Compromised Enterprise Mobility Management Device Initiates Security
Enterprise Mobility Management has integration with many IDSA applications so that it can share information when a user’s device has been compromised. These applications can then act on this information by disabling the end user’s access until the situation has been resolved.
Enterprise Mobility Management (EMM) provides device compromised status to appropriate IDSA applications for disabling access of effected end users.
– Click for larger image –
- Access is disabled in end user’s device is compromised.
- Access is re-enabled once approved by the manager.
IDSA Security Controls
Access enforcement based on risk posture derived from at least one risk engine. (Cloud Access Security Broker, Fraud & Risk, UEBA, SIEM).
Enterprise Mobility Management (EMM) device management based on risk posture derived from at least one risk engine (Cloud Access Security Broker, Fraud & Risk, UEBA, SIEM).