Securing Mobile Devices 

 
Download Now Free to members only.
Non-members Join today to get your free PDF copy, or purchase the pdf for US $75.

Securing Mobile Devices


Bookstore Purchase in Book Format:  Member US $35 | Non-Member US $75

  Provide feedback on this document
Knowledge Center  Visit the Mobile Computing Knowledge Center community

Securing Mobile Devices should be read in the context of the existing publications COBIT 5 for Information Security, Business Model for Information Security (BMIS) and COBIT 5 itself.

This publication is intended for several audiences who use mobile devices directly or indirectly. These include end users, IT administrators, information security managers, service providers for mobile devices and IT auditors.

The main purpose of applying COBIT 5 to mobile device security is to establish a uniform management framework and to give guidance on planning, implementing and maintaining comprehensive security for mobile devices in the context of enterprises. The secondary purpose is to provide guidance on how to embed security for mobile devices in a corporate governance, risk management and compliance (GRC) strategy, using COBIT 5 as the overarching framework for GRC.