In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-12 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Based on the following points:
1. The mature commercialization of 4G network and the coming of 5G network
2. The maturity of mobile intelligent terminal products
3. The huge market demand brought by the real-time and convenience of BYOD
4. Business cloud
The development of the mobile intelligent terminal is more and more swift and violent. In the enterprise application, compared with the more mature PC terminal security control, the mobile intelligent terminal appears to be relatively weak, but the mobile terminal security has also received a certain degree of attention. One after another, a well-known security manufacturer left to establish an intelligent terminal security company, and various enterprise security manufacturers are constantly pushing out MDM solutions.
According to the mature host security management and control model, it is necessary to consider the three stages of registration-> use management-> recycling / scrapping / recycling, but compared with the host, the mobile terminal has a higher device loss rate. and based on insecure networks and terminals with uncertain security conditions.
Therefore, generally speaking, mobile terminal security management needs to be regulated from the following four aspects:
1. Terminal registration: at the initial stage of equipment joining the network, there are two situations: one is to provide a unified configuration model; the other is the end user's own model; first, both cases need to be registered for the mobile terminal; the unified configuration model is pre-installed with APP to obtain higher management rights; the user's own model installs the application by the user himself, and applies for certain management rights from the operating system through APP
2. Security policy deployment: deploy security configuration through unified distribution, such as terminal × × ×, network and firewall configuration, APP program blacklist and whitelist policy, etc. At this stage, it is also necessary to implement security access policy. Only when the terminal meets all the security conditions is it allowed to connect to the background server for business processing.
3. Security management in the use phase: this stage focuses on the security of data and applications, such as data disclosure through peripherals or other applications, loss of secrets in mobile terminals, and application security considerations such as APP upgrade, APP program integrity, APP failure, BUG rapid location, etc. Therefore, it is necessary to achieve the functions of remote data erasure, application uninstallation, peripheral control (such as WIFI, USB, Bluetooth, screenshot, etc.) and APP health report.
4. Recycling / scrapping phase: remote locking, data erasing, application unloading, and re-binding registration are needed for employee turnover, job transfer or equipment loss.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.