
How to Address the 6 Major Challenges of Mobile Computing Security
MILFORD, MA: While some companies are providing network access and application support for mobile devices like the smartphones and tablets; others are designing and developing new applications for them. Android devices, iPhones, and even the Windows phones are seen as business opportunities by enterprises for revenue growth, better communication and, of course for cost cutting; however, a majority of businesses are concerned about integrity, privacy and security of data, reported Jon Oltsik of Network World.
Though mobile computing is the new trend at the work place, the Chief Information Security Officers of large and small enterprises look at it with suspicion. Mobile computing involves securing thousands of mobile devices along with the applications and content which exist on them. As these gadgets are the employees’ possessions, it becomes all the more difficult for the security department to safeguard the confidentiality, integrity and availability of the company’s property and data.
As per the survey conducted by ESG, the global advisory firm using IT market research, to identify the challenges with mobile computing security:
43 percent of security professionals said that protecting data confidentiality and integrity when sensitive data is accessed on a mobile device over a network was definitely a challenge; while 41 percent said protection of data confidentiality and integrity when sensitive data is stored on a mobile device.
41 percent felt that enforcing mobile security policies was a challenge.
36 percent said that the integration of mobile security technologies with other enterprise security technologies was a big task.
35 percent said that educating the users on the best practices for mobile computing security was a huge challenge.
34 percent of the security professionals said that establishing the right workflow and processes between the security team and other IT groups.
34 percent of the professionals said that managing malware and other threats was difficult; while 34 percent said that training the IT staff members on mobile security would help.
The problem surrounding data discovery, classification, access, storage and usage are further aggravated by mobile computing. Companies establish weak security policies, or policies which are rigid and which cannot be executed with the security measures that exist. To overcome this issue, organizations need to lock down the most sensitive data by opening privileged account security with vendors like Courion, CyberArk, and Lieberman. It is therefore necessary to estimate the existing security policies before updating them. The other most important aspect to be looked into is shortage in mobile computing security skills. This can be overcome too by including trainings, services and mobile security products in place.
Where there are problems and threats, there are always solutions; however, organizations need to ensure that they work on the challenges for bettering their security.
ON THE DECK
Featured Vendors
THETA432: Performance, Precision, Efficiency, Visibility - The Key to Incident Response and Answer to the Talent Shortage
EveryCloud Technologies: Delivering Powerful Email Filtering Services" title="Graham O'Reilly, CEO & Co-Founder" style="float:left; margin-right:10px; margin-bottom:20px;" width="60px" height="50px">
EveryCloud Technologies: Delivering Powerful Email Filtering Services
Onepath: A Responsive Info-Security Management Framework – the easier way to dramatically improve your overall info-security posture
Covenant Security Solutions, Inc.: Revolutionary Solutions to Mitigate Security and Compliance Risks
EDITOR'S PICK
Essential Technology Elements Necessary To Enable...
By Leni Kaufman, VP & CIO, Newport News Shipbuilding
Comparative Data Among Physician Peers
By George Evans, CIO, Singing River Health System
Monitoring Technologies Without Human Intervention
By John Kamin, EVP and CIO, Old National Bancorp
Unlocking the Value of Connected Cars
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
Digital Innovation Giving Rise to New Capabilities
By Gregory Morrison, SVP & CIO, Cox Enterprises
Staying Connected to Organizational Priorities is Vital...
By Alberto Ruocco, CIO, American Electric Power
Comprehensible Distribution of Training and Information...
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
The Current Focus is On Comprehensive Solutions
By Sergey Cherkasov, CIO, PhosAgro
Big Data Analytics and Its Impact on the Supply Chain
By Pascal Becotte, MD-Global Supply Chain Practice for the...
Technology's Impact on Field Services
By Stephen Caulfield, Executive Director, Global Field...
Carmax, the Automobile Business with IT at the Core
By Shamim Mohammad, SVP & CIO, CarMax
The CIO's role in rethinking the scope of EPM for...
By Ronald Seymore, Managing Director, Enterprise Performance...
Driving Insurance Agent Productivity with Mobile and Big...
By Brad Bodell, SVP and CIO, CNO Financial Group, Inc.
Transformative Impact On The IT Landscape
By Jim Whitehurst, CEO, Red Hat
Get Ready for an IT Renaissance: Brought to You by Big...
By Clark Golestani, EVP and CIO, Merck
Four Initiatives Driving ECM Innovation
By Scott Craig, Vice President of Product Marketing, Lexmark...
Technology to Leverage and Enable
By Dave Kipe, SVP, Global Operations, Scholastic Inc.
By Meerah Rajavel, CIO, Forcepoint
AI is the New UI-AI + UX + DesignOps
By Amit Bahree, Executive, Global Technology and Innovation,...
Evolving Role of the CIO - Enabling Business Execution...
By Greg Tacchetti, CIO, State Auto Insurance
Read Also
