Chapter 12 - 05 - Discuss and Implement Enterprise-level Mobile SM Solutions - 03_ocred.pdf
Document Details
Uploaded by barrejamesteacher
null
EG-Council
Tags
Related
- Mobile Device Management Concepts PDF
- Chapter 12 - 05 - Mobile Security Management Solutions PDF
- Mobile Device Security (Certified Cybersecurity Technician) Exam 212-82 PDF
- Chapter 12 - 05 - Mobile Security Management Solutions PDF
- Mobile Content Management Solutions PDF
- Chapter 12 - 05 - Enterprise Mobile Security Management Solutions PDF
Full Transcript
Certified Cybersecurity Technician Mobile Device Security Exam 212-82 Enterprise Mobility Management Solutions < Enterprise mobility management (EMM) is a comprehensive (Mmbm) (MEM) https:// https://www.42gears.com P Enterprise Scalefusion EMM https://scalefusion.com Mobility Management Mobile Conte...
Certified Cybersecurity Technician Mobile Device Security Exam 212-82 Enterprise Mobility Management Solutions < Enterprise mobility management (EMM) is a comprehensive (Mmbm) (MEM) https:// https://www.42gears.com P Enterprise Scalefusion EMM https://scalefusion.com Mobility Management Mobile Content Management Mobile Threat Management (EMM) (McMm) Solution -~ (MTM™) IBM Security MaaS360® https://www.ibm.com Mobile Application Management (MAM) ine.com 42Gears Enterprise Mobility Management (EMM) e Mobile Device Management Mobile Email Management ManageEngine Mobile Device Manager Plus Q solution for MDM, MAM, MTM, MCM, and MEM Zebra Enterprise Mobility Management O (EMM) Tool Kit https://www.zebra.com L. All Rights Reserved. ReproductionIs Strictly Prohibited. Enterprise Mobility Mlanagement Solutions Enterprise mobility management MAM, MTM, MCM, and MEM. (EMM) is a comprehensive solution responsible for MDM, It safeguards the enterprise data accessed and used by employee mobile devices. Mobile Device Mobile Email Management Management (MDM) (MEM) Enterprise Mobility Mobile Content Management (Mcm) Management Mobile Threat (EMM) Management Solution (MTM) Mobile Application Management (MAM) Figure 12.7: Enterprise Mobility Management Solution Specifically, EMM is responsible for: = Device management to provide the foundation for EMM solutions by o Enabling automatic device configuration o Allowing employees to be productive on the mobile devices they like to use Module 12 Page 1531 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Mobile Device Security o Wiping enterprise Exam 212-82 data from mobile devices selectively without interfering with personal data o Securing and managing mobile devices across multiple OSes (Android, iOS, macOS, and Windows 10) Content management o Encrypt email attachments o Establish DLP controls to secure corporate content o Secure corporate data distribution to mobile devices by applying content level policies (e.g., device-independent encryption keys, authentication, and file sharing) Application management o Protect applications on any device o Create and manage an enterprise app store o Provide authentication for end users on the device o Separate business and personal apps on mobile devices o User and identity management Mobile threat management o Protect organizations and their employees from threats on iOS and Android mobiles using different security technologies MEM o Provide security to the corporate email infrastructure and data on mobile devices Examples of EMM Solutions: ManageEngine Mobile Device Manager Plus (https.//www.manageengine.com) 42Gears Enterprise Mobility Management (EMM) (https://www.42gears.com) Scalefusion EMM (https://scalefusion.com) IBM Security MaaS360® (https.//www.ibm.com) Zebra Enterprise Mobility Management (EMM) Tool Kit (https://www.zebra.com) Module 12 Page 1532 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Mobile Device Security Exam 212-82 Unified Endpoint Management Solutions g U Unified endpoint management (UEM) solutions ensure remote provisioning, managing, controlling, and securing Internet-enabled devices from a single interface Mobileiron UEM bttps=//srerwmoblleiron.com lfll Ivanti Unified Endpoint Manager https://www.ivanti.com Features of UEM » Remote, manual, or automatic pushing of updates > Configuration for on-device security policies » Supporting employee-owned devices. » : : Erasing the data of lost or stolen devices remotely » Tracking device usage » Threat detection and mitigation > API framework for custom applications ] Workspace ONE Ry v——— : i 8 ManageEngine Desktop Central i S s e fl 42Gears UEM https://www.a2geors.com Unified Endpoint Management Solutions Unified endpoint management (UEM) solutions help in managing and controlling Internetenabled mobile devices, desktops, applications, and content across the organization from a single interface. It provides security, management, and provisioning of mobile devices. UEM solutions address the problems of IT managers by extending MDM and EMM solutions. Features and Capabilities of UEM UEM solutions handle the unique security requirements in mobile enterprises by providing: App containerization Multi-OS environment Closed-loop automation features Certificate-based identity management Security for enterprise email, apps, and content Self-service features to simplify IT management DLP features to define open-in and copy/paste functions Help users maintain compliance with the corporate policies Secure multi-user profiles to securely allow users to share a single device Highly effective security measures that are invisible to the end users Per-app VPN technology that provides corporate network access to authorized apps only Module 12 Page 1533 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Mobile Device Security Exam 212-82 Allow users to find and install critical enterprise apps (corporate email, calendar, etc.) Separate and manage highly sensitive personal and corporate data on mobile devices. Remote, manual, or automatic pushing of updates Configuration for on-device security policies Supporting employee-owned devices Erasing the data of lost or stolen devices remotely Tracking device usage Threat detection and mitigation API framework for custom applications UEM Components The key components that define the attributes of UEM solutions are: CMT CMT provides IT infrastructure to ensure the efficient working of mobile enterprises while enhancing the service to end users. MDM MDM provides a foundation for UEM solutions by allowing the IT team to o Secure corporate email o Certificate-based security o Automatic device configuration o Allow employees to be productive on the mobile devices they like to use o Wipe enterprise personal data o Secure and manage Windows 10) data from mobile devices selectively without interfering with mobile devices across multiple OSes (Android, iOS, macOS, and MAM MAM provides IT infrastructure to o Protect applications on any device o Create and manage an enterprise app store o Provide authentication for end users on a device o Separate business and personal apps on mobile devices Module 12 Page 1534 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Mobile Device Security = Exam 212-82 MCM MCM provides IT infrastructure to o Encrypt email attachments o Establish DLP controls to secure corporate content o Secure corporate data distribution to mobile devices by applying content level policies (device-independent encryption keys, authentication, and file sharing) Examples of UEM Solutions for Mobile Engagement: = Mobileiron UEM (https://www.mobileiron.com) = |vanti Unified Endpoint Manager (https://www.ivanti.com) = Workspace ONE UEM (https://www.vmware.com) = ManageEngine Desktop Central (https://www.manageengine.com) » 42Gears UEM (https://www.42gears.com) Module 12 Page 1535 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited.