Zimperium logo

On-Demand Webinar
Mobile Is Another Endpoint: CIS Critical Security Controls for Mobile

Copyright © 2010 - 2019, Zimperium, Inc. All Rights Reserved

Indochino

Immediate Access to Recording

Your email and personal information are confidential, and will not be sold or rented. For further information, read our Privacy Policy.

Now that mobile devices are the majority of all endpoints accessing corporate/agency data, leading organizations have extended their endpoint security methodologies/recommendations accordingly.

In the first of a two part series, Zimperium looks at how the Center for Internet Security (CIS) has expanded its well-known “Critical Security Controls” to cover mobile.

The CIS Critical Security Controls help security teams assess current security controls and set goals to improve procedures to protect sensitive data while maintaining reasonable access to critical assets. 

Watch our on-demand webinar to learn more about:

  • The CIS Critical Security Controls for Mobile
  • Which Controls are addressed by MDMs
  • Which Controls are addressed by MTDs like Zimperium

You might also be interested in:
2019 H1 State of Enterprise Mobile Security Report