You've requested...

Share this with your colleagues:

Protection for Every Enterprise: How BlackBerry Security Works

If a new window did not open, click here to view this asset.

Download this next:

Mobile Security Strategies

 

 

Smartphones currently possess many of the powerful capabilities similar to a PC and as new features and functionalities are being added, smartphones are becoming more vulnerable to certain kinds of attack.

 

As smartphones are increasingly used for accessing remote data and carrying sensitive business and personal data, security apps are becoming an essential and integral part of the smartphone to make it less vulnerable to the different types of threats.

 

Similarly, as both consumer and enterprise adoption of tablets has risen – following the success of Apple‟s iPad – there is a pressing need to provide security solutions for these devices.

 

Contents:

  • Security Issues & Trends
  • Storage of Confidential Information
  • Device Protection
  • Mobile Apps & Software Downloads
  • Device Loss or Theft
  • Always-On access and User Owned Devices
  • The BYOD Trend
  • Security Threats
  • Mobile Security Stakeholders & Opportunities
  • Market Drivers
  • Mobile Security Software Market

 

 

Click on the button below to download this report

 

Juniper Research specialises in identifying and appraising new high growth market sectors within the mobile ecosystem. The cornerstones of Juniper's research are market sizing and forecasting, together with competitive analysis, strategic assessment and business modelling. Juniper provides independent and impartial analysis of current and emerging opportunities through a team of dedicated specialists.

These are also closely related to: "Protection for Every Enterprise: How BlackBerry Security Works"

  • Sleeping Android: the danger of dormant permissions

     

     

    By James Sellwood and Jason Crampton

     

    A weakness in the permissions architecture of the Android platform means that apps could gain access to functionality without a user’s knowledge or consent, leaving them open to exploitation or abuse by attackers.

     

    Changes to the way the Android platform authorises permission requests could compromise the security of unwary users.

     

    Since the first commercial device was made available in October 2008, the Android platform has enjoyed a meteoric rise. In those four years it has grown to hold the greatest market share among many of the world’s most significant smartphone markets.

     

    Competing head to head with Apple’s iOS platform, the two operating systems are used in the vast majority of the world’s smartphones.

     

    The Android platform has evolved considerably since its introduction. Since 2008, there have been 25 platform version releases – the latest being 4.2.1 – introducing 17 different API levels in that time.

     

    These releases have introduced numerous new features and, as one might expect nowadays, they have also included various bug fixes and security patches.

     

    One area of the Android platform has undergone continued development in that time and has received close scrutiny due to its significant security role and noticeable disparity from similar mechanisms on other platforms.

     

    The area in question is the Android permission architecture.

     

    Click on the button below to download this article

     

    Royal Holloway Information Security Thesis Series

     

     

  • CW buyer's guide: mobile device management

     

     

    The trend for consumerisation and employees using their own devices for work comes as concerns over data security mount. In this 11-page buyer’s guide, Computer Weekly examines how to formulate a strategic policy for mobile device management (MDM) with a look at how the London Borough of Brent is migrating to a fleet of iPads and iPhones, and how to choose the right MDM approach and product portfolio for your organisation, staff and mobile devices.

     

    How to conduct a strategic review of your mobile policy

     

    Mobile device management has developed from tactical concerns about devices, but CIO s need a more in-depth overview of the corporate fleet.

     

    Apple squashes BlackBerry as Brent Borough deploys iPads

     

    London Borough of Brent switches suppliers to provide staff with up to 3,000 iPads and iPhones, phasing out Blackberry smartphones.

     

    Shore up your organisation’s fleet with the right MDM

     

    There are many mobile device management products, but approaches vary – find out how to choose the right one for your business.

     

    Click on the button below to download this report

     

Find more content like what you just read:

  • Mobile working in business - the facts.

    The tech chasm that has allegedly formed in the workforce created by a cross-generational 1divide  – between those who grew-up with technology and those that didn’t – is vastly overstated.

