Mobile Security and BlackBerry MDM/MAM Application
Added on 2023-06-11
10 Pages2229 Words243 Views
Assignment Title:
Student Name:
Instructor’s Name:
Course Code and Title:
Submission Date:
Student Name:
Instructor’s Name:
Course Code and Title:
Submission Date:
Executive summary
Au and Choo defines mobile security as the protection of handheld computer devices such as
laptops, tablets, smartphones and networks they connect to, from vulnerabilities and threats
associated with mobility computing (Au & Choo, 2016).
Au and Choo defines mobile security as the protection of handheld computer devices such as
laptops, tablets, smartphones and networks they connect to, from vulnerabilities and threats
associated with mobility computing (Au & Choo, 2016).
Table of Contents
Executive summary...............................................................................................................................2
Introduction...........................................................................................................................................4
Brief description of MDM/MAM......................................................................................................4
Blackberry MDM..................................................................................................................................5
Proxy Mode...................................................................................................................................6
End-to-End Mode..........................................................................................................................6
Comparison between BlackBerry and MobileIron MDMs....................................................................7
Architecture...................................................................................................................................7
Installation Platforms.....................................................................................................................7
Supported Devices:........................................................................................................................8
Technical approach........................................................................................................................8
Solution Designation Requirements......................................................................................................8
Logical Diagram....................................................................................................................................9
Executive summary...............................................................................................................................2
Introduction...........................................................................................................................................4
Brief description of MDM/MAM......................................................................................................4
Blackberry MDM..................................................................................................................................5
Proxy Mode...................................................................................................................................6
End-to-End Mode..........................................................................................................................6
Comparison between BlackBerry and MobileIron MDMs....................................................................7
Architecture...................................................................................................................................7
Installation Platforms.....................................................................................................................7
Supported Devices:........................................................................................................................8
Technical approach........................................................................................................................8
Solution Designation Requirements......................................................................................................8
Logical Diagram....................................................................................................................................9
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Comparison of Security in Mobile Operating Systemslg...
|9
|2300
|438