Brief introduction to the life cycle of mobile terminal safety control

Source: Internet
Author: User

Based on the following points:

1, 4G Network of mature commercialization, 5G network is about to come;

2, mobile intelligent terminal products mature;

3, the real-time and convenience of BYOD bring huge market demand;

4. Cloud of business;

The development of mobile intelligent terminal is more and more rapid, in enterprise-level applications, relatively compared to the mature PC Terminal security control, mobile intelligent terminal appears relatively weak, but mobile terminal security has been a certain degree of attention, has been a well-known security firm in China to leave the establishment of intelligent terminal Security Company, Enterprise-class security vendors are also constantly introducing MDM solutions.

Mobile terminal security control, in accordance with the mature Host Security control model, it is necessary to consider the registration network, use management, recycling/retirement/recycling three stages, but the mobile terminal compared to the host, the device loss rate is high, and based on the insecure network and the security status of the terminal is not clear.

Therefore, in general, mobile terminal security management needs to be regulated from the following 4 aspects:

1, terminal registration: The initial stage of equipment access, divided into two situations: one is to provide a unified configuration model; the other is the end-user comes with a model, the first two cases are required for the mobile terminal registration; For the unified configuration model for the application preinstalled, to obtain higher administrative rights; The user comes with the user to install their own And through the app to the operating system to apply for certain administrative rights;

2, Security Policy deployment: Through the unified deployment of security configuration, such as terminal VPN, network, firewall configuration, such as the application program black and white list policy, in this phase also need to implement a security access policy, only when the terminal to meet all security conditions, to allow the connection of the background server, business processing;

3, the use of phase security management: This stage of the security of data and applications, such as data through peripherals, or other applications leak, mobile terminal loss of leaks, application security needs to consider the app upgrade, app integrity, app operation failure, bug fast location and other factors, so you need to do remote data erasure, Application Uninstall, peripheral control (such as WiFi, USB, Bluetooth, screenshots, etc.) and the app's health report and other functions;

4, Recycling/scrap stage: For staff turnover, job transfer or equipment loss, etc., you need to be able to do remote locking, data erasure, application Uninstall, and rebind the registration function.

This article is from "Little ma" blog, please make sure to keep this source http://pismire.blog.51cto.com/6735103/1942408

Brief introduction to the life cycle of mobile terminal safety control

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.