How to maintain mobile security in the face of global device churn
The scenario has become quite familiar: Media reports show thousands of consumers lining up outside retail stores, eager to buy the latest mobile device. This scene is far from unique and will be repeated in hundreds of cities across 28 countries on Sept. 16, when the first wave of iPhone 7 smartphones is released to the public.
What typically does not get reported on are the mobile security issues that arise within the next few days or even hours, when those same people turn up to work or school expecting all their favorite apps — and several new ones they’ve just downloaded — to run. For IT managers worldwide, the sudden emergence of new hardware and operating systems on mobile devices connected to the enterprise remains a major concern for mobile security. Gone are the days when client platforms could be strictly mandated and tightly locked down.
The challenge of mobile device proliferation affects every organization, regardless of whether it is large or small, public or private, local or multinational. However, not every organization has the resources to manage and secure the diverse set of devices that employees, customers, students and guests bring with them each day.
On top of mobile device churn, many organizations and governments have strict policies on the location and movement of sensitive data. For example, the European Union’s pending General Data Protection Regulation will cover the movement of data across borders.
How do organizations maintain mobile security while adhering to regional regulations and keeping up with mobile device innovation? They must find an IT enterprise system that has a global network of centers, with regional experts who understand the laws and regulations that govern the movement of data. These centers can provide a regional focal point to directly assist organizations with end-to-end security that spans all types of mobile devices, cloud-based back-end services and everything in between.
Coping with mobile device churn is only the tip of the iceberg for enterprise IT teams grappling with security challenges raised by the cloud and mobile revolution. However, an effective enterprise-wide response will allow them to accelerate their digital transformations and maximize business outcomes.
See how IBM is helping organizations address their local data privacy concerns with the announcement of its new Mobility Success Services. With plans to expand the global network of MaaS360 Centers, IBM will enable thousands of mobility experts to more effectively assist clients with mobile security and management.