Company: Research In Motion
Category: Security Policies
Published: January 2011
In the PC world, IT can standardise on a platform. But in the mobile domain, IT must support numerous types of hardware and software including various versions of Windows Mobile, RIM BlackBerrys, Apple iPhones, Symbian devices, Palm devices and Linux based devices such as Google’s Android phones.
IT must reduce the threats associated with loss, theft and malicious attacks on new mobile devices.
Given the unique aspects of mobile devices, such as limited processing power, storage limitations and the need to manage power consumption, IT must build solutions that are mobile‐aware.
There is no one size fits all mobile security solution. A firm must decide how much confidential data will be on its users’ devices and build a solution that maps the rigorousness of the security to the data risk. Read the paper to find out more.
Rating: + 1
Mobile Working | January 2011 | Analyst Report
Strategic Planning | January 2011 | White Paper
Wireless Technologies | September 2009 | White Paper
Accounts Receivable/ Accounts Payable | June 2009 | Analyst Report
Mobile Working | June 2009 | Case Study
© Incisive Media Investments Limited 2013, Published by Incisive Financial Publishing Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 04252091 & 04252093.