Traditionally, enterprises established boundaries to separate their trusted internal IT network(s) from untrusted external networks. When employees consume and generate corporate information on mobile devices, this traditional boundary erodes. Due to the rapid changes in today’s mobile platforms, corporations have the challenge of ensuring that mobile devices connected to their networks can be trusted to protect sensitive data as it is stored, accessed and processed, while still giving users the features they have come to expect from mobile devices. This building block will demonstrate commercially available technologies that provide protection to both organization-issued and personally-owned mobile platforms. These technologies enable users to work inside and outside the corporate network with a securely configured mobile device, while allowing for granular control over the enterprise network boundary, and minimizing the impact on function. The architecture demonstrated by this building block will incorporate a modular technology stack that allows enterprises to tailor solutions to their business needs.
Traditionally, enterprises established boundaries to separate their trusted internal IT network(s) from untrusted external networks. When employees consume and generate corporate information on mobile devices, this traditional boundary erodes. Due to the rapid changes in today’s mobile platforms,...
See full abstract
Traditionally, enterprises established boundaries to separate their trusted internal IT network(s) from untrusted external networks. When employees consume and generate corporate information on mobile devices, this traditional boundary erodes. Due to the rapid changes in today’s mobile platforms, corporations have the challenge of ensuring that mobile devices connected to their networks can be trusted to protect sensitive data as it is stored, accessed and processed, while still giving users the features they have come to expect from mobile devices. This building block will demonstrate commercially available technologies that provide protection to both organization-issued and personally-owned mobile platforms. These technologies enable users to work inside and outside the corporate network with a securely configured mobile device, while allowing for granular control over the enterprise network boundary, and minimizing the impact on function. The architecture demonstrated by this building block will incorporate a modular technology stack that allows enterprises to tailor solutions to their business needs.
Hide full abstract