Home | Contact Us | Log In
(888) 789-6604
Report Stack
Advanced search
Account Detail 0 items in basket
Order History Total $
Saved Searches View Basket basket
Mobile Security in Enterprise: Solutions and Companies 2014
Publication Date Aug 2014
Publisher Mind Commerce
Product Type Report
Pages 42
Single User License help $ 1995.00
Site User License help $ 2995.00
Corporate User License help $ 4995.00
 

Reportstack.com does not charge credit card fee, transaction charges, extra tax or VAT on any purchase.

Enterprise companies across virtually all verticals are in various stages of leveraging mobile communications and computing to improve productivity, responsiveness, and innovation. However, the benefits of wireless do not come without security risks with associated potential major issues for corporations.
Providing security for mobile devices is significantly different from providing security elsewhere in the enterprise. Some of the issues stem from mobile device dynamics including usage issues (shared more often, used in more locations, fulfill more roles). In addition, a large percentage of applications transmit personal details or device information. Thanks to the growing trend of Bring Your Own Device (BYOD), many approved/unapproved applications, and expectations of new form factors such as wearable technology, wireless devices are increasingly technically diverse in terms of type, model, and feature/functionality.

With all of these issues and factors, there is a need to effectively manage security risk in the enterprise, including prevention, detection, and mitigation.

This Mind Commerce report evaluates enterprise mobile security, including technologies for enterprise mobility management, security services and challenges, and analysis of key players in enterprise mobile management and security industry. The report also includes a view into the future of mobile cloud. All purchases of Mind Commerce reports includes time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report.

Target Audience:
Mobile network operators
Enterprise IT and mobility departments
Smartphone vendors and app providers
Enterprise mobility management companies
Mobile applications and solutions developers
Wireless security and privacy solutions providers
Companies in Report:
AT&T
CA Technologies
Citrix
Dell
IBM
McAfee
Ness Technologies
Trend Micro
Verizon Wireless
Voltage Security

Report Benefits:
- Outlook for the future of mobile cloud
- Identify enterprise security services
- Understand enterprise mobility management lifecycle
- Identify key players and solutions of enterprise mobile security
- Understand mobile devices and enterprise mobile device management

INTRODUCTION TO ENTERPRISE MOBILE SECURITY    4
OVERVIEW    4
OVERVIEW OF MOBILE DEVICES    5
TECHNOLOGIES FOR MOBILE DEVICE MANAGEMENT    5
Components and Architectures    6
ENTERPRISE MOBILE SECURITY SERVICES    7
General policy    7
Data Communication and Storage    7
User and Device Authentication    8
Applications    8
ENTERPRISE MOBILE DEVICE SECURITY LIFECYCLE    8
Phase 1: Initiation    9
Identifying needs for mobile devices    9
Developing Security Policy    9
Restrictions on Mobile Devices and Access Levels    9
Sensitivity of Work    10
The Level of Confidence in Security Policy Compliance    10
Cost    10
Work location    10
Technical limitations    10
Compliance with mandates and other policies    11
Additional Security Requirements    11
Updating Security Policy    11
Additional User Requirements    12
Phase 2: Development    12
Development Phase Technical Considerations    12
Architecture    13
Authentication    13
Cryptography    13
Configuration requirements    13
Application vetting and certification requirements    13
Developing Security Plan Document    13
Phase 3: Implementation    14
Implementation Phase Technical Considerations    14
Connectivity    14
Protection    14
Authentication    14
Applications    14
Management    14
Logging    15
Performance    15
Security of the Implementation    15
Default Settings    15
Phase 4: Operations and Maintenance    15
Operations and Maintenance Technical Considerations    16
Checking for Upgrades    16
Time Sync    16
Policy Changes    16
Detecting Anomalies    16
Training    16
Phase 5: Disposal.    17
ENTERPRISE MOBILE SECURITY – COMPANIES AND SOLUTIONS    18
TREND MICRO    18
Trend Micro™ Mobile Security    18
Mobile Device Management (MDM)    18
Mobile Device Security    18
Mobile Application Management    19
Data Protection    19
IBM    19
IBM Enterprise Mobile Security    20
User Security: IBM Security Access Manager    20
Data Security: IBM Endpoint Manager for Mobile    20
Application Security: IBM Worklight    21
Infrastructure Security: IBM Lotus® Mobile Connect    21
Security Intelligence: IBM QRadar    22
MCAFEE    22
McAfee Enterprise Mobility Management (McAfee EMM)    22
McAfee EMM Device Management    23
McAfee EMM Audit and Compliance Service    23
McAfee EMM Device Agents    24
McAfee ePO software integration    24
Manage Mobility Costs    24
Make Strong Security Easy    24
Scale to Enterprise Management Demands    25
VOLTAGE SECURITY    25
Voltage Enterprise Mobile Data Security Solution    25
Single data protection framework    26
Compliance and audit scope reduction    26
Ease of use and ease of operations    27
VERIZON WIRELESS    27
Verizon Mobile Device Management and Security    27
CITRIX    28
XenMobile    28
XenMobile App Controller - Managing Applications    30
XenMobile Device Manager - Managing Devices    30
XenMobile Data Management    30
DELL    30
Dell Enterprise Mobile Management    31
CA TECHNOLOGIES    32
Enterprise Mobility Management Suite    32
CA Mobile Device Management (CA MDM)    33
CA Mobile Application Management (CA MAM)    33
CA Mobile Content Management (CA MCM)    33
CA Mobile Email Management (CA MEM)    34
AT&T    34
AT&T Mobile Enterprise Management    34
AT&T Mobile Device Management    35
AT&T Mobile Application Development    35
AT&T Mobile Application Management    35
AT&T Workspace Management    35
NESS TECHNOLOGIES    36
Ness Enterprise Mobile Management    36
Key EMM advantages    37
FUTURE TRENDS    38
USING DATA TO DRIVE COMPETITIVE ADVANTAGE    38
TO BYOD OR NOT BYOD    38
INCREASED CLOUD ACTIVITY    38
NATIVE OR HTML5    39
MOBILE APP DEVELOPMENT    39
ENTERPRISE-FOCUSED APP DEVELOPMENT    39
AUGMENTED REALITY    40
ACCESS AND IDENTITY MANAGEMENT (IAM)    40
MOBILITY MANAGED SERVICES    41

