mobile security v2
DESCRIPTION
TRANSCRIPT
2
3
4
5
• Numeric & Alphanumeric
• Biometric (face detection, voice, fingerprint)
6
• Email, File Sharing, App Data Access
• Secure Application Development Guidelines
• Encryption (data at rest, data in transition, data in use)
• Local Password Protection for Accessing the Data
• Minimal Data on User’s Device
• Wipe the Data when we lose physical control
7
• Separating Corporate App/Data from Consumer’s
• Restricted area for corporate information
• Device Locators
• Wipe Specific Data
• Wipe Entire Device
8