What kind of mobile device restrictions do you have in your organization?

4280 pts.
Tags:
Mobile devices
Mobile security
Mobile security threats
Open IT Forum
Open IT ForumWith the popularity of a diverse range of mobile phones and devices, many organizations have set strict policies and restrictions on the mobile devices employees are allowed to user for work. Whether it's making users choose between a set range of mobile offerings or not allowing mobile devices to access certain areas of the internal network, every org is different. What policies do you have in place?

Answer Wiki

Thanks. We'll let you know when a new response is added.

Essentially our policy is this:

If we supply it, it’s supported. If we don’t, it’s not. We are pretty strict with this rule, as at times, we have had some people bring in personal laptops or mobile devices not supplied by the company and connected them to our network. This is strictly prohibited and the network connectivity for the device is terminated.

We have a seperate network for this reason.

Hope this helps!

-Schmidtw

Discuss This Question: 3  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • JennyMack
    *allowed to use* -- sorry!
    4,280 pointsBadges:
    report
  • JennyMack
    Hey Warner, Definitely, thanks. Could you clarify -- when you say "separate network," do you mean a type of guest network? What types of things are restricted on that network? Thanks Warner, Jenny
    4,280 pointsBadges:
    report
  • Kevin Beaver
    Who's setting strict policies!? :-) I see the "if we supply it, it's supported" mode of operation like Schmidtw mentions and the occasional policy but nowhere have I seen (or heard) of any organization enforcing their policies or restricting such use...hence the major problems we have with mobile security.
    16,610 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following