Mobile Device Security Corporate-Owned Personally-Enabled (COPE)

dc.contributor.authorFranklin, Joshua M.
dc.contributor.authorHowell, Gema
dc.contributor.authorBoeckl, Kaitlin
dc.contributor.authorLefkovitz, Naomi
dc.contributor.authorNadeau, Ellen
dc.contributor.authorShariati, Dr. Behnam
dc.contributor.authorAjmo, Jason G.
dc.contributor.authorBrown, Christopher J.
dc.contributor.authorDog, Spike E.
dc.contributor.authorJavar, Frank
dc.contributor.authorPeck, Michael
dc.contributor.authorSandlin, Kenneth F.
dc.date.accessioned2019-10-09T14:46:40Z
dc.date.available2019-10-09T14:46:40Z
dc.date.issued2019-07
dc.description.abstractMobile devices provide access to workplace data and resources that are vital for organizations to accomplish their mission while providing employees the flexibility to perform their daily activities. Securing these devices is essential to the continuity of business operations. While mobile devices can increase organizations’ efficiency and employee productivity, they can also leave sensitive data vulnerable. Addressing such vulnerabilities requires mobile device management tools to help secure access to the network and resources. These tools are different from those required to secure the typical computer workstation. To address the challenge of securing mobile devices while managing risks, the NCCoE at NIST built a reference architecture to show how various mobile security technologies can be integrated within an enterprise’s network. This NIST Cybersecurity Practice Guide demonstrates how organizations can use standards-based, commercially available products to help meet their mobile device security and privacy needs.en
dc.description.urihttps://csrc.nist.gov/publications/detail/sp/1800-21/draften
dc.format.extent4 filesen
dc.genrereports preprintsen
dc.identifierdoi:10.13016/m2bacy-xhvc
dc.identifier.urihttp://hdl.handle.net/11603/14996
dc.language.isoenen
dc.publisherNISTen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofseriesNIST SPECIAL PUBLICATION;1800-21
dc.rightsPublic Domain Mark 1.0*
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rightsThis is a work of the United States Government. In accordance with 17 U.S.C. 105, no copyright protection is available for such works under U.S. Law."
dc.rights.urihttp://creativecommons.org/publicdomain/mark/1.0/*
dc.subjectBring your own deviceen
dc.subjectBYODen
dc.subjectcorporate-owned personally-enableden
dc.subjectCOPEen
dc.subjectmobile device managementen
dc.subjectmobile device securityen
dc.subjecton-premiseen
dc.titleMobile Device Security Corporate-Owned Personally-Enabled (COPE)en
dc.typeTexten

Files

Original bundle

Now showing 1 - 4 of 4
Loading...
Thumbnail Image
Name:
Practice Guide.pdf
Size:
14.52 MB
Format:
Adobe Portable Document Format
Description:
Practice Guide
Loading...
Thumbnail Image
Name:
Executive Summary.pdf
Size:
597.57 KB
Format:
Adobe Portable Document Format
Description:
Executive Summary
Loading...
Thumbnail Image
Name:
Approach, Architecture, and Security Characteristics.pdf
Size:
4.47 MB
Format:
Adobe Portable Document Format
Description:
Approach, Architecture, and Security Characteristics
Loading...
Thumbnail Image
Name:
How-To Guides.pdf
Size:
9.93 MB
Format:
Adobe Portable Document Format
Description:
How-To Guides

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: