Threat Intelligence Blog
Contact us to discuss any insights from our Blog, and how we can support you in a tailored threat intelligence report.
What is MDM? The first of a new series explaining different technical controls, in this episode James explains Mobile Device Management
Welcome to this week's Cyber Tip Tuesday. This week James is doing the first of a series looking at specific technical controls, this week Mobile Device Management, or MDM You may have heard of MDM…but what is it? Mobile Device Management is the technology used to administer mobile devices such as phones, tablets and laptops. Because these devices often run across platforms provided by different vendors, for example, Apple's iOS, Google's Android or Microsoft Windows they must be managed by a product that is compatible with all of them. If your company's confidential data is stored or accessed on any of these devices then it is important that you extend your technical controls to encompass the unique security requirements and vulnerabilities that can be exploited to gain access to it. If you'd like to know more about MDM or other technical controls, please contact us.
Welcome to this week's Cyber Tip Tuesday.
This week James is doing the first of a series looking at specific technical controls, this week Mobile Device Management, or MDM
You may have heard of MDM… but what is it?
Mobile Device Management is the technology used to administer mobile devices such as phones, tablets and laptops. Because these devices often run across platforms provided by different vendors, for example, Apple's iOS, Google's Android or Microsoft Windows they must be managed by a product that is compatible with all of them.
If your company's confidential data is stored or accessed on any of these devices then it is important that you extend your technical controls to encompass the unique security requirements and vulnerabilities that can be exploited to gain access to it.
If you'd like to know more about MDM or other technical controls, please contact us.