Premium Content

Access "Deciphering the alphabet soup of mobile device security products"

Published: 01 Feb 2013

When developing an enterprise mobility program, an organization needs to determine the appropriate level of security, evaluate how workers use their mobile devices and make sure the proper infrastructure is in place. Vendors push an alphabet soup of mobile device security products they say are necessary --MDM (mobile device management), MAM (mobile application management), MIM (mobile information management), IAM (identity access management) and NAC (network access control), for example -- but depending on a variety of organizational factors, it could be overkill to deploy any or all of those products, said Chris Hazelton, a mobile analyst at 451 Research, an enterprise research firm based in Boston, Mass. A combination of management techniques, whether it's on the device level or at the application and information level, is necessary for supporting mobile devices, Hazelton said, but the chosen management product depends on the unique factors of the organization. Take control of enterprise mobility Part 1: Getting the most out of your enterprise mobility ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside


More Premium Content Accessible For Free

  • Cloud migration confidential

    Any cloud migration strategy will likely start with a good dose of preparation, say experts in the cover story for the September issue of Modern ...

  • DevOps tools for workload management

    Workload automation and streamlined management are essential to support fast-changing business applications and a hybrid or private cloud computing ...

  • The processor problem: One size doesn't fit

    Conventional x86 processors try to do everything, but they are power hungry and performance inefficient. Stripping down processors to get the ...