Securing Mobile Devices in the Enterprise: Mobile Security Threat Mitigation

  • Description
  • Reviews (0)

Description

Once you have identified threats to mobile security, the next step in creating the fully mobile-aware enterprise is to look at mitigation strategies. In this course, you will learn about threat mitigation in a small, unmanaged environment; in a semi-managed environment using Exchange ActiveSync; and in a fully managed environment using a mobile device management (MDM) solution. You will also learn about mitigation from a Bring Your Own Device (BYOD) and a company-owned device (COD) perspective.

Reviews

There are no reviews yet.

Be the first to review “Securing Mobile Devices in the Enterprise: Mobile Security Threat Mitigation”