Title Date Price
APAC 4G Equipment Market 2011-2014
By Infiniti Research Ltd
TechNavio’s analysts forecast the 4G Equipment Market in the APAC region to grow at a CAGR of 63.3 percent over the period 2010–2014. One of the key factors contributing to this market growth is t ...Read More
Feb 2012 $1500.00
Global Femtocell Equipment Market  2011 -2014
By Infiniti Research Ltd
TechNavio’s analysts forecast the Global Femtocell Equipment market to grow at a CAGR of 81 percent CAGR over the period 2010–2014. One of the key factors contributing to this market growth is inc ...Read More
Feb 2012 $1500.00
LTE Infrastructure Market in North America 2011-2014
By Infiniti Research Ltd
TechNavio’s analysts forecast the LTE Infrastructure market in North America to grow at a CAGR of 63 percent over the period 2010–2014. One of the key factors contributing to this market growth is ...Read More
Feb 2012 $1500.00
01 Communique (ONE) - Financial and Strategic SWOT Analysis Review
By GlobalData
SummaryThis comprehensive SWOT profile of 01 Communique provides you an in-depth strategic analysis of the company’s businesses and operations. The profile has been compiled by GlobalData to bring t ...Read More
May 2013 $300.00
010017 Telecom GmbH - Strategic SWOT Analysis Review
By GlobalData
SummaryThis comprehensive SWOT profile of 010017 Telecom GmbH provides you with an in-depth strategic analysis of the company's businesses and operations. The profile will give you a clear and an unbi ...Read More
May 2013 $300.00
10tacle studios AG (T1C) - Strategic SWOT Analysis Review
By GlobalData
SummaryThis comprehensive SWOT profile of 10tacle studios AG provides you with an in-depth strategic analysis of the company's businesses and operations. The profile will give you a clear and an unbia ...Read More
May 2013 $300.00
1Spatial Holdings PLC (SPA) - Financial and Strategic SWOT Analysis Review
By GlobalData
SummaryThis comprehensive SWOT profile of 1Spatial Holdings PLC provides you an in-depth strategic analysis of the company’s businesses and operations. The profile has been compiled by GlobalData to ...Read More
May 2013 $300.00
1st Holdings, Inc. - Financial and Strategic SWOT Analysis Review
By GlobalData
SummaryThis comprehensive SWOT profile of 1st Holdings, Inc. provides you an in-depth strategic analysis of the company’s businesses and operations. The profile has been compiled by GlobalData to br ...Read More
May 2013 $300.00
2-Track Global Inc. (TOTG) - Strategic SWOT Analysis Review
By GlobalData
SummaryThis comprehensive SWOT profile of 2-Track Global Inc. provides you with an in-depth strategic analysis of the company's businesses and operations. The profile will give you a clear and an unbi ...Read More
May 2013 $300.00
20-20 Technologies Inc. - Strategic SWOT Analysis Review
By GlobalData
20-20 Technologies Inc. - Strategic SWOT Analysis Review provides a comprehensive insight into the company’s history, corporate strategy, business structure and operations. The report contains a det ...Read More
Feb 2014 $125.00

  * Required field
Name *
E-mail *
Telephone 
Company *
Country *
Query 
 
   

   
For support please
contact:
US Toll Free
+1 888-789-6604
Asia Pacific
+91-9893555190
 
 
To receive alerts about
an update, future offers and discounts on this report, signup here.
Email ID
 

Companies


A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Countries


A B C D E F G H I J K L M N O P Q R S T U V W X Y Z