Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
July/August 2013 / Volume 15 / No. 6

New data on enterprise mobile security

We crunched the numbers in this month’s issue to get your take on mobile device security and noticed some telling trends. Access control has moved to the top of many organizations’ security lists in 2013 as device control continues to give way to bring your own device. The data from our annual Enterprise Mobile Security Survey, fielded in Q2 2013, is presented in “Mobile Security by the Numbers.” Thanks to the 768 IT and security professionals that participated in the SearchSecurity.com survey. Enterprise mobile security—and data loss prevention—gets even more fun when you add the host of services and networks that mobile devices access regularly throughout the day. In our cover story this month, virtualization infrastructure guru Dave Shackleford looks at how some organizations are starting to control traffic at different layers of their networks and use emerging technologies that facilitate traffic capture, analysis and control. In addition to new isolation techniques, organizations are looking to collapse their infrastructure...

Features in this issue

  • Enterprise mobile security by the numbers

    by  Kathleen Richards, Features Editor

    Almost 60% of respondents in our 2013 Enterprise Mobile Security Survey believe mobile devices present more risk now than in Q2 2012. What’s changed?

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close