Cover Image
市場調查報告書

企業的行動安全:解決方案及企業

Mobile Security in Enterprise: Solutions and Companies 2014

出版商 Mind Commerce 商品編碼 317966
出版日期 內容資訊 英文 42 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
企業的行動安全:解決方案及企業 Mobile Security in Enterprise: Solutions and Companies 2014
出版日期: 2014年08月04日 內容資訊: 英文 42 Pages
簡介

企業活用朝向提高生產率,反應性及創新的行動通訊運算。可是,無線的優點與企業的潛在主要課題相關安全風險不能分割。

本報告提供企業行動安全相關資料、企業行動經營管理、安全服務、課題,及企業行動經營管理、安全產業上主要企業分析評估、行動雲端的未來預測,為您概述為以下內容。

企業行動安全的簡介

概要

行動裝置概要

行動裝置經營管理技術

  • 零組件、架構

企業行動安全服務

  • 一般的政策
  • 數據通訊、儲存
  • 用戶、設備認證
  • 應用

企業行動裝置安全的生命週期

  • 階段1:起動
  • 階段2:開發
  • 階段3:實行
  • 階段4:營運、維修
  • 階段5:廢棄

企業行動安全:企業、解決方案

TREND MICRO

  • TREND MICRO的行動安全
  • 行動裝置經營管理(MDM)
  • 行動裝置安全
  • 行動應用程式經營管理
  • 資料保護

IBM

  • IBM的企業行動安全
  • 用戶安全:IBM Security Access Manager
  • 資料安全:IBM Endpoint Manager for Mobile
  • 應用安全:IBM Worklight
  • 基礎設施安全:IBM Lotus Mobile Connect
  • 安全情報:IBM QRadar

MCAFEE

  • McAfee Enterprise Mobility Management (McAfee EMM)
  • McAfee EMM的設備經營管理
  • McAfee EMM的審核、遵守服務
  • McAfee EMM的設備代理商、其他

VOLTAGE SECURITY

  • VOLTAGE的企業行動數據安全解決方案
  • 單一資料保護的組成架構
  • 遵守、審核範圍的縮小
  • 易於使用、操作方便

VERIZON WIRELESS

  • VERIZON 行動裝置經營管理、安全
  • CITRIX
  • XenMobile
  • XenMobile App Controller
  • XenMobile Device Manager
  • XenMobile Data Management

DELL

  • Dell Enterprise Mobile Management

CA TECHNOLOGIES

  • 企業行動經營管理套件
  • CA Mobile Device Management (CA MDM)
  • CA Mobile Application Management (CA MAM)
  • CA Mobile Content Management (CA MCM)
  • CA Mobile Email Management (CA MEM)

AT&T

  • AT&T Mobile Enterprise Management
  • AT&T Mobile Device Management
  • AT&T Mobile Application Development
  • AT&T Mobile Application Management
  • AT&T Workspace Management 3

NESS TECHNOLOGIES

  • Ness Enterprise Mobile Management
  • 主要的EMM的優點

未來趨勢

使用資料以促進競爭上的優勢

是BYOD還是非BYOD

雲端活動的增加

本機或HTML5

行動應用程式開發

企業聚焦的應用開發

擴增實境(AR)

存取及ID管理(IAM)

行動管理服務

目錄

Enterprise companies across virtually all verticals are in various stages of leveraging mobile communications and computing to improve productivity, responsiveness, and innovation. However, the benefits of wireless do not come without security risks with associated potential major issues for corporations.

Providing security for mobile devices is significantly different from providing security elsewhere in the enterprise. Some of the issues stem from mobile device dynamics including usage issues (shared more often, used in more locations, fulfill more roles). In addition, a large percentage of applications transmit personal details or device information. Thanks to the growing trend of Bring Your Own Device (BYOD), many approved/unapproved applications, and expectations of new form factors such as wearable technology, wireless devices are increasingly technically diverse in terms of type, model, and feature/functionality.

With all of these issues and factors, there is a need to effectively manage security risk in the enterprise, including prevention, detection, and mitigation.

This Mind Commerce report evaluates enterprise mobile security, including technologies for enterprise mobility management, security services and challenges, and analysis of key players in enterprise mobile management and security industry. The report also includes a view into the future of mobile cloud. All purchases of Mind Commerce reports includes time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report.

