Premium Content

Access "New data on enterprise mobile security"

Kathleen Richards, Features Editor Published: 16 Jul 2013

We crunched the numbers in this month’s issue to get your take on mobile device security and noticed some telling trends. Access control has moved to the top of many organizations’ security lists in 2013 as device control continues to give way to bring your own device. The data from our annual Enterprise Mobile Security Survey, fielded in Q2 2013, is presented in “Mobile Security by the Numbers.” Thanks to the 768 IT and security professionals that participated in the SearchSecurity.com survey. Enterprise mobile security—and data loss prevention—gets even more fun when you add the host of services and networks that mobile devices access regularly throughout the day. In our cover story this month, virtualization infrastructure guru Dave Shackleford looks at how some organizations are starting to control traffic at different layers of their networks and use emerging technologies that facilitate traffic capture, analysis and control. In addition to new isolation techniques, organizations are looking to collapse their infrastructure through virtualization and ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Next-generation firewalls play by new rules
    ism_cover_0913.png
    E-Zine

    Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...

  • Developing your endpoint security management transition plan
    endpoint_security_management_cover_0913.png
    E-Handbook

    This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...

  • Emerging threat detection techniques and products
    threat_detection_technologies_cover.png
    E-Handbook

    Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...