Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.


Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Click here to hide

MaaS360 by Fiberlink

Mobile device security a high priority for IT

Mobile device security ranks high on the list of concerns for IT, according to a TechTarget article that highlighted a recent SearchCompliance.com survey.


Mobile device security a high priority for IT

mdm, security

Mobile device security ranks high on the list of concerns for IT, according to a TechTarget article that highlighted a recent SearchCompliance.com survey. Network and data access was a top concern, with 60 percent of respondents ranking unauthorized access control as "very important."

The article also highlighted growth in mobile devices in the workplace, with 66 percent of respondents saying their company spends more on mobile application security now than in the past. Many organizations also allow their employees to freely download applications on the devices they use for both personal and professional activity.

"The growth of the mobile device … is very outstanding, and is one of the key drivers to this change in how enterprises' workforce functions," said Cloud Security Alliance founding member Becky Swain, who was quoted in the article. "This has been compounded by new market pressures to enable innovation. These demands are coming from the business - and putting more pressure on IT to support this."

Swain indicated a need for IT security to account for the new demands created by more mobility in the workplace.

Mobile device management built today to work in the future

According to a recent ComputerWorld article, a complete mobile device management strategy can lessen the potential IT headache of implementing and securing a more mobile workforce, but it takes some planning to get there. Issues that should be addressed in a comprehensive MDM strategy include: which devices to support, whether to embrace the bring-your-own-device (BOD) trend, what security requirements to put in place and what security capabilities to look for in an MDM solution.

"Enterprises must plan now for the mobile devices of the future that they don't even know of yet," Kevin Benedict, principal analyst at Netcentric Strategies, told ComputerWorld. "So you build an infrastructure that says it doesn't care what devices are on the end of it and you have a framework that you just plug into."

Even though planning is important, the article also warns that building a complete MDM strategy is an ongoing process. As new technologies and devices are developed and existing ones evolve, MDM strategy will need to be updated to accommodate new demands. For example, remote wiping policies should make it clear what actions the company will take if a personal device with enterprise data gets stolen, and whether or not the company will erase both personal and corporate data.

Recommended Articles for You

Post a Comment

Greg Leighton

11 Jun 2012 | 03:41 PM

Great article!

RSS feed for comments on this page | RSS feed for all comments

Industry News
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.