MDM Configuration Reviews

Show left menu  
Hide left menu  

As mobile devices are increasingly used to access sensitive enterprise data, the security of these devices is of increasing concern. Whether these devices are corporately owned or are part of a Bring Your Own Device programme, they require management and policy enforcement to ensure data remains protected. This management is often centralised in the form of Mobile Device Management (MDM) solutions.

In performing MDM solution security reviews, Context assess the deployed MDM solution configuration, the supporting network architecture as well as the  mobile device security policies and management processes. The assessment is performed via hands-on reviews of the MDM configuration, paper-based review of the design documentation and policy documents as required, as well as conversations with key technical operators.

Back to Top