From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Mobile security enforcement

Mobile security enforcement

- [Instructor] Mobile devices are packed with a wide variety of features and new ones appear on the market each time that the manufacturer upgrades devices. Security professionals should carefully monitor the use of these features and enforce restrictions on features that may pose a risk to security. I've already explained how you can use mobile device management or MDM solutions to restrict the configuration of mobile devices and enforce your organization's security policies. There are some ways that users might attempt to circumvent these controls. First, if you depend upon the device manufacturer's App Store for the use of trusted apps, you should know that there are a variety of third party App Stores available on the internet. And those may not be as reliable and secure as the manufacturer's App Store. Installing apps from unofficial sources is known as sideloading as it bypasses the normal application loading…

Contents