Main principles and rules of implementation of mobile device management and bring your own device to nowadays business

Authors

  • Олександр Олександрович Мартинюк National Technical University of Ukraine „Kyiv Polytechnic Institute” Peremohy av., 37, Kyiv, Ukraine, 03056, Ukraine

DOI:

https://doi.org/10.15587/2313-8416.2014.31881

Keywords:

mobile devices, security policy, MDM, BYOD, McAfee, Websense corporative information leekage

Abstract

Main principles and rules of implementation of Mobile Device Management (MDM) і Bring Your Own Device (BYOD) to nowadays business were described. Conditions of prevention confidential information leakage caused by using mobile devices were analyzed. Appointment and settings of security parameters and main opportunities of McAfee and Websense software during using of mobile devices in corporative network were explored.

Author Biography

Олександр Олександрович Мартинюк, National Technical University of Ukraine „Kyiv Polytechnic Institute” Peremohy av., 37, Kyiv, Ukraine, 03056

Information Security Faculty of Institute

Physics and Technics Institute

References

Security of mobile devices and IT user-orientation. Available at: http://www.trendmicro.com.ru/technology-innovation/mobile-security-consumerization/

MDM and BYOD, shake but not mix. Available at: http://www.volgablob.ru/blog/?p=101

Bring your own device. Available at: http://en.wikipedia.org/wiki/Bring_your_own_device

BYOD trend has force in Ukraine. Available at: http://www.pcweek.ua/themes/detail.php?ID=143082

BYOD – Research findings released. Available at: http://cxounplugged.com/2013/01/byod-policy/

BYOD Requires Mobile Device Management. Available at: http://www.informationweek.com/mobile/byod-requires-mobile-device-management/d/d-id/1097576?

Mobile device management (MDM). Available at: http://searchmobilecomputing.techtarget.com/definition/mobile-device-management

No BYOD Policy? Time to grasp the nettle. Available at: http://cxounplugged.com/2013/01/byod-policy/

Rafael Ballagas, Michael Rohs, Jennifer G. Sheridan, and Jan Borchers. BYOD: Bring Your Own Device. Available at: http://www.vs.inf.ethz.ch/publ/papers/rohs-byod-2004.pdf

When workers go mobile, your data goes mobile and your security risk goes up. Available at: http://www.websense.com/content/triton-mobile-security-features.aspx

McAfee Enterprise Mobility Management 11.0 Software. Product Guide. Available at: https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/24000/PD24468/en_US/EMM_11_0_ProductGuide.pdf

Websense TRITON Mobile Security. Product Guide. Available at: https://www.websense.com/content/support/library/mobile/eu_help/Mobile%20Security%20End-User%20Guide.pdf

Published

2014-12-22

Issue

Section

Technical Sciences