CompTIA Secure Mobility Professional
1 Secure Mobility Concepts
1-1 Introduction to Secure Mobility
1-2 Mobile Device Management (MDM)
1-3 Mobile Application Management (MAM)
1-4 Mobile Content Management (MCM)
1-5 Mobile Identity Management
1-6 Mobile Threat Management
1-7 Secure Mobility Architecture
2 Mobile Device Security
2-1 Mobile Device Types and Characteristics
2-2 Mobile Operating Systems
2-3 Mobile Device Hardware Security
2-4 Mobile Device Software Security
2-5 Mobile Device Encryption
2-6 Mobile Device Authentication
2-7 Mobile Device Data Protection
2-8 Mobile Device Forensics
3 Mobile Network Security
3-1 Mobile Network Types
3-2 Mobile Network Architecture
3-3 Mobile Network Security Protocols
3-4 Mobile Network Threats
3-5 Mobile Network Security Controls
3-6 Mobile Network Encryption
3-7 Mobile Network Authentication
3-8 Mobile Network Data Protection
4 Mobile Application Security
4-1 Mobile Application Types
4-2 Mobile Application Development Security
4-3 Mobile Application Threats
4-4 Mobile Application Security Controls
4-5 Mobile Application Encryption
4-6 Mobile Application Authentication
4-7 Mobile Application Data Protection
4-8 Mobile Application Testing
5 Mobile Data Security
5-1 Mobile Data Types
5-2 Mobile Data Storage Security
5-3 Mobile Data Transmission Security
5-4 Mobile Data Encryption
5-5 Mobile Data Access Control
5-6 Mobile Data Backup and Recovery
5-7 Mobile Data Compliance
6 Mobile Identity and Access Management
6-1 Mobile Identity Management Concepts
6-2 Mobile Identity Providers
6-3 Mobile Identity Federation
6-4 Mobile Identity Verification
6-5 Mobile Access Control
6-6 Mobile Single Sign-On (SSO)
6-7 Mobile Multi-Factor Authentication (MFA)
6-8 Mobile Identity Threats
7 Mobile Threat Management
7-1 Mobile Threat Types
7-2 Mobile Threat Detection
7-3 Mobile Threat Response
7-4 Mobile Threat Intelligence
7-5 Mobile Threat Mitigation
7-6 Mobile Threat Reporting
7-7 Mobile Threat Monitoring
8 Secure Mobility Architecture
8-1 Secure Mobility Architecture Components
8-2 Secure Mobility Architecture Design
8-3 Secure Mobility Architecture Implementation
8-4 Secure Mobility Architecture Testing
8-5 Secure Mobility Architecture Maintenance
8-6 Secure Mobility Architecture Compliance
9 Secure Mobility Policies and Procedures
9-1 Secure Mobility Policy Development
9-2 Secure Mobility Policy Implementation
9-3 Secure Mobility Policy Enforcement
9-4 Secure Mobility Policy Review
9-5 Secure Mobility Policy Compliance
9-6 Secure Mobility Incident Response
10 Secure Mobility Compliance and Regulations
10-1 Secure Mobility Compliance Requirements
10-2 Secure Mobility Regulatory Frameworks
10-3 Secure Mobility Compliance Audits
10-4 Secure Mobility Compliance Reporting
10-5 Secure Mobility Compliance Training
11 Secure Mobility Best Practices
11-1 Secure Mobility Best Practices Overview
11-2 Secure Mobility Best Practices Implementation
11-3 Secure Mobility Best Practices Monitoring
11-4 Secure Mobility Best Practices Review
11-5 Secure Mobility Best Practices Continuous Improvement
12 Secure Mobility Case Studies
12-1 Secure Mobility Case Study Analysis
12-2 Secure Mobility Case Study Implementation
12-3 Secure Mobility Case Study Lessons Learned
12-4 Secure Mobility Case Study Best Practices
13 Secure Mobility Future Trends
13-1 Secure Mobility Future Trends Overview
13-2 Secure Mobility Future Trends Analysis
13-3 Secure Mobility Future Trends Implementation
13-4 Secure Mobility Future Trends Impact
14 Secure Mobility Certification Exam Preparation
14-1 Secure Mobility Certification Exam Overview
14-2 Secure Mobility Certification Exam Preparation Strategies
14-3 Secure Mobility Certification Exam Practice Questions
14-4 Secure Mobility Certification Exam Review
14-5 Secure Mobility Certification Exam Tips
Mobile Application Management (MAM) Explained

Mobile Application Management (MAM) Explained

Mobile Application Management (MAM) is a critical component of enterprise mobility management (EMM) that focuses on the management and security of mobile applications. Unlike Mobile Device Management (MDM), which controls the entire device, MAM allows organizations to manage and secure applications without necessarily controlling the device itself.

Key Concepts of MAM

1. Application Wrapping

Application wrapping is a technique where a management layer is added to an existing mobile application without requiring any changes to the app's source code. This layer enables the app to be managed and secured by the organization. For example, an organization can wrap a third-party app to enforce policies such as data encryption, screen capture restrictions, and remote wiping of app data.

2. Containerization

Containerization involves creating a secure, isolated environment within a mobile device where corporate applications and data can reside. This separation helps protect corporate data from personal data and vice versa. Think of it as having a secure vault on your device where only approved apps and data can enter. For instance, a containerized app might require a separate authentication process to access corporate data, ensuring that personal apps cannot access sensitive information.

3. Policy Enforcement

Policy enforcement in MAM refers to the application of specific rules and restrictions to mobile apps. These policies can include requirements for strong passwords, data encryption, and restrictions on data sharing. For example, a policy might dictate that all data within a corporate app must be encrypted, and any attempt to share data with a personal app will be blocked. This ensures that sensitive information remains secure and compliant with organizational standards.

4. Remote Wiping

Remote wiping is a feature that allows an organization to erase corporate data from a mobile device, either selectively or entirely. This is particularly useful in scenarios where a device is lost or stolen. For instance, if an employee leaves the company, the IT department can remotely wipe all corporate data from their device, ensuring that sensitive information does not fall into the wrong hands.

5. Single Sign-On (SSO)

Single Sign-On (SSO) in MAM allows users to authenticate once and gain access to multiple corporate applications without needing to re-enter credentials. This not only enhances user experience but also improves security by reducing the number of times users need to enter their credentials. Imagine logging into your corporate email and automatically being authenticated for other corporate apps like CRM and HR systems, all with a single login.

Conclusion

Mobile Application Management (MAM) is essential for organizations looking to secure and manage mobile applications without compromising user experience. By understanding and implementing key concepts like application wrapping, containerization, policy enforcement, remote wiping, and Single Sign-On, organizations can ensure that their mobile applications are both secure and efficient.