• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Mobility   »   The Consumerization University – Day 4: Mobile security matters

The Consumerization University – Day 4: Mobile security matters

  • Posted on:June 11, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
6

Video series based on Trend Micro session* at the Mobile World Congress 2012.

PREVIOUS: Day 3 – BYOD challenges for corporate IT

[…] What are the top concerns? So when we ask to IT managers: “in approaching BYOD, in approaching consumerization, what is your number one concern?” Constantly, every single time we ask, security seems to be the number one concern.

Data shows that Security (64%) and data loss (59%) remain top concerns for most companies allowing employees to bring their personal devices in the workplace. Compliance and legal implications are greater concern in the U.S. and Japan than in Germany. To reduce security risks and to lower management costs, 79% of respondents require employees to install mobile security solutions on their personal mobile devices. 69% of respondents agreed that mobile device security is a key component in protecting their IT environments from employee-owned mobile devices while 71% of respondents consider a combination of mobile security and mobile device management to be the most effective.

The analysis of the mobile security experts reveals that today’s mobile platforms widely differ in terms of security and manageability capabilities. As a group, modern mobile platforms provide substantially better security than traditional desktop operating systems when it comes to built-in security mechanisms, authentication and data protection; even though they are vulnerable to attacks that don’t affect desktop PCs. Application security, device management and corporate email support are somehow sufficient although offer room for improvement. The feature sets that IT managers should give high consideration to include security certifications, device firewall and support for virtualization, which is largely still missing.

Download Slide #7

 

NEXT: The Consumerization University – Day 5: Embrace is the right approach for BYOD

 

* Mobile Security Forum: “Consumer Mobile Technology in the Enterprise: A Leap of Faith?”

An increasing number of companies are opening corporate networks and data to consumer mobile devices, as employees demand to bring their own smartphones and tablets to work. However, consumer mobile technology is generally not as secure and manageable as required by the enterprise. And too many companies make the mistake of trying to stop the influx of consumer IT. What new mobile platforms will your organization contend with? What built-in security models do they provide? What vulnerabilities are they exposed to? How rigorous is the scrutiny of the official application markets? Is the corporate data stored in these devices safe? In this series, leading mobile security experts answer these questions and, more importantly, reveal solutions and best practices for your company to safely embrace consumer mobile technology in the enterprise.

Related posts:

  1. The Consumerization University – Day 1: Consumerization is disruptive
  2. The Consumerization University – Day 2: Consumerization is real
  3. The Consumerization University – Day 3: BYOD challenges for corporate IT
  4. The Consumerization University – Day 5: Embrace is the right approach for BYOD

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.