    Download

  • Smartphones: Computer Weekly Buyer's Guide

    The smartphone has transformed communication between mobile workers and their offices but at a cost.

    Download

  • Consumerisation and BYOD Purchasing Intentions Europe 2013

    This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.

    Download

  • Gartner: A perspective on Android 2.2 for the enterprise

    With the announcement of Android 2.2, code named "Froyo," Google targets the enterprise market for the first time. This release has features to enable devices that can be granted support under the "appliance level" of the Gartner Managed Diversity Framework.

    Download

  • The Consumerisation of IT

    This report looks at the nature and level of activity, motivations and drivers, unintended consequences, and the practicalities of managing consumer devices and social media at work.

    Download

  • Enterprise mobility management software offerings and use cases

    Enterprise mobility management software allows IT to deploy security policies and provide access to internal resources by integrating with APIs in the mobile OSes. This e-guide shows enterprise mobility management software offerings and use cases.

    Download

  • The tablet market: consumer trends and market segmentation

    The Boston Consulting Group shows how consumer tablets are creating new opportunities as the market grows and segments.

    Download

  • Mobile banking strategies - maximise your revenues

    Juniper Research defines mobile banking as  “the provision of banking services to customers on their mobile devices”: specifically we mean in the vast majority of instances “the operation of bank current and deposit or savings accounts”.

    Download

  • How Micro-Electro-Mechanical systems are taking over mobile devices

    In this report extract Juniper Research looks at the growing use of MEMS (micro-electro-mechanical systems) in mobile devices, tables, laptops and notebooks.

    Download

  • Application data security risks on Android devices

    This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.

    Download

  • The changing mobile platform landscape

    So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

    Download

  • Mobile coupon technology

    Juniper Research defines a mobile coupon as “a coupon sent to and stored on a mobile phone that can be exchanged for a rebate, a financial discount etc. at a retailer or merchant when the consumer purchases a product.”

    Download

  • CW Buyers Guide: Mobile Device Management

    Computer Weekly looks at mobile enterprise management tools in this 9 page Buyer's Guide.

    Download

  • Getting to grips with BYOD

    BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.

    Download

  • Bringing System Management to Messaging & Collaboration

    The fast growing interaction between email, collaboration and social media is creating new management pressures. Analysts Bernt Ostergaard and Clive Longbottom offer answers in this paper from Quocirca.

    Download

  • CW Buyer's Guide: Consumerisation

    This guide to consumerisation of IT condsiders what the proliferation of consumer technology in the workplace means for the IT department and how it can empower employees to boost resourcefulness and productivity.

    Download

  • Key Insights for Building “Consumerised” End-User Services

    This report extract from the Corporate Executive Board gives IT organisations an insight into the best approaches to building and managing consumer technology in the workplace.

    Download

  • Building consumerised end-user services

    This report extract from the Corporate Executive Board, presents key facts and figures on the take up of consumer technology in the workplace.

    Download

  • The mobile print enterprise

    Quocirca looks at the case for mobile printing in the enterprise and suggests best practices for a mobile print strategy.

    Download

  • CW+: Quocirca report: Mobile application momentum – why write mobile applications?

    With the seemingly un-wavering boom in sales of smart mobile handsets, the opportunity for developing and selling mobile applications more sophisticated than ringtones and games is ever more appealing.

    Download

  • Mobile Web 2.0 - opportunities in advertising and presence-based services

    The mobilisation of Web 2.0 is fostering new partnerships and rivalries throughout the value chain.

    Download

  • Mobile Augmented Reality

    It is fair to say that AR (Augmented Reality) applications and services on the mobile remain in their infancy. Given that the first AR mobile browsers did not become available until June 2009, this is hardly surprising.

    Download

  • How to control abuse of social networking on mobile devices

    The numbers of employees using some form of mobile technology while working has soared. The benefits to the organisation are well documented; employees are more contactable, will probably extend their working days and should be more productive.

