Experts Weigh In On Mobile Security

By Lindsey Tishgart | September 5, 2013

securePhonePrepare yourselves…techies are claiming that mobile technology will be more secure than traditional computing by the year 2014. The reason? It is because companies are increasingly adopting security strategies focusing on mobility, so the likelihood of mobility having superior security features in place is high. With both BYOD policies and emerging technology in place, mobile device security is becoming more and more trustworthy – a plus for business owners who are still skeptical about mobility protection.

New security measures typically come down to the CTO’s recommendations. For example, a growing number of businesses now insist that employees adopt partitions on their mobility devices that separate their personal and corporate data to help defend against potential confidentiality issues. Peter Wood, CEO of First Base Technologies, insists that companies put security policies into place before tablets and BYOD devices are brought into the office. This practice assures both proper education about the new policies, as well as assists in preventing a month-long game of “catch up”, both of which could jeopardize your company’s data.

According to Marc van Zadelhoff, IT guru at IBM, “today’s hybrid and mobile platforms are more likely to be developed with security measures already in place- saving companies the future headache of installing company driven measures and giving security admins more fixed control than they would see in traditional computers”. Marc is also looking forward to a promising future in mobile security with elements like physical location, network identification, and facial recognition in the works to help defend against encryption and lost or stolen devices.

In terms of what’s being done in the meantime, thought leaders representing all industries will be attending the Cloud Identity Summit in Napa, California, an event showcasing new ways to manage mobile security.  Covered topics will include emerging security issues, standard-based solutions, and ad-hoc informational talks with executives from PayPal, Samsung, and Intel.

Interested in taking a dive into the expert’s resources for mobile security? Charles Brookson, from Zeata Security, recommends checking out Symantec’s report on mobile device security , which highlights the specific measures that both Google and Apple took when developing their device and operation system security.

What do you think about the future of mobile security? On a scale of ice cold-to-boiling, how confident are you in its current capabilities?

Sources:

“Securing the Mobile Ecosystem Today,” Newsfactor Business Report

http://business.newsfactor.com/news/Securing-the-Mobile-Ecosystem-Today/story.xhtml?story_id=0100006ARPNE

Marc van Zadelhoff, “Analysis: Why BYOD Security Will Be Up To Snuff By 2014,” USA Today

http://www.usatoday.com/story/cybertruth/2013/07/03/analysis-why-byod-security-will-be-up-to-snuff-by-2014/2486539/

“Mobile device security: the insider’s guide. Opinions and tips from the world-leading experts,” MobiThinking

http://mobithinking.com/mobile-device-security

Carey Nachenberg, “A Window Into Mobile Device Security,” Symantec

http://www.symantec.com/content/en/us/about/media/pdfs/symc_mobile_device_security_june2011.pdf


Subscribe to Mediafly’s Blog!

Get all the latest Mediafly News and Updates! Just enter your email below:

Comments are closed.