0%

Book Description

The information you need to avoid security threats on corporate mobile devices

Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate information.

  • Provides a practical, fast-track approach to protecting a mobile device from security threats

  • Discusses important topics such as specific hacker protection, loss/theft protection, backing up and restoring data, and more

  • Offers critical advice for deploying enterprise network protection for mobile devices

  • Walks you through the advantages of granular application access control and enforcement with VPN

  • Business can be mobile without being vulnerable and Mobile Device Security For Dummies shows you how.

    Table of Contents

    1. Cover
    2. Table of Contents
    3. Title Page
    4. Foreword
    5. Introduction
    6. Part I: Living Securely in the Smart World
      1. Chapter 1: What's So Smart About a Phone, Anyway?
      2. Chapter 2 : Why Do I Care? The Mobile Device Threat
      3. Chapter 3 : Planning for Mobile Devices in the Enterprise
    7. Part II: Implementing Enterprise Mobile Security
      1. Chapter 4: Creating Mobile Device Security Policies
      2. Chapter 5: Managing and Controlling Devices
      3. Chapter 6: Conforming to Corporate Compliance Policies
    8. Part III: Securing Smart Device Access
      1. Chapter 7: Securing Data in Transit with VPNs
      2. Chapter 8: Connecting to Wi-Fi Networks
    9. Part IV: Securing Each Smart Device
      1. Chapter 9: Device Security Component Overview
      2. Chapter 10 : Hacker Protection and Enforceable Encryption
      3. Chapter 11: Protecting Against Loss and Theft
      4. Chapter 12: Educating Users about Backing Up Data
      5. Chapter 13: Securing Mobile Applications
    10. Part V: The Part of Tens
      1. Chapter 14: Top Ten Online Information Sources
      2. Chapter 15: Top Ten Mobile Security Vendors
    11. Cheat Sheet