12.5.2 Mobile Device Management
Learn how organizations manage their mobile devices.
Mobile device management is how corporate networks interact with their mobile devices. There is MDM software from a great many vendors, from mobile device manufacturers to mobile service providers, granting network administrators the ability to remotely control corporate-owned devices.
Email Configuration
You'll need to know the following components:
- User ID & Password
- Mail Server IP Address
- Incoming Mail Protocol (typically IMAP or POP)
- Corporate-defined Security Settings
Multifactor-Multifactor Authentication
In addition to basic authenticators like something you know (usernames/passwords, PINs) and something you have (access card, door key, an Authenticator mobile app), mobile devices also use an additional factor through their MDM system. Some use biometrics like fingerprints and facial ID.
Some companies use geotagging or geofencing, which grants or denies access based on the physical location of the access point.
Corporate Applications & BYOD
Some organizations allow employees to access company data through the use of their own personal devices. This policy is typically referred to as BYOD, or Bring Your Own Device. When an employee wishes to use BYOD, many organizations will have them install an application on their phone that they can use to access company resources. This app will keep all data related to the company stored locally on the employee's mobile device separate with the employees personal data and protect it from outside tampering.
On the app, the employee will be able to access things like the corporate email service, office software, and company-stored data. For legal issues, the employee might have to sign a waiver or contract granting the company 100% legal rights over the data stored by the organizational MDM app they have on their phone, while everything else on the device is owned by the user.
#XII
#Aplus