This IDC study defines four stages of mobile security and describes IDC's architecture for mobile security to guide enterprises as they develop and execute their mobile strategies. With the proliferation of mobile devices across the enterprise, specifically employee-liable devices that present their own unique security challenges, mobile security continues to be an area of significant concern for IT executives. This framework presents the mobile security architecture required to secure devices, applications, content, and data stored and transmitted by mobile devices and to protect the corporate networks that these devices access.
"Enterprises are challenged to strike the right balance between deploying strong mobile security measures and usability," state Stacy Crook, program manager, Mobile Enterprise Research, and Leslie Hand, program director, IDC Retail Insights. "Mobile security is tantamount to ensuring satisfactory mobile interactions that result in loyal customers and employees — part of the winning formula to achieving the performance and productivity gains mobile enables."
App stores, Enterprise mobility, Information protection and control, Mobile identity and access management, Mobile secure content and threat management, Mobile security and vulnerability management, Product mobility outsourcing, Security management, Smartphone