Mobile devices include portable storage media (e.g., USB memory sticks, external hard disk drives) and portable computing and communications devices with information storage capability (e.g., notebook/laptop computers, personal digital assistants, cellular telephones, digital cameras, and audio recording devices).
In order to detect unauthorized mobile device connections, organizations must first identify and document what mobile devices are authorized.
Monitoring for unauthorized connections is usually handled by configuration management software, log alarming, IDS, or some other security mechanism specifically designed to automate and address this requirement.
Application servers do not manage mobile devices. They could host the applications that perform mobile management tasks, but do not have mobile management capabilities.
|