img
Home > Design Patterns > Mobile BYOD Security

Mobile BYOD Security (Cope, Erl)

How can mobile device access to IT resources be secured?

Mobile BYOD Security

Problem

Consumers often need to access enterprise information systems, whether they are on-premise or remote, using mobile devices including laptops, tablets, and smart phones, which pose special security requirements.

Solution

According to the BYOD security requirements and policy developed, a security framework is established to monitor, control and protect the mobile devices, their applications and data, and their network connections.

Application

An enterprise mobility management (EMM) system is implemented, covering the special security requirements of mobile devices.
Mobile BYOD Security: Solutions for monitoring, controlling, and protecting mobile devices include the device (A), network (B), and integrating with corporate SIEM and logging systems for visibility and monitoring for compliance (C).

Solutions for monitoring, controlling, and protecting mobile devices include the device (A), network (B), and integrating with corporate SIEM and logging systems for visibility and monitoring for compliance (C).

CloudSchool.com Cloud Certified Professional (CCP) Module 7: Fundamental Cloud Security
CloudSchool.com Cloud Certified Professional (CCP) Module 8: Advanced Cloud Security

This mechanism is covered in CCP Module 7: Fundamental Cloud Security and
in Module 8: Advanced Cloud Security.

For more information regarding the Cloud Certified Professional (CCP) curriculum, visit www.arcitura.com/ccp.

Cloud Computing Design Patterns

The architectural model upon which this design pattern is based is further covered in:

Cloud Computing Design Patterns by Thomas Erl, Robert Cope, Amin Naserpour

(ISBN: 9780133858563, Hardcover, ~ 528 pages)

For more information about this book, visit www.arcitura.com/books.