Version 12.0: June 2011October 2015
Anchor | ||||
---|---|---|---|---|
|
Introduction
This document is designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. It is organized into steps you can follow to define your objectives and develop a plan to move forward. Included in this document is supporting information to help you think through, and hopefully answer, some of the questions or issues you may encounter along the way.
...
Selection of Mobile Device Management On-Line Resources at the time of Publication
- Enterprise Mobility Management 2011: Mobility Becomes Core IT (Registration Required) InfoWorld Mobile Device Management (MDM) Deep Dive (Registration Required)
- Mobile device management (Wikipedia)
- Exchange ActiveSync (Wikipedia)
- Understanding Exchange ActiveSync (Microsoft)
- Mobile Email with Exchange ActiveSync (Microsoft) Exchange ActiveSync Protocol Lists Current Exchange ActiveSync Protocol Licensees (Microsoft)
- iPhone/iPad/iOS Enterprise Support (Apple)
- Android Enterprise Management: An indication of the level of maturity for Android enterprise management may be deduced from the number of third party players in this field.
- RIM Announces Multi-Platform BlackBerry Enterprise Solution for Smartphones and Tablets
...
- Carnegie Mellon University
- Duke UniversityGeorgia Health Sciences University
- Indiana University
- Kansas State University
- New York University
- Northwestern University
- Purdue University
- Rochester Institute of Technology
- Stanford University
- University of Michigan
- University of Notre Dame
- University of South Carolina
- Vassar College
- Villanova University
Examples of Federal Government Policies
- Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs (includes several sample policies)
...