HOME  |  NEWSLETTER  |  FEEDBACK  |  ABOUT US  |  REGISTER   
Please contact:
Bryan Gillies
Account Executive, Insider Sales
415-580-6256
or via email at:
insider@
lightreading.com
HEAVY READING CABLE INDUSTRY INSIDER
HEAVY READING COMPONENTS INSIDER
HEAVY READING IP SERVICES INSIDER
HEAVY READING SERVICE PROVIDER IT INSIDER
HEAVY READING INSIDER
HEAVY READING 4G/LTE INSIDER
HEAVY READING
LIGHT READING
Networking the Telecom Industry
HEAVY READING
Real World Research
LIGHT READING LIVE!
Live Events on the Road
WEBINARS
Free Web Seminars
Mobile Security Should Equate to Customer Service
Denise Culver | Research Analyst
Bring your own device (BYOD) is flourishing, creating the need for better security on shared personal/workplace mobile devices.

This is calling for better and more customer service and security education across the board.
more

Security Vendors Tackle the Enterprise BYOD Challenge
As bring your own device (BYOD) has flourished over the past few years, mobile vendors of every type have been faced with the fact that enterprises both want and need security solutions that address the myriad problems created in the enterprise by BYOD. The problem is so severe that one recent survey found that 95 percent of IT professionals are facing challenges with the security of BYOD, and they're equally concerned about mobile security incidents.

The other side of that equation, however, is how mobile vendors can provide solutions that address such problems without stepping on the toes of the industry that is their bread and butter. Walking that line is a matter of pinpointing customer service in terms of the enterprise, the mobile app developers and the end users who maintain the position that their phones are personal devices, regardless of whether they contain corporate information on them.

Without question, the biggest culprit behind problems in this market is end users. Many employees carry more than one phone into the corporate environment, and, in many cases, employees place sensitive corporate data on their personal devices without any protection against cyber criminals. IT professionals that initially decided to address BYOD by refusing to all employees to access company data with their private devices have learned the hard way that employees are quite savvy about accessing corporate data when it comes to being able to use their own, preferred device.

It's imperative for vendors to develop a strategy for releasing products and supporting them with customer service. Most enterprises don't know where to start, and the current research is supplied mostly by product companies pushing customers to mobile device management (MDM) or other enterprise solutions and technology-based approaches. Enterprises need to look at it as an extension of the network and look at standard risk assessment approaches to identify requirements for protecting data, applications and users.

Security Vendors Tackle the Enterprise BYOD Challenge examines the market for customer service in mobile security solutions, analyzing how and where such solutions are being used, as well as areas of growth expected in the market over the next two years. It discusses drivers and challenges in the industry and includes a comparative analysis of solutions available. Finally, it examines the geographic landscape of the market and details trends that are likely to occur in the industry over the next 18-24 months.
Sample research data from the report is shown in the excerpts below:
Table of Contents (mni0115_toc.pdf)
As shown in the following excerpt, BYOD will be a major business driver for customer service, as it brings into focus many issues like data loss, data deletion and malware as key threats to mobile security that will impact enterprise data. BYOD is a complex problem not just protecting data on the phone, but also managing the privacy on the employee's personal device. This requires separation of business and personal data, and the ability to wipe business data without harming personal data, such as photos, contacts, calendar and email. BYOD may be the biggest driver for quite some time, as the trend is still gaining popularity, making companies pay more attention to the way corporate data is accessed, stored, transferred, controlled, secured and managed.
[click on the image above for the full excerpt]
Companies analyzed in this report include: AirWatch LLC by VMware Inc. (NYSE: VMW); Bluebox Security Inc.; Digital Management Inc. (DMI); IBM Corp. (NYSE: IBM); Kaspersky Lab ZAO; MobileIron Inc. (Nasdaq: MOBL); and NQ Mobile Inc. (NYSE: NQ).
Total pages: 17
DECEMBER 2014
NFV Testing Provides Critical Step in Virtualizing Networks
This report examines the market for testing NFV, analyzing what types of NFV applications are being tested and looks at areas of growth expected in the market over the next two years. It discusses drivers and challenges in the industry and includes a comparative analysis of solutions available. Finally, this report examines the geographic landscape of the market and details trends that are likely to occur in the industry over the next 18-24 months.
READ SUMMARY
Including table of contents, executive summary, and financial metrics
OCTOBER 2014
Growth of M2M & IoT Networks Drives Need for Testing
This report examines M2M and IoT testing market, analyzing the testing most commonly used, as well as drivers expected in the market. It discusses industry challenges and includes a comparative analysis of solutions available. Finally, it examines the market's geographic landscape and details trends that may occur over the next 18-24 months.
READ SUMMARY
Including table of contents, executive summary, and financial metrics
AUGUST 2014
Smartphones Create Exacting Testing Ground for Vendors
This report examines the smartphone testing market, analyzing how smartphones are being tested today, as well as drivers expected in the market over the next two years. It discusses challenges in the industry and includes a comparative analysis of solutions available.
READ SUMMARY
Including table of contents, executive summary, and financial metrics
"I love the attitude. Keep it up!"
- Duncan West, Senior Require-ments Manager, Qpas
"I read and rely on the information provided. It's one of my must-read e-mails. Keep up the good work!"
- Cliff Arellano, President, Com-munications Products, Inc.
CONTRIBUTING ANALYST
Danny Dicks
Danny is an analyst and consultant with over 20 years' experience in technology markets who contributes regularly to Heavy Reading Insider.
MORE
Danny Dicks
CONTACT AUTHOR
ANALYST
Tim Kridel
Tim writes for both Mobile Networks Insider and Cable Industry Insider. He has previously covered the wireless and cable industries for a number of research firms, including Heavy Reading.
MORE
Tim Kridel
CONTACT AUTHOR
ANALYST
Tim Sanders
Tim, president of The Final Mile Inc., is a frequent author, analyst, and industry speaker.
MORE
Tim Sanders
CONTACT AUTHOR
PRIVACY POLICY   TERMS OF USE
HOME  |  NEWSLETTER  |  FEEDBACK  |  ABOUT US  |  REGISTER