This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

setup profile for android

Hi All

with IOS phones , I can create a config with apple's configurtaion utility and with windows mobile phones there is a template

how do I setup a profile for android? where do a find a list of configuration options, the only options provided with SMC are around password control, how do I create a profile for Activesync, wireless links, VPNs etc.....?

Cheers, steve 

:16767


This thread was automatically locked due to age.
Parents
  • I agree when it comes to details like unencrypted storage for exchange data - users can install third party mail clients which can encrypt mail and contacts while losing integration with other programs.

    Unfortunately, there are some design decisions in Android 2.x that can not be mitigated - like the execution of unsigned code from third parties, and immanent flaws like slow availability of security fixes for the base os.

    The hassle of modifying Android to mitigate the risks from the open architecture would probably take up the full cost advantage of the devices, and you will need to evaluate each new device and each firmware release for compatibility with the software of your choice.

    In photography, there is a saying: you can do it right in 1/125s or in 20 minutes with Photoshop. There should be a similar proverb for mobile device security.

    Best regards,

    Detlev
    :17343
Reply
  • I agree when it comes to details like unencrypted storage for exchange data - users can install third party mail clients which can encrypt mail and contacts while losing integration with other programs.

    Unfortunately, there are some design decisions in Android 2.x that can not be mitigated - like the execution of unsigned code from third parties, and immanent flaws like slow availability of security fixes for the base os.

    The hassle of modifying Android to mitigate the risks from the open architecture would probably take up the full cost advantage of the devices, and you will need to evaluate each new device and each firmware release for compatibility with the software of your choice.

    In photography, there is a saying: you can do it right in 1/125s or in 20 minutes with Photoshop. There should be a similar proverb for mobile device security.

    Best regards,

    Detlev
    :17343
Children
No Data