Help Irongeek.com pay for bandwidth and research equipment:
MDM is gone, MAM is come. New Challenges on mobile security - Yury Chemerkin Notacon 11 (Hacking Illustrated Series InfoSec Tutorial Videos)
MDM is gone, MAM is come. New Challenges on mobile security
“Last years, we have been observing a market expansion on compliance, guidelines and best practices besides of technical solutions on mobile security like MDM or something. However, MDM is out control for BYOD there and makes room for MAM. MAM is still hidden part of MDM and focuses on application management. MAM comes to rule the mobile world when MDM is not capable to provide granular control over BYOD and totally based configurations settings, APIs, permissions, firmware and application data, access control, tracking, etc. Talk shows how companies and individuals could be victims and why technical solutions liable for the consequences in the first place if you are not ready to MAM.”
Yury Chemerkin started as a reverser and security developer and continued to gain experience on malware and mobile security. Last years he has been researching Mobile and Cloud solutions (and IAM solutions in general) for exploitation from different viewpoints (incl. forensics) based on misunderstood security principles and developing as a distributed spyware infrastructure. Now he is a multi-skilled security expert on security & compliance and mainly focused on privacy and leakage showdown.
to Notacon 11 video list
Printable version of this article
15 most recent posts on Irongeek.com:
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2019, IronGeek
Louisville / Kentuckiana Information Security Enthusiast