Access your Pro+ Content below.
Diversity at work: MDM solutions keep pace
This article is part of the June 2013 / Volume 15 / No. 5 issue of Information Security magazine
In the wake of Microsoft’s about face on the touchscreen-driven Windows 8 designed to mirror its Windows Phone and tablet interface, our June cover story looks at new data on mobile device management solutions and the challenges of securing consumer-driven platforms. No one will be surprised that mobile devices are continuing to make inroads in many organizations. This includes tablets, which are expected to usurp laptops in organizations that support this trend, in the next five years. What may surprise some readers, however, is that unlike desktops and laptops, when it comes to mobile devices, workers’ preferences matter. As Philip Clarke, research analyst and co-leader of the Wireless and Mobility track at Nemertes Research, reports in his June cover story on MDM: “Workers’ preferences for Apple’s iOS and Google’s Android mobile operating systems are driving out enterprise-friendly platforms such as BlackBerry’s longtime OS (now called BlackBerry 10) and Microsoft’s Windows Mobile OS.” That presents a dilemma for ...
Features in this issue
As MDM products rapidly evolve to support the growth of BYOD smartphones and tablets, security professionals need to rethink mobility policies.
Will big data analytics make security better? With data scientists in short supply, solution providers rush to provide big data analytics tools.
Cloud service providers are working with authorized third-party auditors to meet FedRAMP security controls. The 3PAOs tell us how it’s going, so far.
Columns in this issue
Philip Clarke, co-leader of the Wireless and Mobility track at Nemertes Research, reports on what’s ahead for mobile device management solutions.
The idea behind proactive security is simple: build security in the first time by following security models like BSIMM and security engineering.
If bad attitudes are spreading across the IT staff like germs, better IT security education may just be the cure.