Report Benefits:

  • Outlook for the future of mobile cloud
  • Identify enterprise security services
  • Understand enterprise mobility management lifecycle
  • Identify key players and solutions of enterprise mobile security
  • Understand mobile devices and enterprise mobile device management

Target Audience:

  • Mobile network operators
  • Enterprise IT and mobility departments
  • Smartphone vendors and app providers
  • Enterprise mobility management companies
  • Mobile applications and solutions developers
  • Wireless security and privacy solutions providers

Companies in Report:

  • AT&T
  • CA Technologies
  • Citrix
  • Dell
  • IBM
  • McAfee
  • Ness Technologies
  • Trend Micro
  • Verizon Wireless
  • Voltage Security

Table of Contents

INTRODUCTION TO ENTERPRISE MOBILE SECURITY

OVERVIEW

OVERVIEW OF MOBILE DEVICES

TECHNOLOGIES FOR MOBILE DEVICE MANAGEMENT

  • Components and Architectures

ENTERPRISE MOBILE SECURITY SERVICES

  • General policy
  • Data Communication and Storage
  • User and Device Authentication
  • Applications

ENTERPRISE MOBILE DEVICE SECURITY LIFECYCLE

  • Phase 1: Initiation
  • Identifying needs for mobile devices
  • Developing Security Policy
  • Restrictions on Mobile Devices and Access Levels
  • Sensitivity of Work
  • The Level of Confidence in Security Policy Compliance
  • Cost
  • Work location
  • Technical limitations
  • Compliance with mandates and other policies
  • Additional Security Requirements
  • Updating Security Policy
  • Additional User Requirements
  • Phase 2: Development
  • Development Phase Technical Considerations
  • Architecture
  • Authentication
  • Cryptography
  • Configuration requirements
  • Application vetting and certification requirements
  • Developing Security Plan Document
  • Phase 3: Implementation
  • Implementation Phase Technical Considerations
  • Connectivity
  • Protection
  • Authentication
  • Applications
  • Management
  • Logging
  • Performance
  • Security of the Implementation
  • Default Settings
  • Phase 4: Operations and Maintenance
  • Operations and Maintenance Technical Considerations
  • Checking for Upgrades
  • Time Sync
  • Policy Changes
  • Detecting Anomalies
  • Training
  • Phase 5: Disposal.

ENTERPRISE MOBILE SECURITY - COMPANIES AND SOLUTIONS

TREND MICRO

  • Trend Micro™ Mobile Security
  • Mobile Device Management (MDM)
  • Mobile Device Security
  • Mobile Application Management
  • Data Protection
  • IBM
  • IBM Enterprise Mobile Security
  • User Security: IBM Security Access Manager
  • Data Security: IBM Endpoint Manager for Mobile
  • Application Security: IBM Worklight
  • Infrastructure Security: IBM Lotus® Mobile Connect
  • Security Intelligence: IBM QRadar

MCAFEE

  • McAfee Enterprise Mobility Management (McAfee EMM)
  • McAfee EMM Device Management
  • McAfee EMM Audit and Compliance Service
  • McAfee EMM Device Agents
  • McAfee ePO software integration
  • Manage Mobility Costs
  • Make Strong Security Easy
  • Scale to Enterprise Management Demands

VOLTAGE SECURITY

  • Voltage Enterprise Mobile Data Security Solution
  • Single data protection framework
  • Compliance and audit scope reduction
  • Ease of use and ease of operations

VERIZON WIRELESS

  • Verizon Mobile Device Management and Security
  • CITRIX
  • XenMobile
  • XenMobile App Controller - Managing Applications
  • XenMobile Device Manager - Managing Devices
  • XenMobile Data Management

DELL

  • Dell Enterprise Mobile Management

CA TECHNOLOGIES

  • Enterprise Mobility Management Suite
  • CA Mobile Device Management (CA MDM)
  • CA Mobile Application Management (CA MAM)
  • CA Mobile Content Management (CA MCM)
  • CA Mobile Email Management (CA MEM)

AT&T

  • AT&T Mobile Enterprise Management
  • AT&T Mobile Device Management
  • AT&T Mobile Application Development
  • AT&T Mobile Application Management
  • AT&T Workspace Management 3

NESS TECHNOLOGIES

  • Ness Enterprise Mobile Management
  • Key EMM advantages

FUTURE TRENDS

USING DATA TO DRIVE COMPETITIVE ADVANTAGE

TO BYOD OR NOT BYOD

INCREASED CLOUD ACTIVITY

NATIVE OR HTML5

MOBILE APP DEVELOPMENT

ENTERPRISE-FOCUSED APP DEVELOPMENT

AUGMENTED REALITY

ACCESS AND IDENTITY MANAGEMENT (IAM)

MOBILITY MANAGED SERVICES

Back to Top