This IDC study provides guidance and best practices for enterprise IT organizations regarding mobile device security. Instead of focusing on vulnerabilities that reside at the application layer, this document looks to expose the simple and unknown weaknesses that can be especially damaging to organizations and their employees.
"When designing and implementing security for enterprise smartphones, IT managers should not forget simple but well-established techniques that have defeated complex security schemes in the past." — Will Stofega, program director, Mobile Phones, at IDC
Encryption toolkits, Endpoint security, Enterprise mobility strategies, Enterprise, next-gen security, Information transformation, Mobile security and vulnerability management, Network security, Omni-experience transformation, Smartphone, Technology buyer