Remember the days of investment bankers and investors carrying around the Blackberry 850 that looked more pager than the start of today’s smart phone craze?
In our previous posts we surveyed regulations and standards with provisions that apply specifically to endpoints, and looked at the Information Security Handbook from the Federal Financial Institutions Examination Council (FFIEC) for guidance on best practices.
In our previous post we surveyed several regulations and standards with provisions that apply specifically to endpoints.
When I think of an IT workflow, I conjure a vision of a runbook that contains a number of specific steps to accomplish some critical task. In the realm of Endpoint Device Management, much of the time the result of the execution of these steps results in the creation, observation and analysis of a report in order to make sure that certain cost, quality, performance or compliance metrics are being met.
How healthy are your laptops? It’s not a question people regularly ask themselves. They assume that as long as the end user isn’t calling the Help Desk, everything is fine. But this is rarely the case.
android apple blackberry bring your own device byod cloud-computing emm enterprise mobility management ios ipad iphone it maas360 mam mdm mobile-device-management mobile application management mobile device management mobile security mobility mobility-as-a-service mobility-management security smartphone tablet