As users are the first line of defense against any mobile threat, EMM’s can employ policies that can force:

  • Verified Boot
  • Strong PIN, pattern or password lock
  • Continuous SMS and call monitoring
  • Passphrase to recover lost email accounts

Leave a Reply