Had a very interesting conversation this week about the evolving trust model for mobile security in the enterprise. I was talking to Terry R, who focuses on risk management and compliance, and he was telling me how his company’s perimeter security strategy needs to fundamentally change.
As he put it: “Our challenge is that our infrastructure, applications, and databases are designed for a perimeterized world. Our systems rely on a strong perimeter. We need to tear that...Read More →
No big surprise. After several months of media speculation, unlimited data is no more. In the battle of network-thirsty-smartphones vs. capacity-constrained-data-networks, the score is Smartphones 1 Networks 0....Read More →
With so many more economical choices for purchasing smartphones, more global workers now choose to bring their own device to work. That’s a double edge sword. Productivity increases but use of corporate data on employee owned devices translates into increased risk. What if the employee leaves and goes to a competitor? What if the phone is broken...Read More →
Was just commenting on a post over at http://theemf.org/ about the constantly increasing complexity of mobile in the enterprise, especially given the recent introductions of iPad and iPhone OS 4.0. This is both the beauty and challenge of our industry. From the user’s perspective, the bar for mobile capabilities keeps getting raised and the experience keeps getting better and/or different.
The challenge is that enterprises aren...Read More →
We’ve been doing app development at work for iPad, so I was really excited yesterday to check it out on launch day. But the most interesting thing happened when I brought the iPad home. My two oldest kids, 12 and 5 years old, gravitated to it like moths to a flame. The “wow, this is cool” fascination that lit up their eyes really stuck with me.
On one hand, both have access to a home computer, a laptop, and an iPod Touch, so it’s not that they haven’t...Read More →
Enterprise Mobile announced a hosted management service today for smartphones in the enterprise (built on MobileIron). http://bit.ly/ag8Y7u
There are a couple of interesting forces at work here. Gartner published research last December predicting “by 2012, 20% of businesses will own no IT assets.” The hypothesis is that the confluence of cloud computing, business process outsourcing, and the movement of smartphone/laptop...Read More →
IT can’t do it alone. Smartphones are coming in from all directions, many times driven by end-users. And I haven’t seen many IT departments in 2009 flush with new resources to handle this influx as well as they would wish. Employees need to share the responsibility with IT to manage security, cost, and mobile apps. Think of it as self-governance guided by IT policy.
The basic notion of Cooperative Mobility is that most users want to do the right thing but don’t have...Read More →
MobileIron won Best in Show at Under the Radar today! Here’s a link to the presentation we gave: http://www.undertheradarblog.com I am really proud of the hard work the team has done to get us here.
It was an honor to be invited to Under the Radar. There were some awesome mobile startups there and I learned a lot from watching what others were doing.
I thought these guys...Read More →
Network World runs the Insider Threat column bi-weekly and gave us the opportunity to contribute to today’s column. You can find the column on the Network World site at http://bit.ly/3gPlQp.
Existing models for smartphone management take a very one-way approach to security. IT ends up being the police force and it’s a role that is not scalable, especially since users are reticent to give up control of their phone to begin...Read More →