logo

Mobile Security and BlackBerry MDM/MAM Application

   

Added on  2023-06-11

10 Pages2229 Words243 Views
Assignment Title:
Student Name:
Instructor’s Name:
Course Code and Title:
Submission Date:
Mobile Security and BlackBerry MDM/MAM Application_1
Executive summary
Au and Choo defines mobile security as the protection of handheld computer devices such as
laptops, tablets, smartphones and networks they connect to, from vulnerabilities and threats
associated with mobility computing (Au & Choo, 2016).
Mobile Security and BlackBerry MDM/MAM Application_2
Table of Contents
Executive summary...............................................................................................................................2
Introduction...........................................................................................................................................4
Brief description of MDM/MAM......................................................................................................4
Blackberry MDM..................................................................................................................................5
Proxy Mode...................................................................................................................................6
End-to-End Mode..........................................................................................................................6
Comparison between BlackBerry and MobileIron MDMs....................................................................7
Architecture...................................................................................................................................7
Installation Platforms.....................................................................................................................7
Supported Devices:........................................................................................................................8
Technical approach........................................................................................................................8
Solution Designation Requirements......................................................................................................8
Logical Diagram....................................................................................................................................9
Mobile Security and BlackBerry MDM/MAM Application_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Comparison of Security in Mobile Operating Systems
|9
|2300
|438