- About Us
- Solution Areas
- Mobile Security & Collaboration
- Advanced Persistent Threats (APT's)
- Cloud Security Services
- Data Protection and Encryption
- Anti-Malware, Anti-Virus, Anti-Spam
- Agentless A/V for VMware
- EMC Storage Anti-Malware
- Email Server Anti-Malware
- Endpoint Anti-Malware Suites (Physical Desktops & Laptops)
- NetApp Storage Anti-Malware
- Perimeter Anti-Spam and Anti-Malware
- Server (Physical) Anti-Malware
- SharePoint Anti-Malware
- SmartPhone Anti-Malware
- VDI (Virtual Desktop) Anti-Malware Suites
- Virtual Server Anti-Malware
- Data Center, Virtualization & Cloud Security
- Citrix Xen Anti-Malware and Security
- File System Integrity Monitoring
- Microsoft Hyper-V Anti-Malware and Security
- Server (Physical) Anti-Malware and Security
- System and Security Platform Management
- Two Factor Authentication
- VDI (Virtual Desktop) Anti-Malware and Security
- VMware Anti-Malware and Security
- Virtual Patching
- Laptop/Desktop Privacy & Security
- Perimeter Security-UTM
- Cloud Services
- Webinars & Events
- Knowledge Base
- Escalade IT Blog
2013 Survey Results: Mobile Security Strategies
Information Security Media Group
Date of Publication:
Signs of mobile insecurity are everywhere.
From the growth of mobile malware globally to the long list of healthcare data breaches caused by lost or stolen unencrypted devices, we are inundated with messages about careless users, unsafe apps and opportunistic fraudsters.
And yet … we all are more attached than ever to our smart phones and tablets, and increasingly we are using these devices to conduct mission-critical work from remote locations.
So, who exactly is ensuring mobile security – and how?
This question is at the heart of this report, based on the new study Beyond BYOD: 2013 Mobile Security Strategies. This handbook offers an in-depth look at the broad gaps in organizations’ mobile security programs. It provides an analysis of the survey results, offering a reality check on the true state of mobile security.
This survey benefited from the guidance of several advisers, among them Malcolm Harkins, chief information security and privacy officer at Intel, and Elayne Starkey, CISO for the State of Delaware.