2020
DOI: 10.6028/nist.sp.1800-21
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Device Security: Corporate-Owned Personally-Enabled (COPE)

Abstract: Mobile devices provide access to vital workplace resources while giving employees the flexibility to perform their daily activities. There are several options for deploying mobile devices. One deployment model is Corporate-Owned Personally-Enabled (COPE). COPE devices are owned by the enterprise and issued to the employee. COPE architectures provide the flexibility of allowing both enterprises and employees to install applications onto the enterprise-owned mobile device. Securing mobile devices is essential to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0
3

Year Published

2020
2020
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 1 publication
0
1
0
3
Order By: Relevance
“…Затова е необходима мощна и адекватна за сигурността архитектура. Тя има многопластова сигурност, проектирана да осигурява необходимата гъвкавост за ОС с отворен код [1], [2], [5], [8].…”
Section: въведениеunclassified
See 2 more Smart Citations
“…Затова е необходима мощна и адекватна за сигурността архитектура. Тя има многопластова сигурност, проектирана да осигурява необходимата гъвкавост за ОС с отворен код [1], [2], [5], [8].…”
Section: въведениеunclassified
“…Стартирането на всяко приложение в Android е свързано със създаването на отделен процес, който първоначално съдържа една единствена изпълнявана нишка [2], [8]. По подразбиране всички компоненти на приложението се изпълняват в тази нишка, която се нарича "главна" (main).…”
Section: процесиunclassified
See 1 more Smart Citation
“…Other features require additional third-party services to apply security features such as policy configurations, encrypt data transmissions, or analyze mobile applications. The practice guide, NIST SP 1800-21 Mobile Device Security: Corporate-owned Personally-enabled, discusses some of the various mobile device security solutions that can be used to apply security configurations and policies to a mobile device [12]. These solutions include an Enterprise Mobility Management (EMM) solution, Mobile Application Vetting (MAV), and Virtual Private Network (VPN).…”
Section: Identify -Your Public Safety Needs and Devicesmentioning
confidence: 99%