    Download

  • CW+: Mobile payments market opportunities for business

    The definition of a mobile payment is often open to interpretation and can differ from source to source.    Juniper Research has a simple definition of a mobile payment as “payment for goods or services with a mobile device such as a phone, Personal Digital Assistant (PDA), or other such device.”

    Download

  • Computer Weekly – 19 November 2013: Software-defined networking explodes

    In this week's Computer Weekly, we look at the fast-growing trend for software-defined networking, and how startups are shaking up the established suppliers. We examine the new guidelines for using bring your own device schemes in the public sector. And we find out how second-user software could save money on licensing. Read the issue now.

    Download

  • Mobile payment technology - a buyer's guide

    The definition of a mobile payment is often open to interpretation and can differ from source to source.    Juniper Research has a simple definition of a mobile payment as “payment for goods or services with a mobile device such as a phone, Personal Digital Assistant (PDA), or other such device.”

    Download

  • The value of mobile and social to CRM

    Adding mobile access and social collaboration to CRM delivers significant benefits, this report from Nucleus Research reveals.

    Download

  • Mobile ticketing opens doors of opportunity for business

    Juniper Research defines a mobile ticketing user as “someone who stores a ticket on their mobile phone for later redemption” at the point of travel, the music venue, the cinema etc.

    Download

  • A Computer Weekly buyer's guide to going beyond desktop Computing

    A digital workplace opens up a range of new possibilities for businesses, but it needs to be implemented in the right way. In this 13-page buyer's guide, Computer Weekly looks at how digital workplaces demand increasing functionality, how to make sense of desktop as a service, and the value of unified endpoint management.

    Download

  • How to manage a mobile phone fleet

    The expectations, working methods and tools used by employees in all organisations have changed as a result of advances in communications technologies.

    Download

  • The changing mobile platform landscape

    So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

    Download

  • Using mobile phones to manage mobile workers’ expenses

    The tool of choice to the highly mobile workforce is the  mobile phone. From customer contact and records keeping, through calendaring and scheduling to mapping and news feeds, the  mobile phone is usurping the laptop as the main point of technology for the road warrior.

    Download

  • Mobile NFC in Retail

    This report from the GSMA explains the opportunities for NFC Mobile communications in retail.

    Download

  • Content Collaboration and Processing in a Cloud and Mobile World

    This research from AIIM assesses the drivers for collaboration technology, the strategy choices being made, and the feature organisations are demanding.

    Download

  • The Global State of Enterprise Mobility 2014/15

    An exclusive look at where buyers are investing in enterprise mobility and the drivers behind the market.

    Download

  • CW ASEAN: Juggling in the cloud

    In this month's issue of CW ASEAN, we take a look at what organisations need to do to overcome the complex task of pulling together a seamlessly integrated data management strategy.

    Download

  • Trends in Enterprise Mobility

    This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.

    Download

  • Updating Your Corporate BYOD Program for Success

    This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.

    Download

  • Computer Weekly Buyers Guide: Mobile Technology

    As CIOs face increasing demands from end-users for access to mobile technologies, organisations are realising that mobile technologies can create profitable business opportunities.

    Download

  • Computer Weekly buyer's guide to endpoint security

    In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.

    Download

  • Overview Of Near Field Communication

    This chapter from the book NFC Application Development for Android, offers an overview of NFC for Android developers.

    Download

  • Guide to Flexible Working

    This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.

    Download

  • The Cost and Benefits of BYOD

    Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.

    Download

  • Focus: Enterprise Mobility Management

    In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.

    Download

  • Mobile EndPoint Security and Management - Best Practices

    Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.

    Download

  • CW ASEAN: A taste for mobility

    Although enterprise mobility is increasingly strategic and transformative for companies such as Foodpanda Singapore, its adoption is still nascent in Southeast Asia. In this month's CW ASEAN, we take a look at how organizations in the region are realizing the value of mobility, even as the definition of mobility is changing.

    Download

  • Trends that matter for 2015

    Marc Dowd, principal advisor at analyst group Forrester, gives his predictions for the top trends in technology, business and the IT department in 2015.

    Download