The CIO's Guide to Mobile Security

The CIO's Guide to Mobile Security

Cover
Mobile security is a growing concern as organizations look to gain competitive advantages through the use of a remote workforce. While most organizations allow computers to access business systems behind the corporate firewall through a virtual private network, wireless devices often access corporate assets with little or no security.

Read this paper to learn about the security vulnerabilities that can arise when wireless devices access corporate data, including:

  • Integrity of the corporate firewall
  • Confidentiality, integrity and authenticity over the network
  • Confidentiality of data on the devices
  • Virus and other malware protection
  • Supporting existing corporate security standards
  • Establishing, enforcing and periodically updating security policies
Vendor:
BlackBerry
Posted:
15 Jun 2007
Published:
01 Oct 2006
Format:
PDF
Length:
17 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor