Jump to content

Search the Community

Showing results for tags 'management'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • ESET General Forums
    • ESET Announcements
    • General Discussion
    • Forum FAQ's and Rules
    • Submit a virus, website or potential false positive sample to the ESET lab
    • Quick questions by guests (registration not required)
    • WeLiveSecurity.com
  • ESET Home User Products
    • ESET Internet Security & ESET Smart Security Premium
    • ESET NOD32 Antivirus
    • ESET Cyber Security (for Mac)
    • ESET Cyber Security Pro (for Mac)
    • ESET NOD32 Antivirus for Linux Desktop
    • ESET Products for Mobile Devices
    • Web portals
  • Malware Detection and Cleaning
    • Malware Finding and Cleaning
    • ESET Standalone Malware Removal Tools
  • ESET Business User Products
    • Customer Research Opportunity
    • Gartner Peer Insights review invitation
    • ESET Cloud solutions
    • ESET Endpoint Products
    • ESET Products for Windows Servers
    • ESET Products for Linux Servers
    • ESET Products for Mobile Devices
    • Remote Management
    • ESET INSPECT (Detection and Response)
    • ESET Products for Virtualized Environments
    • Encryption
    • ESET Licensing for Business
    • Other ESET business products
  • ESET Beta Products
    • ESET Beta Products for Home Users
    • ESET Beta Products for Business Users
  • Slovak and Czech forums
    • ESET NOD32 Antivirus, ESET Internet Security a ESET Smart Security Premium
    • Produkty pre mobilné zariadenia
    • Vírusy a iné hrozby
    • Ostatné


  • Files
    • Early Access
    • Miscellaneous
    • Outlook plugin BETA
  • ESET Bridge BETA

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL






User type

Found 1 result

  1. Hi Guys, I have been working very closely with MDM software for a while and I have come up with a list of 10 things that every MDM solution should incorporate to make sure that your mobile devices are as safe as they can be. Of course there is no MDM solution that can protect a mobile device 100% but I believe that having these guidelines will help you keep them as secure as possible. Standards for Password Strength - It is a requirement that mobile devices passwords and pass-codes meet or exceed these standards that have been set, including length and complexity. As part of this, there should also be a strict retry and timeout procedure created if a password is incorrectly input more than a certain amount of times. Platform Specification Requirements - A carelessly maintained mobile device can cause serious issues which can cause vulnerability within your infrastructure. Setting a minimum and maximum guideline for operating systems and platforms is key to keeping your devices safe and a device not within these guidelines needs to be restricted. Application Lock-down - You need to incorporate settings so that applications cannot access Contacts, Photos, Messages, Location etc by default, as depending on what country you are operating in, this could be a breach of the data protection and privacy laws. This should also dictate which applications will appear on the devices home-screen and limit access to nonessential applications. Quick Learning Process - Whatever MDM solution you are using, you need to make sure that the management is quick and easy to learn so that anyone new who needs access to the management can know what they are doing without having to take a lot of time practising etc. Single Point of Management - The management of the MDM solution must be accessible in one space like a management console where you can view endpoints, users and policies etc. Reporting tools - There must be a way in which in-depth information about device inventory, security risks and compliance etc can be seen through reporting tools. Device Lock-down - The MDM solution should be able to set up specific guidelines for accessing secure data, and rules should be set up to protect the device in a case where it is breached, lost or stolen. Policies - The MDM solution needs to have a policy that is customizable which can be built upon previous iterations, while also being able to accommodate an unlimited number of policies. Cellular Data Usage - The MDM solution should be able to integrate with the mobile carrier to ensure conscientious usage so that it is not abused. Services such as video streaming and music services should be disabled. Integration - The MDM solution should be able to integrate with other services that you have within your infrastructure so that there are no conflicts of interest and other issues. I hope this helps you guys and if you have any questions let me know. Regards, Kieran Barry
  • Create New...