Access "MDM products: More calls to secure a mobile workforce"
This article is part of the June 2013 / Volume 15 / No. 5 issue of The rapid evolution of MDM solutions
The consumerization of IT, and the enormous popularity of touchscreen devices such as Apple iPads and Google Android tablets, is uprooting traditional approaches to mobile device management (MDM) and data security. Mobile innovations and demand for IT support of the latest devices from the rank-and-file—and C-level executives—can result in cost benefits, despite the security implications of mobile applications and devices that may not be visible to IT. Currently, 63% of companies support bring your own device (BYOD) environments in some shape or form. However, workers’ preferences for Apple’s iOS and Google’s Android mobile operating systems are driving out enterprise-friendly platforms such as BlackBerry’s longtime OS (now called BlackBerry 10) and Microsoft’s Windows Mobile OS. As MDM solutions continue to evolve, next generation technologies are geared to help CISOs move beyond consumer-oriented endpoints and their inherent security tradeoffs. Employees expect their devices to have anytime, anywhere access to corporate resources. While allowing this type ... Access >>>
Premium Content for Free.
MDM products: More calls to secure a mobile workforce
by Philip Clarke
As MDM products rapidly evolve to support the growth of BYOD smartphones and tablets, security professionals need to rethink mobility policies.
Are FedRAMP security controls enough?
by Joseph Granneman
Cloud service providers are working with authorized third-party auditors to meet FedRAMP security controls. The 3PAOs tell us how it’s going, so far.
- MDM products: More calls to secure a mobile workforce by Philip Clarke
Big data analytics: New patterns emerge for security
by Kathleen Richards
Will big data analytics make security better? With data scientists in short supply, solution providers rush to provide big data analytics tools.
- Big data analytics: New patterns emerge for security by Kathleen Richards
Diversity at work: MDM solutions keep pace
by Kathleen Richards
Philip Clarke, co-leader of the Wireless and Mobility track at Nemertes Research, reports on what’s ahead for mobile device management solutions.
McGraw: Financial services develop a proactive posture
by Gary McGraw, Contributor
The idea behind proactive security is simple: build security in the first time by following security models like BSIMM and security engineering.
Staff infection: IT security education is contagious
by Doug Jacobson, Julie A. Rursch
If bad attitudes are spreading across the IT staff like germs, better IT security education may just be the cure.
- Diversity at work: MDM solutions keep pace by Kathleen Richards
More Premium Content Accessible For Free
Unified threat management aspires to the enterprise class
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
Threat intelligence and risk: Why cybersecurity hangs in the balance
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
How to respond to the latest distributed denial-of-service attacks
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...