top of page

Endpoint Security: Personally-owned Devices

Easily the most advantageous aspect of an environment where access, processing, storage, and communications of business and business-related information is restricted to use corporate-owned devices is that those devices are directly and immediately subject to organizational policies and actions. This includes, but is not limited to, deployment of hardened baseline configurations, control and monitoring of activity, and even remote wipe. Although the information provided below is not all encompassing, they are some important things that should be considered for each of your endpoint devices: 

Endpoint Security: Personally-owned Devices

Hardened Baseline Configurations & Validation

​

​

Remote Access

​

​

Baseline Configuration and Validation

TBD

​

Secure Storage and Transmission

TBD

​

Recuperation of Assets

TBD

​

bottom of page