Device Management
Network Architectures
Advice for network architects and systems administrators on the design of remote access architecture for enterprise services When deciding how to enab...
Virtual Private Networks (VPNs)
Choosing, deploying and configuring VPN technologies Virtual Private Networks (VPNs) allow organizations to provide secure connectivity between device...
Enterprise Authentication Policy
Implementing effective authentication on smartphones, tablets, laptops and desktop PCs Authentication is the process of verifying the identity of eith...
Erasing Mobile Devices
Advice for IT admins and individuals on the secure removal of data or malware from smartphones, tablets, laptops and desktop PCs Very often an organiz...
Obsolete Products
Reducing the risks from using out of date smartphones, tablets, laptops, desktop PCs, appliances or software applications. All software, including dev...
Advising End Users
Advising your organization’s users on expected and acceptable uses of smartphones, tablets, laptops and desktop PCs Once devices have been provision...
Managing Mobile Device Firmware
Advice for IT system administrators on firmware management for smartphones, tablets, laptops and desktop PCs All modern mobile devices include firmwar...
Keeping Devices and Software Up to Date
Advice for individuals and organizations on keeping software on smartphones, tablets, laptops and desktop PCs up to date. Modern mobile devices run a ...
Enterprise Instant Messaging
Advice on assessing the security features of enterprise instant messaging systems for smartphones, tablets, laptops and desktop PCs Enterprise Instant...
Using Third-Party Applications
Advice on the assessment, distribution and use of third-party applications on smartphones, tablets, laptops and desktop PCs All modern mobile devices ...
Managing Web Browser Security
Advice for IT Admins on the management of security settings for web browsers BCSF is focused on providing high-level guidance will help you develop an...
Antivirus and Other Security Software
Advice on the selection, configuration and use of antivirus and other security software on smartphones, tablets, laptops and desktop PCs Antivirus (AV...
Using Biometrics
Advice for IT system administrators on using biometric authentication on smartphones, tablets, laptops and desktop PCs. Biometrics are biological char...
Mobile Device Management
Advice on the selection and implementation of Mobile Device Management within your enterprise A Mobile Device Management (MDM) service combines device...
Zero-Touch Enrollment
Using zero-touch enrollment to automatically provision smartphones, tablets and laptops Zero-touch automates much of the manual work involved in tradi...
Provisioning and Distributing Devices
Advice for IT administrators on how to provision and distribute smartphones, tablets and laptops to end users Provisioning new devices and distributin...
Purchasing Devices
Managing supply chain security when buying smartphones, tablets, laptops and desktop PCs There are many sourcing options available to organizations wh...
Choosing Mobile Devices
When choosing laptops, mobile phones and tablets for use by your organization, there will be many competing factors to consider. Price, functionality ...
Logging and Protective Monitoring
Using logging and monitoring to identify threats and protect smartphones, tablets, laptops and desktop PCs Security monitoring is central to the ident...
Using Built-in Cloud Services
Secure use of built-in cloud services on smartphones, tablets, laptops and desktop PCs. Most modern devices and browsers are able to sync user data an...
Using Peripherals Securely
Advice for IT system administrators on the secure management of peripherals for smartphones, tablets, laptops and desktop PCs Most modern mobile devic...
Device Management
Device management is the process of managing the implementation, operation and maintenance of a physical and/or virtual device. It is a broad term tha...
BYOD Agreement
I am seeking connectivity to ORGANIZATION (from here referred to as the Company) electronic messaging (email) services for my personally-owned smart...
BYOD/Personal Device Agreement Sample
Personal Smart Device Usage Agreement (BYOD - Bring Your Own Device) BCSF recommends that organizations restrict BYOD access to mobile phones only. Pe...
Bring Your Own Device (BYOD) Guidance
Guidance for personal devices in organization environments. Guidance for companies on enabling staff to use their own smartphones, tablets, laptops an...