IBM Announces New Software to Manage And Secure The Influx Of Mobile Devices To The Workplace

IBM Endpoint Manager for Mobile Devices helps organizations support and protect the growing mobile workforce

January 31, 2012

2 Min Read


ARMONK, N.Y. - 31 January 2012: IBM (NYSE: IBM) today introduced new software to help organizations better manage and secure the explosion of smartphones and tablets in the workplace, while also managing laptops, desktops and servers.

In addition to the new mobile security and management software introduced today, IBM also announced the acquisition of Worklight. Worklight accelerates IBM’s comprehensive mobile portfolio, which is designed to help global organizations leverage the proliferation of all mobile devices -- from laptops to smartphones and tablets.

As the mobile workforce is expected to reach more than 1.19 billion by next year, there are new pressures to connect personal smartphones and tablets to corporate networks and provide employee access to business data on them. At the end of 2011, almost half of mobile devices used in the workplace were employee owned according to IDC. This “Bring Your Own Device” (BYOD) trend raises additional concerns about managing security risks. Mobile exploits doubled in 2011 from 2010, according to the IBM X-Force Mid-Year Trend and Risk Report.

IBM Endpoint Manager for Mobile Devices helps organizations support and protect the growing mobile workforce. Through this software, firms can use a single solution to secure and manage smartphones and tablets, as well as laptops, desktop PCs, and servers. It manages Apple iOS, Google Android, Nokia Symbian, and Microsoft Windows Mobile and Windows Phone devices.

The software extends security intelligence to deal with the growing threats from mainstream adoption of the BYOD trend. Organizations can install the IBM software in hours, remotely set policies, identify potential data compromises and wipe data off the devices if they are lost or stolen. The software helps configure and enforce passcode policies, encryption and virtual private network settings.

“As the BYOD movement accelerates, it presents new opportunities and challenges for organizations. In order for them to take advantage of this trend, it is important that organizations have mobile security and management policies in place,” said Bob Sutor, vice president, IBM Mobile Platform. “The new offering from IBM will help organizations manage personal and enterprise-owned mobile phones and tablets across IT networks in order to minimize risk, increase productivity and enhance innovation.”

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights