Mobile Security Policy

Making the Mobile Device a True Business Platform: Introducing the new mobilEcho

Three and a half years ago, Apple introduced the iPad and enterprise mobility took a giant leap forward. Up until that time mobile devices (mostly smartphones) were primarily for phone calls and emails, as far as the enterprise was concerned. But with a larger screen size, the iPad (and now other emerging tablets) expanded the idea of the mobile device as a content consumption tool. And enterprises started to take notice in other ways as well.

Today’s countless mobile devices present tangible opportunities to drive measurable and substantial value for the enterprise. Field service workers, executives on the go, sales reps, and project managers all have a need for mobile access to email, applications, enterprise data and files. There’s no question that the advent of the iPad, iPhone and other mobile devices brings substantial benefits to the enterprise. However, these benefits also come with new security risks that enterprise IT departments must be ever vigilant about, lest critical data be compromised.

In addition to escalating mobile device use, the bring-your-own-device (BYOD) trend in the workplace continues to grow. While this trend is an incredible boon for employee satisfaction, as well as enterprise productivity and IT-cost savings when it comes to hardware, service and support, it presents additional challenges on top of those inherent to mobile devices.