2
3
4
•   Numeric & Alphanumeric
•   Biometric (face detection, voice, fingerprint)




                                                     5
•   Email, File Sharing, App Data Access


•   Secure Application Development Guidelines
•   Encryption (data at rest, data in transition, data in use)
•   Local Password Protection for Accessing the Data
•   Minimal Data on User’s Device
•   Wipe the Data when we lose physical control


                                                                 6
•   Separating Corporate App/Data from Consumer’s
•   Restricted area for corporate information


•   Device Locators
•   Wipe Specific Data
•   Wipe Entire Device




                                                    7
8

Mobile security v2

  • 2.
  • 3.
  • 4.
  • 5.
    Numeric & Alphanumeric • Biometric (face detection, voice, fingerprint) 5
  • 6.
    Email, File Sharing, App Data Access • Secure Application Development Guidelines • Encryption (data at rest, data in transition, data in use) • Local Password Protection for Accessing the Data • Minimal Data on User’s Device • Wipe the Data when we lose physical control 6
  • 7.
    Separating Corporate App/Data from Consumer’s • Restricted area for corporate information • Device Locators • Wipe Specific Data • Wipe Entire Device 7
  • 8.