Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
January 31, 2012
2 Min Read
ARMONK, N.Y. - 31 January 2012: IBM (NYSE: IBM) today introduced new software to help organizations better manage and secure the explosion of smartphones and tablets in the workplace, while also managing laptops, desktops and servers.
In addition to the new mobile security and management software introduced today, IBM also announced the acquisition of Worklight. Worklight accelerates IBM’s comprehensive mobile portfolio, which is designed to help global organizations leverage the proliferation of all mobile devices -- from laptops to smartphones and tablets.
As the mobile workforce is expected to reach more than 1.19 billion by next year, there are new pressures to connect personal smartphones and tablets to corporate networks and provide employee access to business data on them. At the end of 2011, almost half of mobile devices used in the workplace were employee owned according to IDC. This “Bring Your Own Device” (BYOD) trend raises additional concerns about managing security risks. Mobile exploits doubled in 2011 from 2010, according to the IBM X-Force Mid-Year Trend and Risk Report.
IBM Endpoint Manager for Mobile Devices helps organizations support and protect the growing mobile workforce. Through this software, firms can use a single solution to secure and manage smartphones and tablets, as well as laptops, desktop PCs, and servers. It manages Apple iOS, Google Android, Nokia Symbian, and Microsoft Windows Mobile and Windows Phone devices.
The software extends security intelligence to deal with the growing threats from mainstream adoption of the BYOD trend. Organizations can install the IBM software in hours, remotely set policies, identify potential data compromises and wipe data off the devices if they are lost or stolen. The software helps configure and enforce passcode policies, encryption and virtual private network settings.
“As the BYOD movement accelerates, it presents new opportunities and challenges for organizations. In order for them to take advantage of this trend, it is important that organizations have mobile security and management policies in place,” said Bob Sutor, vice president, IBM Mobile Platform. “The new offering from IBM will help organizations manage personal and enterprise-owned mobile phones and tablets across IT networks in order to minimize risk, increase productivity and enhance innovation.”
You May Also Like
A screen displaying many different types of charts and graphs to show what data is being analyzed.Cybersecurity Analytics
Causes and Consequences of IT and OT Convergence
Secure Access for Operational Technology at Scale
Building Cyber Resiliency: Key Strategies for Proactive Security Operations
Buyer's Guide: Choosing a True DevSecOps Solution for Your Apps on AWS
Understanding AI Models to Future-Proof Your AppSec Program