Issue Overview
Information Security magazine - June 2013 / Volume 15 / No. 5Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the rapid turnover in consumer mobile technology, have left many organizations grappling with MDM requirements.
Our June cover story provides insight into the mobility adoption trends, cross-industry issues, and MDM solutions best fit to varying requirements. Technology advances range from nascent network-based mobile device management (NMDM) to software-based approaches such as mobile application management (MAM), native container device management, and more. We also look at big data analytics and security this month, and how early adopters are expanding the definition of risk to all part of the business. Finally, we provide an update on FedRAMP. Does it go far enough, and how will the continuous monitoring of cloud service providers be handled? Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
MDM products: More calls to secure a mobile workforce
by Philip Clarke
As MDM products rapidly evolve to support the growth of BYOD smartphones and tablets, security professionals need to rethink mobility policies.
-
Are FedRAMP security controls enough?
by Joseph Granneman
Cloud service providers are working with authorized third-party auditors to meet FedRAMP security controls. The 3PAOs tell us how it’s going, so far.
-
MDM products: More calls to secure a mobile workforce
by Philip Clarke
-
-
Big data analytics: New patterns emerge for security
by Kathleen Richards
Will big data analytics make security better? With data scientists in short supply, solution providers rush to provide big data analytics tools.
-
Big data analytics: New patterns emerge for security
by Kathleen Richards
-
Columns
-
Diversity at work: MDM solutions keep pace
by Kathleen Richards
Philip Clarke, co-leader of the Wireless and Mobility track at Nemertes Research, reports on what’s ahead for mobile device management solutions.
-
McGraw: Financial services develop a proactive posture
by Gary McGraw, Contributor
The idea behind proactive security is simple: build security in the first time by following security models like BSIMM and security engineering.
-
Staff infection: IT security education is contagious
by Doug Jacobson, Julie A. Rursch
If bad attitudes are spreading across the IT staff like germs, better IT security education may just be the cure.
-
Diversity at work: MDM solutions keep pace
by Kathleen Richards
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
Enterprise network security visibility: Beyond traditional defenses
E-Handbook
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security ...
Security Management Strategies for the CIO