An MDM Configuration Review is designed to ensure the configuration deployed to company mobile devices is secure.
The review assesses the current configuration against best practice guidelines to ensure the threat posed by company devices is managed and the potential impact of a compromised corporate mobile device is reduced.
Strong evidence exists that several threat actors are diversifying from traditional user devices to mobile.
Mobile phone devices are commonly used to facilitate enterprise communication, data access and more recently feature heavily in 2-factor authentication system integration. Due to this increasing use it is vital to ensure that mobile devices are securely configured.