Getting a handle on mobile devices

19.02.2009

Information Assurance

The EMM console lets security administrators create policies for each user based on the type of smartphone used and the security posture associated with the user's job. Policy assignments can also be made based on the user's membership within various groups listed in the enterprise's directory service.

For example, a corporate executive may require a more liberal security policy while a field sales representative might need a higher security policy because there is greater opportunity for device loss. Both policies would describe what IT administrative capabilities are supported by the EMM and specify encryption and password data protection for e-mail, contacts, calendars and documents.

All policies are delivered over the air to the smartphone agent that enforces the policy. Console reporting tools can be used to track the security posture of each user device for compliance reporting. NAC capabilities are also an essential part of the EMM platform and give the IA team a way to ensure user compliance.

Administration and operations