Page 6 - index
P. 6







 Password requirements
 Inactivity timeouts
 Jailbreak/Root detection enablement (and the logic used for the detection process)
 Backend server information
 Personally Identifiable Information for the end user (such Name, Address, Phone
Numbers)


All three C‘s are equally as important to protect properly because a lost or stolen device could
potentially expose the content that‘s stored locally on the device in addition to enabling a
malicious attacker to get their hands on all sorts of data from within the enterprise because of
the credentials they capture and use against the backend systems that they may discover
stored in the configuration data. As enterprises continue to look at containerization as an
effective mobile security technology, it‘s important to evaluate these three C‘s to ensure the best
plan of defense.

About the Author

Eugene Liderman has over 15 years experience in the Information
Technology field, specifically in Networking, Directory Services, Email,
Wireless Email, Mobility, and Information Security. Currently Mr. Liderman is
the Director of Public Sector in the Office of the CTO where his primary
responsibility is to assist customers in navigating the unique mobile security
challenges that exist within the Federal Civilian and DoD markets. Prior to that
Mr. Liderman was a Director of Special Markets and focused on Emerging
Technology as well as Alliances. In this role, his primary focus was to ensure
that Good continues to provide innovative solutions for Good's security conscious customers.
Prior to that Mr. Liderman was a Sr. Cyber Security Architect focusing on Public Sector. His
responsibilities included working closely with DISA, NSA, and the various Information
Technology/Information Assurance testing and accreditation organizations within each branch of
the military. Mr. Liderman worked very closely with DISA FSO on Good Technology‘s DISA
STIG Checklist for Good Mobile Messaging S/MIME on Windows Mobile as well as the DRAFT
iOS and Android STIG's. Additionally, he is a subject matter expert at Good Technology for
S/MIME and PKI. Prior to his Cyber Security role, Mr. Liderman was a Senior Product Marketing
Manager for Government and Security specifically focusing on designing products that met DoD
Directive 8100.2 as well as Homeland Security Presidential Directive 12. Mr. Liderman started
as a Sales Engineer at Good Technology where his primary responsibility was assisting
customers deploy Good‘s enterprise suite of applications in the Federal Government. Mr.
Liderman has spoken at numerous public forums/conferences and belongs to various industry
groups such as AFCEA, ACT/IAC, and the CTIA Cyber Security Working Group.











Cyber Warnings E-Magazine – CTIA Special Edition, September 2014
6
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   1   2   3   4   5   6   7   8   9   10   11