Access your Pro+ Content below.
New data on enterprise mobile security
This article is part of the Information Security magazine issue of July/August 2013 / Volume 15 / No. 6
We crunched the numbers in this month’s issue to get your take on mobile device security and noticed some telling trends. Access control has moved to the top of many organizations’ security lists in 2013 as device control continues to give way to bring your own device. The data from our annual Enterprise Mobile Security Survey, fielded in Q2 2013, is presented in “Mobile Security by the Numbers.” Thanks to the 768 IT and security professionals that participated in the SearchSecurity.com survey. Enterprise mobile security—and data loss prevention—gets even more fun when you add the host of services and networks that mobile devices access regularly throughout the day. In our cover story this month, virtualization infrastructure guru Dave Shackleford looks at how some organizations are starting to control traffic at different layers of their networks and use emerging technologies that facilitate traffic capture, analysis and control. In addition to new isolation techniques, organizations are looking to collapse their infrastructure...
Access this PRO+ Content for Free!
Features in this issue
In this special report, Dave Shackleford explores advanced network security architectures that help segment and isolate traffic with in your data center.
Cover story: Want to shed appliances? Consolidation and new platforms hold promise for security teams.
The majority of breaches occur as the result of third parties. MacDonnell Ulsch advises companies to safeguard third-party management agreements.
Almost 60% of respondents in our 2013 Enterprise Mobile Security Survey believe mobile devices present more risk now than in Q2 2012. What’s changed?
Columns in this issue
We polled readers in our annual Enterprise Mobile Security Survey and the 2013 results are in.
A decade after becoming law, the ripple effects of California's SB 1386 have surfaced in a new breed of proactive, granular state data privacy laws.
Big data presents big challenges for computer science programs from classification to cloud security. Are industry partnerships the answer?