GB966 CyberOps Metrics Quick Start Guide: Mobile Device Management V1.3
- Maturity level: Level 4 - Forum Approved
-
Created By: Security & Privacy Project
This document will attempt to provide insights in to some best practices that will give you the ability to manage your mobile devices securely for your workforce. While MDM is a relatively new term, the concept is not, and its important to begin with a clear distinction between past and present best practice in MDM. Research in Motion (RIM) has had a Blackberry Enterprise Server (BES) server for a long time that controls user’s access to the web, applications and even pushes policies to BES attached Blackberry devices. In the less controlled world of iOS and Android, a different MDM solution is required.
It is up to each organization to enforce the policies that they want applied to the devices. As with any security solution, it is necessary to look at the risks to the actual operating business environment and not blind adherence to compliance standards when designing an operational and cost-effective solution. Once the risks are assessed, and appropriate solutions determined, you can then look at the KPIs that you may want to develop or use for management of the solution.
General Information