HOffice ProServ
Merging cybersecurity best practices with today's flexible home office staff
Endpoint Security: Personally-Owned Devices
Personally-owned devices can prove a bit more of a challenge to control especially if policy is not well developed, published, communicated, and enforced.
​
POLICY
The most important part of an effective BYOD program is to create a well defined policy that: a.) has been approved by a Legal entity; b.) is fully supported by leadership, and; c.) is well communicated throughout the organization including the onboarding and termination process, and thru periodic training and reminders.
MDM
Mobile Device Management solutions allow businesses to granularly manage endpoint devices from updating and mandating operating system and software versions to configuring and monitoring devices for compliance with established organizational policies.
Conditional Access
Acting as your "conductor", conditional access serves to ensure that devices requesting access to corporate resources meets defined criteria prior to being allowed access including, but not limited to factors such as active installation of specific security tools, version requirements, and even location and timing.
MAM
TBD
Sandbox
TBD