Based on the following points:
1, 4G Network of mature commercialization, 5G network is about to come;
2, mobile intelligent terminal products mature;
3, the real-time and convenience of BYOD bring huge market demand;
4. Cloud of business;
The development of mobile intelligent terminal is more and more rapid, in enterprise-level applications, relatively compared to the mature PC Terminal security control, mobile intelligent terminal appears relatively weak, but mobile terminal security has been a certain degree of attention, has been a well-known security firm in China to leave the establishment of intelligent terminal Security Company, Enterprise-class security vendors are also constantly introducing MDM solutions.
Mobile terminal security control, in accordance with the mature Host Security control model, it is necessary to consider the registration network, use management, recycling/retirement/recycling three stages, but the mobile terminal compared to the host, the device loss rate is high, and based on the insecure network and the security status of the terminal is not clear.
Therefore, in general, mobile terminal security management needs to be regulated from the following 4 aspects:
1, terminal registration: The initial stage of equipment access, divided into two situations: one is to provide a unified configuration model; the other is the end-user comes with a model, the first two cases are required for the mobile terminal registration; For the unified configuration model for the application preinstalled, to obtain higher administrative rights; The user comes with the user to install their own And through the app to the operating system to apply for certain administrative rights;
2, Security Policy deployment: Through the unified deployment of security configuration, such as terminal VPN, network, firewall configuration, such as the application program black and white list policy, in this phase also need to implement a security access policy, only when the terminal to meet all security conditions, to allow the connection of the background server, business processing;
3, the use of phase security management: This stage of the security of data and applications, such as data through peripherals, or other applications leak, mobile terminal loss of leaks, application security needs to consider the app upgrade, app integrity, app operation failure, bug fast location and other factors, so you need to do remote data erasure, Application Uninstall, peripheral control (such as WiFi, USB, Bluetooth, screenshots, etc.) and the app's health report and other functions;
4, Recycling/scrap stage: For staff turnover, job transfer or equipment loss, etc., you need to be able to do remote locking, data erasure, application Uninstall, and rebind the registration function.
This article is from "Little ma" blog, please make sure to keep this source http://pismire.blog.51cto.com/6735103/1942408
Brief introduction to the life cycle of mobile terminal safety control