Contact Us

|

Careers

|

Change Locale
close

Security In A New Mobile World [Trend Micro]

Enterprise Software | Posted on August 10, 2012 by Melissa Alvares

In case you missed it, Smartphones and other mobile devices overtook traditional PCs in sales back in 2010. How did this happen?

There are a whole host of factors at play. Foremost among them has been consumerization, which gives consumers access to powerful computers and high-speed internet at home. Responding to increased expectations at work, employers began embracing Bring Your Own Device (BYOD) policies and allowing consumer mobile devices – like smartphones, tablets, non-PC laptops and netbooks – into the office. Employees, for their part, started using those devices to access their organization’s corporate networks and cloud service platforms, which helped them become more responsive and productive at home, on the road and in the office.

And everyone lived happily ever after. Well, not quite.

While mobility is proving to have a positive effect on employee productivity, it also presents IT departments with lots of headaches around control and security of mobile devices and their access to sensitive corporate data. Just a few questions and concerns keeping CIOs and IT managers up at night:

  • How does IT support these devices if they don’t know what they are?
  • How can IT truly secure its networks and data if it can’t control the devices?
  • How does IT differentiate between corporate and private personal data on employee-owned devices that access the network?
  • And, how can all this be done while continuing to make the user’s experience smooth and easy to maximize motivation and productivity?

Broadly speaking, the answers to these questions can be found in a strategy that puts in place data protection solutions in critical systems and hardy mobile device management (MDM) solutions that minimize incidents of data loss or leakages. For instance, should a user lose an improperly secured mobile device that has access to or contains sensitive corporate information, established data protection solutions can immediately kick in to safeguard an organization’s main data storage.

Trend Micro Mobile Security provides one of the industry’s leading integrated solutions for enterprises and medium-sized businesses looking to embrace consumerization without compromising IT infrastructure. Bringing together threat prevention, data protection and a single point of control, Mobile Security extends protection beyond PCs to protect a wide range of mobile devices, like iPhones, iPads, Android and Blackberry devices. And it allows businesses to regain security and control, while still offering staff the freedom to securely share data across physical, virtual and cloud environments.

For more information about managing security in the new mobile world, download the TrendLabs Cloud Security Primer Embracing BYOD.

Related Articles

Cloud | May 25, 2020 by Softchoice Advisor

The Softchoice Virtual Discovery Expo (VDX) 2020 has now wrapped. Over 2,000 people registered to hear from Softchoice and our exhibitor partners about the areas driving their digital transformation today. This year, our full-day virtual tech expo happened in a much different context than the inaugural event in 2019. Attendees took away an important message: […]

In the initial response to COVID-19 most organizations focused on enabling and stabilizing remote access, collaboration, security and network capabilities. As new financial pressures present themselves, leaders in every vertical are now looking for immediate steps they can take to reduce spending. The Spiceworks State of IT Report 2020 finds that software and cloud-based services […]

Enterprise Software | October 31, 2019 by Akhil Vishwanath

Before Jumping into AI, Conquer Your Data & Analytics Why is it that of all the thousands of artificial intelligence (AI) use cases being considered today, only 5% are in production? Because too many companies jump into AI without planning. They jump straight from identifying a business requirement to data modeling. They skip the steps […]