Mobility and BYOD are some of the fastest growing trends, both locally and across the globe, says Fred Mitchell, software division manager, Drive Control Corporation.
From laptops and notebooks to ultrabooks, smartphones and tablets, the sheer number of mobile devices available today is driving the requirement for networks to open their borders, potentially creating significant holes in the fabric of corporate security.
In addition, mobile devices are increasingly used to access business-related and potentially critical data, resulting in this data frequently being stored on unsecured, highly portable devices that are prone to loss and/or theft. Closing the mobility gap within security requires a multi-faceted approach, including policy, process and tools.
Mobile devices have the potential to open up corporate networks to a wide variety of threats, and tackling this challenge requires a comprehensive mobility strategy with all-encompassing security as the main focus. Perhaps the most well understood aspect of mobile security is the need to protect against malware and other cyber threats.
Mobile threat management is increasingly important for all users of mobile devices, particularly the corporate environment where BYOD exposes sensitive information to vulnerabilities. However, this is just one aspect of a full mobile security strategy, which should also incorporate mobile application management (MAM) as well as mobile device management (MDM).
Read more at: The mobility gap in corporate security (IT Online)