SlideShare a Scribd company logo
Mobile security v2
2
3
4
•   Numeric & Alphanumeric
•   Biometric (face detection, voice, fingerprint)




                                                     5
•   Email, File Sharing, App Data Access


•   Secure Application Development Guidelines
•   Encryption (data at rest, data in transition, data in use)
•   Local Password Protection for Accessing the Data
•   Minimal Data on User’s Device
•   Wipe the Data when we lose physical control


                                                                 6
•   Separating Corporate App/Data from Consumer’s
•   Restricted area for corporate information


•   Device Locators
•   Wipe Specific Data
•   Wipe Entire Device




                                                    7
8

More Related Content

PDF
Andy Blumenthal Talks About Mobility Solutions
PDF
Hybrid identity and privacy
PPTX
Appsworld - Mobilize your SharePoint with WinWire
PPTX
Making Mobile Manageable
PPTX
IriScript biocryptoverifier
PPTX
The Loss of Intellectual Property in the Digital Age: What Companies can d…
PDF
IoT Integration in the Air conditioning, Heating and Refrigeration industry ...
PDF
Работење во облак – Демо на Office 365 и како да се имплементира
Andy Blumenthal Talks About Mobility Solutions
Hybrid identity and privacy
Appsworld - Mobilize your SharePoint with WinWire
Making Mobile Manageable
IriScript biocryptoverifier
The Loss of Intellectual Property in the Digital Age: What Companies can d…
IoT Integration in the Air conditioning, Heating and Refrigeration industry ...
Работење во облак – Демо на Office 365 и како да се имплементира

What's hot (12)

PPTX
Cyber Security Overview for Small Businesses
PPTX
UniQ-ID Identity and Access Management
PDF
Internet of Everything & WebRTC
PDF
Forensics intro
PPTX
CASBs and Office 365 (with Argyle)
PPTX
Identity-Based Privacy (IBP)
PDF
How To Enable a Remote Workforce & Stay Productive
PPTX
O365 security and privacy de_novo_event_july2014
PPTX
​Understanding the Internet of Things
PDF
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
PDF
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
PPTX
Carol Schlein Presentation Leveraging Technology in your new law practice
Cyber Security Overview for Small Businesses
UniQ-ID Identity and Access Management
Internet of Everything & WebRTC
Forensics intro
CASBs and Office 365 (with Argyle)
Identity-Based Privacy (IBP)
How To Enable a Remote Workforce & Stay Productive
O365 security and privacy de_novo_event_july2014
​Understanding the Internet of Things
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Carol Schlein Presentation Leveraging Technology in your new law practice
Ad

Viewers also liked (8)

PDF
CIO Branding
PPT
Have I Got A Book For You !
PPT
Itil Updated Aug2008 For Cio Presentation
PPTX
Boces may 2013 (1)
PPT
Google apps cio peer group presentation
DOC
Trabajos Finalizados 2008
PPT
RSS Google Reader
DOC
Trabajos Finalizados 2008
CIO Branding
Have I Got A Book For You !
Itil Updated Aug2008 For Cio Presentation
Boces may 2013 (1)
Google apps cio peer group presentation
Trabajos Finalizados 2008
RSS Google Reader
Trabajos Finalizados 2008
Ad

More from James Sutter (20)

PDF
Future of intelligent transportation CIO Roundtable 080214
PDF
Security in the News
PDF
Mobile Security
PPT
3-D Printing_feb_13_2014
PDF
Scrum Agile by David Mann
PPT
It Governance OC CIO Nov,2013
PDF
CIO evolution 10102013
PPT
OC CIO BYOD
PPTX
CIO RoundtableIot IOT
PDF
Technology business management_7.13
PDF
Oc cio roundtable mooney management imperatives for realizing value from clou...
PDF
Erp governance methodology and case studies v rjt
PDF
Controlling project costs
PPT
Google apps CIO Peer Group presentation
PDF
CIO Roundtable 10-12
PDF
CIO presentation aug 2012
PDF
Peer group itsm presentation 6.12
PPT
CIO Value Issue
PDF
Rjt analytics
PPT
Cio roundtable microsoft update - 9-8-11
Future of intelligent transportation CIO Roundtable 080214
Security in the News
Mobile Security
3-D Printing_feb_13_2014
Scrum Agile by David Mann
It Governance OC CIO Nov,2013
CIO evolution 10102013
OC CIO BYOD
CIO RoundtableIot IOT
Technology business management_7.13
Oc cio roundtable mooney management imperatives for realizing value from clou...
Erp governance methodology and case studies v rjt
Controlling project costs
Google apps CIO Peer Group presentation
CIO Roundtable 10-12
CIO presentation aug 2012
Peer group itsm presentation 6.12
CIO Value Issue
Rjt analytics
Cio roundtable microsoft update - 9-8-11

Recently uploaded (20)

PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Pre independence Education in Inndia.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Cell Types and Its function , kingdom of life
PDF
Complications of Minimal Access Surgery at WLH
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
master seminar digital applications in india
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Cell Structure & Organelles in detailed.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
STATICS OF THE RIGID BODIES Hibbelers.pdf
Microbial diseases, their pathogenesis and prophylaxis
Pre independence Education in Inndia.pdf
TR - Agricultural Crops Production NC III.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
VCE English Exam - Section C Student Revision Booklet
Cell Types and Its function , kingdom of life
Complications of Minimal Access Surgery at WLH
Abdominal Access Techniques with Prof. Dr. R K Mishra
master seminar digital applications in india
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Basic Mud Logging Guide for educational purpose
Supply Chain Operations Speaking Notes -ICLT Program
Cell Structure & Organelles in detailed.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Institutional Correction lecture only . . .
PPH.pptx obstetrics and gynecology in nursing
102 student loan defaulters named and shamed – Is someone you know on the list?

Mobile security v2

  • 2. 2
  • 3. 3
  • 4. 4
  • 5. Numeric & Alphanumeric • Biometric (face detection, voice, fingerprint) 5
  • 6. Email, File Sharing, App Data Access • Secure Application Development Guidelines • Encryption (data at rest, data in transition, data in use) • Local Password Protection for Accessing the Data • Minimal Data on User’s Device • Wipe the Data when we lose physical control 6
  • 7. Separating Corporate App/Data from Consumer’s • Restricted area for corporate information • Device Locators • Wipe Specific Data • Wipe Entire Device 7
  • 8. 8