Access "Mobile device management systems help mitigate BYOD risks"
This article is part of the May 2012 issue of New security strategies for the bring-your-own-device era
Multi-platform mobile device management systems are gaining a foothold in enterprises anxious to meet the needs of today's expanding mobile workforce. While no silver bullet, MDM technology can give IT centralized, scalable visibility and control over the unruly bring-your-own device (BYOD) trend. In a recent study by Ponemon Institute, most organizations agreed that mobile devices created business risk but were important to achieving business objectives. However, just 39 percent had deployed security controls needed to address that risk; fewer than half of those could enforce mobile security policies. Unfortunately, this lax governance has already resulted in non-compliance and data breaches. In Ponemon’s survey, 59 percent said employees disengaged fundamental measures such as passwords; another 12 percent were unsure. It should therefore come as no surprise that half of those organizations had experienced mobile data loss during the past year. Given the rash of employee-owned smartphones and tablets now finding their way into the workplace, IT simply must... Access >>>
Premium Content for Free.
Mobile device management systems help mitigate BYOD risks
by Lisa Phifer, Contributor
Understand the benefits and limitations of multi-platform MDM technology.
Deploying DP systems: Four DLP best practices for success
by Crystal Bedell
Plan your data loss prevention project carefully to avoid missteps.
- Mobile device management systems help mitigate BYOD risks by Lisa Phifer, Contributor
VMware strategy for security partners undergoes overhaul
by Marcia Savage, Editor
Virtualization giant revamps its security partner program after hitting some bumps in the road.
Thwarting BYOD risks starts with a mobile security policy, experts say
by Robert Westervelt, News Director
Organizations need to establish formal mobile policies before buying a mobile device management system.
- VMware strategy for security partners undergoes overhaul by Marcia Savage, Editor
Verizon DBIR: Organizations are forgetting computer security basics
by Marcia Savage
Verizon data breach report illustrates need to get back to basics.
Cybersecurity education vs. cybersecurity training
by Ron Woerner, Contributor
Security professionals need to understand the difference and plan accordingly.
Security staffing: Why information security positions go unfilled
by Lee Kushner, Contributor
Be aware of potential roadblocks and adjust your recruiting accordingly.
- Verizon DBIR: Organizations are forgetting computer security basics by Marcia Savage
More Premium Content Accessible For Free
In this special issue, we are revealing the winners of our Security 7 awards. This is the ninth year we've handed out the Security 7 awards, which ...
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...