Month: February 2016
A recent Gartner survey of CIOs estimates that by 2017, half of all employers will require employees to buy their own devices. When I read this statistic, the first two questions that entered by mind was:
Another firm that backs-up Gartner’s prediction about the explosive BYOD population is analyst firm IDC, which predicts that by 2016, 480 million smartphones that will be shipped worldwide with an estimated 65 percent used for BYOD purposes.
With 1.3 billion devices predicted to have mobile security applications installed on them by 2018 and the global BYOD market expected to grow to $181.39 billion by 2017, it’s only natural to expect the intersection between BYOD and password managers to grow.
For enterprises, the collision of the mobile revolution with cloud seems like an impending car wreck, especially as mobile devices become the center of work and personal life. With these bold predictions in place it seems only logical that single sign-on will grow to become one of the most pivotal ways companies can implement BYOD while improving the user experience and reducing data security risks.Read More
Mobility has become a significant part of both local and global businesses. The use of mobile devices within the working environment or using mobile devices to connect to the business environment has become a norm for many employees who are working remotely. This means that employees, partners and customers are no longer tied to their desks and thus, need access to resources at anytime, anywhere, and from any device. The use of mobile devices in the enterprise comes with both great advantages and significant challenges, and this can be one of the more convoluted issues the organization must face as it is likely to be one that is difficult to deal with.
Mobility is one more step towards the erosion of the secure perimeter. Users access business resources from the outside world, and data – possibly sensitive and proprietary data that resides or at least travels outside the enterprise network. Ensuring that this does not erode the security requires effective management of the business’s mobile environment otherwise this can be a burden for the organization already managing its own IT systems and networks. Multiplied by the hundreds or thousands of different mobile devices on the network and failure to properly manage that risk can be a waiting disaster.
This obstacle can be pared by using products and services which assist businesses to manage mobility well. This means detailed planning of the company requirements and how Bring Your Own Device (BYOD) will be used. Who will use this remote facility and how will security, safety and data be managed on a day to day basis, and most importantly, to understand what the employees might already be adapted to do on their mobile devices without having a formal policy in place.Read More