• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Current News   »   IDC: Mobile virtualization bolsters productivity, security

IDC: Mobile virtualization bolsters productivity, security

  • Posted on:June 9, 2011
  • Posted in:Current News, Virtualization
  • Posted by:
    Trend Micro
0

Given the rise of employee-owned mobile devices in the workplace, it is growing increasingly evident that businesses must deploy solutions that balance strict security and access to company data.

According to a recent IDC report, one way to achieve this is through mobile virtualization.

Both virtualization and mobile devices have been among the most discussed technologies penetrating enterprise environments in recent years, so it seems almost inevitable that the conversation should turn to marrying the two. As the research firm noted, mobile device virtualization offers employees access to the corporate data center, enabling them to remain productive while away from the office.

Additionally, if implemented correctly, mobile virtualization can also offer a high level of data protection, because data accessed on a virtualized server is isolated from one operating system to next, making it easier to manage and monitor.

"Mobile device virtualization is an enabling technology that offers benefits to various stakeholders in the mobile ecosystem," said Stacy Cook, IDC senior analyst of mobile enterprise research.

According to a recent study by the Information Systems Audit and Control Association, there is a growing acceptance of the "bring your own device" era among enterprise IT departments. In a poll of 712 IT leaders from the United States, 58 percent of respondents agreed that employee-owned mobile devices present a security threat. However, the study also found that 27 percent of respondents believe the benefits outweigh the risks.

"BYOD presents both opportunities and threats. It lets employees and organizations take advantage of technology innovations at limited cost to the organization," John Pironti, an advisor with ISACA said in a statement. "Unfortunately, it also introduces new vulnerabilities, due to the limited ability of most organizations to effectively manage and secure employee-owned devices accessing their information infrastructure."

Related posts:

  1. Smartphones lead to greater productivity, but at a price
  2. Solving security through desktop virtualization
  3. Desktop virtualization growing, but still has roadblocks
  4. Virtualization security gaining more attention

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.