preview

Managing The Security Of Employee Devices

Better Essays

Mobile Application Wrappers
Managing the Security of Employee Devices

Jimmy Whitten & Manjot Singh

May 12th 2016

CISS 634

Executive Summary
Over the past few years the number of mobile devices owned per person has grown, and will continue to grow, exponentially. With more and more people using a variety of different devices that suit their usability and productivity needs, businesses are trying to figure out how to adapt and remain competitive. The Bring Your Own Device, or BYOD, phenomenon has crept up on many major business, and they are now finding out the hard way that security and integration procedures cannot be overlooked. The solutions for this issue are still in their infancy, but the two most prominent include Mobile Device Management (MDM) and Mobile Application Management (MAM). Although these are considered Band-Aids for a larger issue, businesses, at this time, must adopt one of these two methods in order to provide adequate security for existing and new business information systems, while maintaining convenience and personalization for their employees.

Introduction
Background & History

Smartphones are considered to be smart because of the various different applications that can be run on them. A Mobile App is a software application that is developed to help end users in making their tasks easy. App development goes back to the 1990s when IBM developed the first smart phone, which consisted of a calculator, phonebook, calendar and a

Get Access