Mobility Spurs Security Ecosystem Expansion: Fortifying Your Perimeter is Required, But is More Complex
|出版商||VDC Research Group, Inc.||商品編碼||368928|
|出版日期||內容資訊||英文 52 Pages; 28 Exhibits
|行動使安全生態系統擴張:領域的強化複雜的放大 Mobility Spurs Security Ecosystem Expansion: Fortifying Your Perimeter is Required, But is More Complex|
|出版日期: 2016年09月06日||內容資訊: 英文 52 Pages; 28 Exhibits||
本報告提供企業行動的時代的行動安全對策趨勢調查，工作模式的變化和新的安全對策的必要性，不過被重視的功能，主要的行動安全方法比較，EMM (企業行動管理) 解決方案的企業的使用趨勢，主要安全供應商，新的經營模式等彙整資料。
The security landscape is in a state of constant change. Chief information officers (CIOs) and chief information security officers (CISOs) must constantly assess the best ways to secure and manage mobile devices and new applications while ensuring their data is protected. Changing work styles increase employees' desire or need to work at any time, from any location, with data that is accessible from the company network, the Web, or the cloud. IT departments are thus dealing with a moving target and require a broad range of protective measures. Due to the multi-layered security dynamics of mobile platforms, neither an ideal hardware configuration nor one type of communications network can reliably catch all threats and assure security. Going forward, operating systems, applications, devices, and networks are all impacting security requirements - particularly for organizations that are moving forward with IT modernization initiatives.
Mobile security remains a hot topic for obvious reasons - once devices are provisioned with access to corporate applications and data, they become an immediate security threat. Investing in (and partnering for) IT staff with mobilefirst expertise that is specific to security is essential, as is implementing the appropriate infrastructure to enable secure remote access to pre-existing data stores and application platforms.
This report integrates selected findings from VDC's recent enterprise mobility survey (survey data is provided as a separate Excel spreadsheet) of IT decision-makers in both midmarket and enterprise organizations. It contains a comprehensive market segmentation and competitive assessment of key security vendors, emerging business models, and analysis of their capabilities and relevance in the market.