As you can see, mobile device data encryption can apply to all date on the device or only certain file types. It is also possible to force encryption of removable media such as Secure Digital (SD) cards.Table 2: Screen shot for Modifying Security Policy in MDM Admin Console, Data Encryption.In order to remotely wipe and erase all data from a corporate mobile device an IT Security Analyst completes a process in the MDM Admin Console as outlined in Figure 3 below.By executing this process, the IT Security Analyst assumes control of the mobile device in order to remotely wipe ALL data to ensure no breach of data security is incurred by for the corporation. It is important to frequently test this procedure to ensure the wipe action does indeed occur, and ALL data is removed from the device …show more content…
The analyst assists the organization in ensuring corporate security policies surrounding mobile devices are defined, enforced and implemented to exercise control over corporate data. First and foremost, the IT Security Analyst must fully understand the security policies needed by the business while also understanding how to enforce them using technologies such as Mobile Device Management, MDM. Through creation of security policy forms in the MDM interface the IT Security Analyst ensures that any mobile devices configured to connect to the system will receive the password and data encryption security policies as defined. If for any reason a mobile device is non-compliant with policy, the IT Security Analyst can take necessary actions to bring the device into compliance or exclude it from accessing potentially sensitive corporate data. Finally, if mobile devices are lost or stolen that belong to the corporation, the IT Security Analyst can use the MDM interface to remotely wipe the device to ensure any data residing on the physical device is