Mobile device security ranks high on the list of concerns for IT, according to a TechTarget article that highlighted a recent SearchCompliance.com survey.
Mobile device security a high priority for IT
Mobile device security ranks high on the list of concerns for IT, according to a TechTarget article that highlighted a recent SearchCompliance.com survey. Network and data access was a top concern, with 60 percent of respondents ranking unauthorized access control as "very important."
The article also highlighted growth in mobile devices in the workplace, with 66 percent of respondents saying their company spends more on mobile application security now than in the past. Many organizations also allow their employees to freely download applications on the devices they use for both personal and professional activity.
"The growth of the mobile device … is very outstanding, and is one of the key drivers to this change in how enterprises' workforce functions," said Cloud Security Alliance founding member Becky Swain, who was quoted in the article. "This has been compounded by new market pressures to enable innovation. These demands are coming from the business - and putting more pressure on IT to support this."
Swain indicated a need for IT security to account for the new demands created by more mobility in the workplace.
Mobile device management built today to work in the future
According to a recent ComputerWorld article, a complete mobile device management strategy can lessen the potential IT headache of implementing and securing a more mobile workforce, but it takes some planning to get there. Issues that should be addressed in a comprehensive MDM strategy include: which devices to support, whether to embrace the bring-your-own-device (BOD) trend, what security requirements to put in place and what security capabilities to look for in an MDM solution.
"Enterprises must plan now for the mobile devices of the future that they don't even know of yet," Kevin Benedict, principal analyst at Netcentric Strategies, told ComputerWorld. "So you build an infrastructure that says it doesn't care what devices are on the end of it and you have a framework that you just plug into."
Even though planning is important, the article also warns that building a complete MDM strategy is an ongoing process. As new technologies and devices are developed and existing ones evolve, MDM strategy will need to be updated to accommodate new demands. For example, remote wiping policies should make it clear what actions the company will take if a personal device with enterprise data gets stolen, and whether or not the company will erase both personal and corporate data.
Recommended Articles for You
More from this Author
Fresh from the Desk