Video series based on Trend Micro session* at the Mobile World Congress 2012.
It’s probably the most disruptive trend for IT for the next 10 years, and it means two things for corporate IT.
One, is that there is more and more consumer technology available that the enterprise can deploy with the internal customer base. There is mobile, but there are many other applications here that somehow have a space in the enterprise.
But probably, the second aspect, which is probably the more challenging for corporate IT, is the fact that this consumer technology is brought into the enterprise by the end users, which really represent a challenge, as we’ll see, because the IT process is not really designed to receive technology from outside. It’s designed to deploy technology internally.
* Mobile Security Forum: “Consumer Mobile Technology in the Enterprise: A Leap of Faith?”
An increasing number of companies are opening corporate networks and data to consumer mobile devices, as employees demand to bring their own smartphones and tablets to work. However, consumer mobile technology is generally not as secure and manageable as required by the enterprise. And too many companies make the mistake of trying to stop the influx of consumer IT. What new mobile platforms will your organization contend with? What built-in security models do they provide? What vulnerabilities are they exposed to? How rigorous is the scrutiny of the official application markets? Is the corporate data stored in these devices safe? In this series, leading mobile security experts answer these questions and, more importantly, reveal solutions and best practices for your company to safely embrace consumer mobile technology in the enterprise.