Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > IBM MaaS360 > Addressing NIST and DOD Requirements for Mobile Device Management
 

Addressing NIST and DOD Requirements for Mobile Device Management

White Paper Published By: IBM MaaS360
IBM MaaS360
Published:  Feb 06, 2015
Type:  White Paper
Length:  22 pages

Mobilizing Government Agencies Starts with Security

The  line-in-the-sand for securing and managing mobile devices in government agencies and public sector offices has been drawn.

Now is the time to  prepare for the guidelines set forth by the National Institute of Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) by exploring thevulnerabilities of mobility and mitigation strategies for complete mobile control with Mobile Device Management.     

Four Fundamentals of Public Sector Mobile Security

  • General Policy: Restricting hardware, software and network connection points especially pertaining to Bring Your own Device (BYOD) programs
  • Data Communication & Storage: Encryption of data and the ability to wipe devices if that data is compromised.    
  • User & Device Authentication: Identity establishment through passcode management and IT control to lock devices based on rule sets
  • Applications: Blocking and monitoring apps that openly share data to cloud storage systems through white list and black list management.

Download  the Essential Capabilities for Secure Mobility for a high-level look at the over 300 guidelines in the DISA’s Mobile Device Management (MDM) Server Security Requirements Guide, and strategies to manage this ever expanding list.



Tags : 
nist, dod requirements, secure mobility, mdm, data communication, device authentication, it management