tool Belt