Mobile Security

Many enterprise IT organizations have gone to great lengths to choose a specific mobile platform as an enterprise standard, requiring all employees to use that defined standard for secure mobile computing. But frequently, executives and key business decision makers are bringing in personal mobile and tablet devices and forcing IT to adopt non-standardized devices for enterprise computing. In addition, what the users are demanding to perform often goes beyond just email and calendar, but also includes accessing critical business systems or new cloud-based offerings.

As enterprise IT professionals react to mobile adoption trends, they must evaluate and then mobile-develop applications that comply with a variety of security requirements, including:

  1. Secure Network Communication
  2. Secure Local Data Storage
  3. Protection Against Malware
  4. Secure Authentication
  5. Remote Disablement

The nature of a mobile device's small form factor means that it is more likely to become lost or stolen. Some analysts report mobile device loss and theft to be as much as 50% higher than laptop computers. This reality implies that enterprise IT professionals must take mobile security very seriously to mitigate corporate risk and protect enterprise data.