In the second quarter of 2012, the editors of SearchSecurity.com surveyed nearly 500 enterprise information security professionals on mobile device security in the enterprise. This special report examines the results of the survey and offers analysis of what the results mean for enterprise mobile security now and in the years to come.
Table of contents:
Mobile security survey 2012 audio slideshow
SearchSecurity.com is pleased to present the results of its 2012 enterprise mobile security survey. In this special presentation, Senior Site Editor Eric B. Parizo and News Director Robert Westervelt discuss the survey's key data points and offer analysis on what the findings mean to enterprise information security professionals and other IT managers charged with mobile security.
Smartphone, BYOD security risks fuel interest in MDM platforms
Mobile device loss, mobile application security, data leakage, malware threats and BYOD security risks are driving organizations to consider mobile device management (MDM) platforms, according to a survey conducted by SearchSecurity.com in the second quarter of 2012.
Mobile device security policies should be revisited and revisited often
According to a mobile security survey of more than 400 IT and security professionals conducted by SearchSecurity.com in the second quarter of the year, 64% of companies have a written mobile device security policy. CISOs at many companies have lagged in developing policies, but those still without a policy need to put one together as soon as possible, experts say.
BYOD gaining ground as employees increasingly need mobile access
The BYOD trend will grow as more workers want mobile access to corporate data, a SearchSecurity.com survey says. BYOD's benefits outweigh the risks, and organizations should embrace it.
Android security model doing best to enable mobile malware spread
Mobile malware is real and attackers are using it to steal confidential business data stored on smartphones. But don’t let anyone fool you into believing there is a deep hacker think-tank at work, developing exploits for the latest mobile device vulnerabilities. Researchers such as Dan Guido have instead painted a clearer picture of the mobile malware landscape, and it’s frighteningly simple, and enabled quite nicely for the most part by Google’s Android security model.
Security Management Strategies for the CIO