by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 15, 2013
67 CDWG.com | 800.808.4239 Typically, enterprise MDM software allows full management of organization-issued devices and partial management of BYOD systems. This means basically controlling --- and securing --- a portion of each personal device for organizational use while leaving the rest of the device under the control of its owner. In terms of security, this means keeping all sensitive information and operations within that secured portion. So instead of providing full- fledged device security (securing the user's entire device), enterprise MDM software provides content security (securing the organization's content on the user's device). The alternative to enterprise solutions such as MDM software is to manually secure each personally owned device. Such an approach is highly resource-intensive and error-prone, so it's generally not a viable option. Plus, it then becomes nearly impossible to maintain the configuration (and security) of devices that are outside the direct control of the organization. If an entity has to rely on users to manually maintain the security of their own devices or on system administrators to manually update devices when they are brought into the How Will Mobile Security Solutions Benefit My Organization? Secure mobile environment, peace of mind With the right policies, tools, and technologies in place, IT staff can feel secure about their end- user mobile environments Improve end-user experience When mobile devices are pre-configured with the right security settings, end users can enjoy a secure device experience Greater job satisfaction and productivity S i mp li fied I T MDM, along with a unified policy reform, offers IT staffs the ability to manage mobile security through automated and centralized means Better ROI MDM helps minimize cost and downtime organization's facilities, it's almost guaranteed that there will be serious security and operational problems with the devices, which in turn will hurt productivity, cost the organization more in technical support costs and endanger sensitive information. Additional Security Controls There are many other add-on security controls emerging for securing mobile devices. Major categories include the following: Host-based firewalls: Most smartphones and tablets traditionally haven't run host-based firewalls because they relied on network-based firewalls (such as those on cellular networks) to prevent unauthorized access. Now, however, mobile devices are increasingly connected to wireless LANs and other networks that don't provide protection through network-based firewalls. Because of this change, it makes sense for an organization establishing a BYOD program to deploy host- based firewall solutions for mobile devices. It's important to know, however, that host-based firewalls for smartphones and tablets are newer solutions, therefore, offerings and options may be limited. Anti-virus software: Anti-virus software on a mobile device can be helpful at stopping malware threats from compromising the device. As with host-based firewalls, anti-virus software for smartphones and tablets is also a more recent development. There are some solutions available, but be sure to research them and how they interact with the specific devices used within the organization because some of them can significantly impact performance. Mobile web security: Many browsers include security controls that may also be helpful for maintaining device security. One example is anti-phishing protection, which can prevent a user from being tricked into visiting a fraudulent website.
August 30, 2013
September 30, 2013