Mobility Spurs Security Ecosystem Expansion: Fortifying Your Perimeter is Required, But is More Complex
発行: VDC Research Group, Inc.
ページ情報: 英文 52 Pages; 28 Exhibits
当レポートでは、エンタープライズモビリティの時代におけるモバイルセキュリティ対策の動向を調査し、ワークスタイルの変化と新たなセキュリティ対策の必要性、もっとも重要視される機能、主なモバイルセキュリティアプローチの比較、EMM (エンタープライズモビリティ管理) ソリューションの企業による利用動向、主要セキュリティベンダー、新しいビジネスモデルなどをまとめています。
The security landscape is in a state of constant change. Chief information officers (CIOs) and chief information security officers (CISOs) must constantly assess the best ways to secure and manage mobile devices and new applications while ensuring their data is protected. Changing work styles increase employees' desire or need to work at any time, from any location, with data that is accessible from the company network, the Web, or the cloud. IT departments are thus dealing with a moving target and require a broad range of protective measures. Due to the multi-layered security dynamics of mobile platforms, neither an ideal hardware configuration nor one type of communications network can reliably catch all threats and assure security. Going forward, operating systems, applications, devices, and networks are all impacting security requirements - particularly for organizations that are moving forward with IT modernization initiatives.
Mobile security remains a hot topic for obvious reasons - once devices are provisioned with access to corporate applications and data, they become an immediate security threat. Investing in (and partnering for) IT staff with mobilefirst expertise that is specific to security is essential, as is implementing the appropriate infrastructure to enable secure remote access to pre-existing data stores and application platforms.
This report integrates selected findings from VDC's recent enterprise mobility survey (survey data is provided as a separate Excel spreadsheet) of IT decision-makers in both midmarket and enterprise organizations. It contains a comprehensive market segmentation and competitive assessment of key security vendors, emerging business models, and analysis of their capabilities and relevance in the market.