Mobile and Security – No Longer Mutually Exclusive
In December, Entrust and Forrester began work on a Technology Adoption Profile (TAP) whitepaper centering on mobile. As organizations have begun to accept the inevitable — the eventuality of mobile devices permeating networks and infrastructures — they are looking to address mobile security as a whole and not as siloed device types (e.g., corporate- and employee-owned). With this in mind, the report discusses bring-your-own-device (BYOD) and corporate-owned devices together.
Put simply, once mobile device ubiquity is accepted in an organization (and in customer bases in certain markets), the necessary steps will be taken to see business gains from these devices.
By addressing mobile as a business-enablement opportunity, organizations may make their internal teams and customers more efficient, productive and secure.
- Secure devices and applications through one of the available, various technology measures available
- Leverage this trusted and secure device to increase the employee (or customer) user experience
- This “secure, then leverage” approach allows organization to implement strong, flexible identity assurance and non-repudiation mechanisms in place for improving business processes
- New and improved business processes will increase productivity, help ensure compliance and improve customer relations
And for the elephant in the room: is mobile secure? YES. In fact, mobile devices are more secure than the traditional computing platforms.