HOME  |  NEWSLETTER  |  FEEDBACK  |  ABOUT US  |  REGISTER   
Please contact:
David Williams
Global Director of Sales, Research
858-829-8612
or via email at:
insider@
lightreading.com
Security Vendors Tackle the Enterprise BYOD Challenge
As bring your own device (BYOD) has flourished over the past few years, mobile vendors of every type have been faced with the fact that enterprises both want and need security solutions that address the myriad problems created in the enterprise by BYOD. The problem is so severe that one recent survey found that 95 percent of IT professionals are facing challenges with the security of BYOD, and they're equally concerned about mobile security incidents.

The other side of that equation, however, is how mobile vendors can provide solutions that address such problems without stepping on the toes of the industry that is their bread and butter. Walking that line is a matter of pinpointing customer service in terms of the enterprise, the mobile app developers and the end users who maintain the position that their phones are personal devices, regardless of whether they contain corporate information on them.

Without question, the biggest culprit behind problems in this market is end users. Many employees carry more than one phone into the corporate environment, and, in many cases, employees place sensitive corporate data on their personal devices without any protection against cyber criminals. IT professionals that initially decided to address BYOD by refusing to all employees to access company data with their private devices have learned the hard way that employees are quite savvy about accessing corporate data when it comes to being able to use their own, preferred device.

It's imperative for vendors to develop a strategy for releasing products and supporting them with customer service. Most enterprises don't know where to start, and the current research is supplied mostly by product companies pushing customers to mobile device management (MDM) or other enterprise solutions and technology-based approaches. Enterprises need to look at it as an extension of the network and look at standard risk assessment approaches to identify requirements for protecting data, applications and users.

Security Vendors Tackle the Enterprise BYOD Challenge examines the market for customer service in mobile security solutions, analyzing how and where such solutions are being used, as well as areas of growth expected in the market over the next two years. It discusses drivers and challenges in the industry and includes a comparative analysis of solutions available. Finally, it examines the geographic landscape of the market and details trends that are likely to occur in the industry over the next 18-24 months.
Sample research data from the report is shown in the excerpts below:
Table of Contents (mni0115_toc.pdf)
As shown in the following excerpt, BYOD will be a major business driver for customer service, as it brings into focus many issues like data loss, data deletion and malware as key threats to mobile security that will impact enterprise data. BYOD is a complex problem not just protecting data on the phone, but also managing the privacy on the employee's personal device. This requires separation of business and personal data, and the ability to wipe business data without harming personal data, such as photos, contacts, calendar and email. BYOD may be the biggest driver for quite some time, as the trend is still gaining popularity, making companies pay more attention to the way corporate data is accessed, stored, transferred, controlled, secured and managed.
[click on the image above for the full excerpt]
Companies analyzed in this report include: AirWatch LLC by VMware Inc. (NYSE: VMW); Bluebox Security Inc.; Digital Management Inc. (DMI); IBM Corp. (NYSE: IBM); Kaspersky Lab ZAO; MobileIron Inc. (Nasdaq: MOBL); and NQ Mobile Inc. (NYSE: NQ).
Total pages: 17
To view reports you will need Adobe's Acrobat Reader. If you do not have it, it can be obtained for free at the Adobe web site.
PRIVACY POLICY   TERMS OF USE
HOME  |  NEWSLETTER  |  FEEDBACK  |  ABOUT US  |  REGISTER