End-to-End Device SecurityBy Ericka Chickowski | Posted 2010-07-27 Email Print
WEBINAR: Event Date: Tues, December 5, 2017 at 1:00 p.m. ET/10:00 a.m. PT
How Real-World Numbers Make the Case for SSDs in the Data Center REGISTER >
Smartphones are everywhere, and they are carrying vital corporate data, whether they are secured or not. With the exposure of 150,000 iPad owners' personal data recently, along with new reports that highlight Android security problems, opportunities abound for channel partners that can create a mobile-security practice for business customers.
One of the biggest problems enterprises and SMBs face from the mobile revolution is the complexity it brings to bear for both IT operations and IT security. Not too long ago, businesses could simply require their users to only use one or two approved and company-owned devices (usually a BlackBerry) and develop a sound security strategy based on that simple deployment scenario.
But culture and economic factors have come to bear, bursting the bubble of many an in-house IT guru. Whether they like it or not, enterprises must cater to dozens of devices on numerous platforms, many of them owned by the employee. According to Forrester Research, the number of smartphone devices within the enterprise is expected to triple.