top of page
Endpoint Security: Personally-owned Devices
Easily the most advantageous aspect of an environment where access, processing, storage, and communications of business and business-related information is restricted to use corporate-owned devices is that those devices are directly and immediately subject to organizational policies and actions. This includes, but is not limited to, deployment of hardened baseline configurations, control and monitoring of activity, and even remote wipe. Although the information provided below is not all encompassing, they are some important things that should be considered for each of your endpoint devices:

Hardened Baseline Configurations & Validation
​
​
Remote Access
​
​
Baseline Configuration and Validation
TBD
​
Secure Storage and Transmission
TBD
​
Recuperation of Assets
TBD
​
bottom of page
