寄件者: Martin Roesler (AV-EMEA)
傳送日期: Thursday, August 05, 2010 1:32:11 PM
收件者: Susan Wilhite (MKT-US); Jia-Bing Cheng (RD-US-ENT); Newsbank
主旨: RE: NEWSBANK: Personally owned mobile devices on the rise in the enterprise
it would start that our consols could at least see competitors products. A personal owned Laptop might have AVIRA installed, and if our OSCE or TMCM consol could tell the admin “your traveling user is around, at least he has an AV installed, but its outdated” then the admin would be more then happy and become a strong advocate for a TM solution.
One of the problems with personal devices is that they are personal, so they have SW installed that you might not want to see in your company environment.
The mentioned above “management enhncement” plus Application Control based on Whitelisting (while you are in my company network, you are only allowed to use XYZ applications) seem to be good methods to address this increasing demand.
Responding to #2, I am conducting research now about whether and how Trend should develop agentless mobile security, and how any form of mobile security would be managed with the rest of IT.
Two questions come to mind:
1) Does Trend IT support personally owned mobile devices to access company information?
2) Will Trend have products that can capitalize on customer’s mobile security concerns?
Jia-bing (JB) Cheng | desk: 408.863.6483 cell: 408.482.9838
US Cupertino Enterprise PDG
Personally owned mobile devices on the rise in the enterprise
3 August, 2010
By Mark Cox
With more than half of financial services enterprises already supporting personally-owned mobile devices, a significant challenge has been introduced to most firms' existing mobile policies and IT operations. That's a key message of "Managing and Securing Corporate and Personal Mobile Devices in Financial Services," a commissioned technology adoption profile conducted by Forrester Consulting on behalf of Fiberlink Communications Corporation.
Forrester found that personally-owned devices are growing in the enterprise and CIOs are making management and security more of a priority than ever before. A majority of enterprises now support personally-owned mobile devices. For 49 percent of the respondents, ensuring regulatory compliance is the top IT security priority. IT professionals within firms governed by the Financial Industry Regulatory Authority (FINRA) must ensure that smartphones are in compliance with their firm's broader privileged information requirements. When asked which industry regulations are driving concerns regarding mobile devices, 41 percent indicated FINRA compliance and, the same percentage reported that SarbanesOxley compliance is a concern.
More than a third of the IT professionals indicated that their enterprise supports multiple mobile operating systems (OSs), with ten percent supporting four or more. In an effort to avoid getting spread too thin, IT often provides minimal support for these OSs, introducing vulnerabilities and threats. Forrester notes, "The key is to make management and security the foundation of your business's next-generation mobile strategy. As mobile operations increasingly converge, IT and telecom managers are realizing that they need to treat mobile devices the same as PCs."
"Based on this commissioned study from Forrester, it's clear to see that mobile device management and PC management are converging," said Jim Szafranski, senior vice president, customer platform services of Fiberlink. "Over 80% of firms are concerned about malware, hackers and identity theft -- all issues previously associated with computers, not mobile devices. The research shows is that IT is now wisely beginning to manage smartphones in the same manner as PCs."
The study indicates that tackling these challenges requires that IT and telecom managers invest in a mobility service that delivers on key functionality. Eighty-six percent of respondents have already deployed a strong password policy. Other popularly-deployed strategies include: full disk encryption (71 percent), remote lock/wipe (64 percent) and asset and activity visibility and management (66 percent) across all types of mobile devices. Over the next two years, 43 percent of enterprises surveyed plan to deploy Over-the-air (OTA) configuration management. The study notes that "Cloud-hosted offerings that can deliver a single tool without the additional costs and infrastructure complexities associated with behind-the-firewall solutions are quickly becoming the preferred solutions architecture for IT professionals worldwide."