Mobility Management For Enterprises In BYOD Deployment
Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with ISBN/ISSN) › peer-review
Author(s)
Related Research Unit(s)
Detail(s)
Original language | English |
---|---|
Title of host publication | Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering, 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 638-645 |
ISBN (Print) | 9781509032051 |
Publication status | Published - Aug 2016 |
Publication series
Name | |
---|---|
ISSN (Print) | 2324-9013 |
Conference
Title | Joint 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering, 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016 |
---|---|
Place | China |
City | Tianjin |
Period | 23 - 26 August 2016 |
Link(s)
Abstract
Bring your own device (BYOD) adoption has become more and more popular in the enterprises because of its convenience and fantastic user experience. However, BYOD was found to expose the enterprises to security risks and thus BYOD adoption can be an opportunity as well as threat to enterprises. This paper focuses on deriving a secure mobility management solution by dissecting three contemporary BYOD solutions, namely, MDM, MAM, and MCM. Based on those three basic solutions, this paper specifically analyzes and compares different solutions provided by VMWare AirWatch, IBM MaaS360, Globo GO!Enterprise, Blackberry BES 12, Samsung KNOX, Blackberry Balance and Black Phone. With such detail analyses, enterprises are provided with insight into different Enterprises Mobility Management solutions so that enterprises can have a holistic view of BYOD deployment and are able to choose appropriate solutions for their own secure BYOD deployment.
Research Area(s)
- BYOD solutions, EMM, MAM, MCM, MDM, Information Security
Citation Format(s)
Mobility Management For Enterprises In BYOD Deployment. / TSE, Daniel; WANG, Lu; LI, Yuxi.
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering, 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016. Institute of Electrical and Electronics Engineers Inc., 2016. p. 638-645 7847003.Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with ISBN/ISSN) › peer-review