Je hebt een klacht over de onderstaande posting:
Deel 2 Don't approach the mobile side the way you did the PC side. Mobile is truly a different animal. There are really 3 things you need to know. 1) utilize mobile device management capabilities to enforce a) policy b) authentication control c) remote wipe d) lock e) locate f) and more 2) utilize device security control capabilities to provide a) antivirus b) firewall c) application control 3) get a comprehensive mobile-specific security policy in place. Because this is so different, you may need consultants for it. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------28.09.2011 SmartPhones and Tablets in the Enterprise Gartner ...
Beschrijf je klacht (Optioneel):