Access "Mobility trend takes off in the enterprise but leaves out security"
This article is part of the June 2011 issue of BYOD means creating a new security game plan in the enterprise
Everyone agrees that consumerization of IT is an oncoming train. Plenty of ink has been used describing the adoption trends. Mobility is the latest consumerization movement -- organizations large and small are embracing mobility to engage with consumers and promote enterprise productivity and collaboration. One industry that has adopted mobility enthusiastically is the payment and banking industry. Every consumer bank and financial institution has some form of a mobile payment/banking strategy. However, many important decisions about mobile banking are being made without consulting security teams, and even when they’re invited to the discussion, they’re not given the power to say no, because everyone is feeling urgency with the mobility trend. For example, there is a lot of pressure to push information out via SMS. SMS account alerts, balance inquiries, etc., are becoming a common practice. In North America, there is a unique phenomenon best described as SMS to Web. Imagine your bank sends you an account overdraft SMS alert and includes a URL for you to ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Get actionable results from a security information management system
by Andreas M. Antonopoulos
In order to get the best results, you need to limit your goals for SIM.
-
Revamped FISMA requirements aim to improve federal security
by Crystal Bedell
An automated tool and mandates for continuous monitoring try to improve federal information security efforts.
-
Get actionable results from a security information management system
by Andreas M. Antonopoulos
-
-
IT consumerization drives new security thinking
by Marcia Savage, Editor
The influx of personal smartphones and other computing devices into the enterprise is forcing a shift in security strategy.
-
Data breaches show enterprise need for better data security management
by Robert Westervelt, News Director
Sony and other data breaches suggest need for data accountability, better configuration management.
-
IT consumerization drives new security thinking
by Marcia Savage, Editor
-
Columns
-
Lack of SMB security opens door to online criminals
by Michael S. Mimoso, Editorial Director
Online criminals have smaller targets firmly in their crosshairs.
-
Mobility trend takes off in the enterprise but leaves out security
by Chenxi Wang
Banks and other businesses are rushing to jump on the mobility trend but leaving security behind.
-
Marcus Ranum and Bob Blakley discuss risk management failures
by Marcus J. Ranum, Contributor
Security expert and Information Security magazine columnist Marcus Ranum continues a new bimonthly feature where he goes one-on-one with a fellow security industry insider.
-
Lack of SMB security opens door to online criminals
by Michael S. Mimoso, Editorial Director
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO