Security and management in the mobility space, at least since the dawn of the iPhone, has always had a “figuring it out as we go along” quality to it. So far we’ve gotten away with it; even though the potential for significant security breaches via mobile devices has always been there, and even though compliance with best practices in mobility is a rare thing, I’ve seen no evidence that they are a significant source of actual breaches. The real problems are what they always have been: SQL injection, weak passwords, social engineering, etc.
In the meantime, the market for products to manage and secure mobile devices has been maturing. Of course management and security should be closely-intertwined, if not run by the same products. That can be difficult when the major products don’t include more than trivial management capabilities and very little is compatible cross-platform.
This has created an opening for third parties, and those third parties have flooded into that opening. Several large and important companies have emerged, such as AirWatch, Good and MobileIron. They have all been on acquisition sprees and are attempting to fill out the gaps in their management capabilities.
Continue reading →
Recent Comments