Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Mobile security v2


Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

Mobile security v2

  1. 1. 2
  2. 2. 3
  3. 3. 4
  4. 4. • Numeric & Alphanumeric• Biometric (face detection, voice, fingerprint) 5
  5. 5. • Email, File Sharing, App Data Access• Secure Application Development Guidelines• Encryption (data at rest, data in transition, data in use)• Local Password Protection for Accessing the Data• Minimal Data on User’s Device• Wipe the Data when we lose physical control 6
  6. 6. • Separating Corporate App/Data from Consumer’s• Restricted area for corporate information• Device Locators• Wipe Specific Data• Wipe Entire Device 7
  7. 7. 8