Enterprise mobile device security 2012

Enterprise mobile device security 2012

SearchSecurity.com polls nearly 500 on mobile policies, practices

In the second quarter of 2012, the editors of SearchSecurity.com surveyed nearly 500 enterprise information security professionals on mobile device security in the enterprise. This special report examines the results of the survey and offers analysis of what the results mean for enterprise mobile security now and in the years to come.

Table of contents:

Mobile security survey 2012 audio slideshow

security research news SearchSecurity.com is pleased to present the results of its 2012 enterprise mobile security survey. In this special presentation, Senior Site Editor Eric B. Parizo and News Director Robert Westervelt discuss the survey's key data points and offer analysis on what the findings mean to enterprise information security professionals and other IT managers charged with mobile security.

Smartphone, BYOD security risks fuel interest in MDM platforms

security research newsMobile device loss, mobile application security, data leakage, malware threats and BYOD security risks are driving organizations to consider mobile device management (MDM) platforms, according to a survey conducted by SearchSecurity.com in the second quarter of 2012.

Mobile device security policies should be revisited and revisited often

security research newsAccording to a mobile security survey of more than 400 IT and security professionals conducted by SearchSecurity.com in the second quarter of the year, 64% of companies have a written mobile device security policy. CISOs at many companies have lagged in developing policies, but those still without a policy need to put one together as soon as possible, experts say.

BYOD gaining ground as employees increasingly need mobile access

security research newsThe BYOD trend will grow as more workers want mobile access to corporate data, a SearchSecurity.com survey says. BYOD's benefits outweigh the risks, and organizations should embrace it.

Android security model doing best to enable mobile malware spread

security research newsMobile malware is real and attackers are using it to steal confidential business data stored on smartphones. But don’t let anyone fool you into believing there is a deep hacker think-tank at work, developing exploits for the latest mobile device vulnerabilities. Researchers such as Dan Guido have instead painted a clearer picture of the mobile malware landscape, and it’s frighteningly simple, and enabled quite nicely for the most part by Google’s Android security model.