Mobile Device Security Corporate-Owned Personally-Enabled (COPE)

dc.contributor.authorFranklin, Joshua M.
dc.contributor.authorHowell, Gema
dc.contributor.authorBoeckl, Kaitlin
dc.contributor.authorLefkovitz, Naomi
dc.contributor.authorNadeau, Ellen
dc.contributor.authorShariati, Dr. Behnam
dc.contributor.authorAjmo, Jason G.
dc.contributor.authorBrown, Christopher J.
dc.contributor.authorDog, Spike E.
dc.contributor.authorJavar, Frank
dc.contributor.authorPeck, Michael
dc.contributor.authorSandlin, Kenneth F.
dc.date.accessioned2019-10-09T14:46:40Z
dc.date.available2019-10-09T14:46:40Z
dc.date.issued2019-07
dc.description.abstractMobile devices provide access to workplace data and resources that are vital for organizations to accomplish their mission while providing employees the flexibility to perform their daily activities. Securing these devices is essential to the continuity of business operations. While mobile devices can increase organizations’ efficiency and employee productivity, they can also leave sensitive data vulnerable. Addressing such vulnerabilities requires mobile device management tools to help secure access to the network and resources. These tools are different from those required to secure the typical computer workstation. To address the challenge of securing mobile devices while managing risks, the NCCoE at NIST built a reference architecture to show how various mobile security technologies can be integrated within an enterprise’s network. This NIST Cybersecurity Practice Guide demonstrates how organizations can use standards-based, commercially available products to help meet their mobile device security and privacy needs.en_US
dc.description.urihttps://csrc.nist.gov/publications/detail/sp/1800-21/draften_US
dc.format.extent4 filesen_US
dc.genrereports preprintsen_US
dc.identifierdoi:10.13016/m2bacy-xhvc
dc.identifier.urihttp://hdl.handle.net/11603/14996
dc.language.isoen_USen_US
dc.publisherNISTen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofseriesNIST SPECIAL PUBLICATION;1800-21
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rightsPublic Domain Mark 1.0*
dc.rightsThis is a work of the United States Government. In accordance with 17 U.S.C. 105, no copyright protection is available for such works under U.S. Law."
dc.rights.urihttp://creativecommons.org/publicdomain/mark/1.0/*
dc.subjectBring your own deviceen_US
dc.subjectBYODen_US
dc.subjectcorporate-owned personally-enableden_US
dc.subjectCOPEen_US
dc.subjectmobile device managementen_US
dc.subjectmobile device securityen_US
dc.subjecton-premiseen_US
dc.titleMobile Device Security Corporate-Owned Personally-Enabled (COPE)en_US
dc.typeTexten_US

Files

Original bundle
Now showing 1 - 4 of 4
Loading...
Thumbnail Image
Name:
Practice Guide.pdf
Size:
14.52 MB
Format:
Adobe Portable Document Format
Description:
Practice Guide
Loading...
Thumbnail Image
Name:
Executive Summary.pdf
Size:
597.57 KB
Format:
Adobe Portable Document Format
Description:
Executive Summary
Loading...
Thumbnail Image
Name:
Approach, Architecture, and Security Characteristics.pdf
Size:
4.47 MB
Format:
Adobe Portable Document Format
Description:
Approach, Architecture, and Security Characteristics
Loading...
Thumbnail Image
Name:
How-To Guides.pdf
Size:
9.93 MB
Format:
Adobe Portable Document Format
Description:
How-To Guides
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: