Access your Pro+ Content below.
Mobile device protection: Tackling mobile device security risks
This article is part of the Information Security magazine issue of January/February 2012
Like many organizations, the city of Seattle is devising a strategy for mobile devices. City officials are figuring out which mobile operating systems they’ll support, whether to allow employees to use their own phones and they’re testing mobile device management technology. Ultimately, managing an influx of mobile devices requires a much different security strategy than the traditional desktop model of antivirus and other endpoint controls, says Mike Hamilton, Seattle’s CISO. “Computing is becoming extremely ubiquitous. As a result, there is no perimeter anymore,” he says. “So 20th century controls aren’t going to work in this environment.” The deluge of iPhones, iPads and Android devices into the enterprise has put mobile device security risks at the top of the agenda for many organizations. According to Information Security and SearchSecurity.com’s 2012 Priorities survey, 72 percent of 900 respondents cite mobile device protection as a priority this year. Nearly 35 percent view mobile device security as a major challenge with...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Attackers are targeting new vectors such as smartphones, social media and cloud services. Enterprises need to up their game.
Managing mobile device risks tops the list of priorities for security pros this year.
A rash of CA breaches shows up weaknesses in the SSL infrastructure. Take action to protect your customers and employees.
Security experts say there are better alternatives to copyright protection.
Columns in this issue
An examination of three cases illustrates that it’s not always a clear case of good vs. evil.
Security expert Marcus Ranum talks with Joel Yonts, a seasoned security executive with a passion for information security research.
Prominent security and Internet thinkers and leaders have become an effective lobby on Capitol Hill and played a big role in squashing SOPA.