The tools for combatting mobile security threats to corporate data are evolving to address the concerns of wary CIOs. Development of enterprise mobile apps has been moving more slowly than development of consumer-facing apps, according to Gartner. One main reason is IT leaders’ concerns about the security of mobile devices, which are often employees’ personal devices, and are vulnerable to being lost, hacked or stolen. While there are plenty of established tools and practices for keeping Web visitors from straying (or hacking) into sensitive corporate data, managing security across a diverse set of mobile devices remains a challenge, IT experts say. Vendors are moving to address CIOs’ concerns, however. For example, endpoint management platform providers such as Symantec and McAfee now provide centralized patch management, antivirus and antispam tools for mobile devices. Meanwhile, Nemertes, in its report “Communications and Computing Benchmark: 2011/12,” found that nearly 60 percent of the 240 end user companies interviewed are deploying or plan to deploy a mobile device management platform. Companies using such a platform were more likely to say their mobile app initiatives were successful, notes Nemertes vice president Irwin Lazar. Leading mobile data management vendors such as Good Technologies, Air Watch, Mobile Iron and Sybase provide data-leak protection for Android and Apple devices. For example, business data and apps can be isolated from users’ personal apps and activities in a secure virtual container, and IT can remotely wipe a device that is lost or stolen. A feature that Lazar calls an “Angry Bird filter” blocks employees from downloading dirty or time-wasting apps onto their devices. VMware’s Mobile Virtualization Platform, due out in the next few months, enables end users to run native applications within a secured container on Android devices. Apple is also moving to provide more business-caliber solutions for iOS devices, Nemertes’ Lazar says. For example, it has added support for Microsoft ActiveSync, so IT groups can remotely manage and wipe iOS devices, and has provided app security controls that can be used by mobile data management platforms. Google’s Android, and the Android Market, are more open to developers than iOS and the App Store, and thus are more vulnerable to hackers. Earlier this year, some 55 malware-infected apps masquerading as legitimate titles were discovered in Google’s app store. The vendor can, and does, remove suspect apps from customer’s phones. However, app developers and, no doubt, business users and CIOs have problems with this somewhat high-handed approach—not to mention the fact that the app could already have infected an enterprise before it’s removed. Related content brandpost Sponsored by Catchpoint Systems, Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Digital Transformation Cloud Computing feature 10 business intelligence certifications and certificates to advance your BI career From BI analysts and BI developers to BI architects and BI directors, business intelligence pros are in high demand. Here are the certifications and certificates that can give your career an edge. By Thor Olavsrud Dec 01, 2023 8 mins Certifications Business Intelligence IT Skills Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe