MDM Configuration Reviews

Show left menu  
Hide left menu  

As mobile devices are increasingly used to access sensitive enterprise data, the security of these devices is of increasing concern. Whether these devices are corporately owned or are part of a Bring Your Own Device (BYOD) programme, they require management and policy enforcement to ensure data remains protected. This management is often centralised in the form of Mobile Device Management (MDM) solutions.

In performing MDM solution security reviews, Context assess the deployed MDM solution configuration, the supporting network architecture as well as the  mobile device security policies and management processes. The assessment is performed via hands-on reviews of the MDM configuration, paper-based review of the design documentation and policy documents as required, as well as conversations with key technical operators.

To read our white paper titled 'MDM. The solution to BYOD?' please click here.

To speak to one of our account managers about Mobile Device Management in more detail please contact us.

Back to Top