Pluralsight – Mobile Device Management – The Big Picture 3.1 3.1.18 3.1.19 Access Control
In this course, you'll learn what mobile device management (MDM) is, and how it can be used to secure your environment and create a great user experience.
In this course, you'll learn what mobile device management (MDM) is, and how it can be used to secure your environment and create a great user experience.
The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes.
This sample policy from Rutgers is an example of how an organization can define the requirements associated with access to, and usage of, wireless networks.
This sample policy provided by SANS discusses removable media.
This SANS course will prepare you to effectively evaluate the security of iOS and Android mobile devices, assess and identify flaws in mobile applications, and conduct a mobile device penetration test, which are all critical skills required to protect and defend mobile device deployments. You will learn how to pen test the biggest attack surface in your organization; dive deep into evaluating mobile apps and operating systems and their associated infrastructure; and better defend your organization against the onslaught of mobile device attacks.
This policy from SANS provides an example of the conditions that wireless infrastructure devices must satisfy to connect to a company network.
This is a sample wireless communication standard for enterprise customization and implementation.
Some simple steps to keep you and your devices safe and secure.
This SANS whitepaper discusses how to deploy secure Enterprise wireless networks.
This SANS whitepaper is a step by step guide for users to be able to secure their wireless networks at home.