Site icon Aragon Research

Content Security: The Next Mobile Management Frontier

Author: Mike Anderson                                    Date: January 7, 2013

Topics: Mobile, Content Management               Research Note Number: 2013-02

Issues: What are the trends impacting mobile computing?

What trends are impacting content and how it is managed?

How will content management technologies and architectures evolve?

Summary: While securing mobile devices has been the focus of enterprise mobility management, content security is quickly becoming the top priority

To download the PDF of this research note, click here.

 

Mobile professionals from board members to professional athletes are now using tablet computers to access critical content. Securing that content is now the top priority of the enterprise, since losing control of it has become commonplace (see Note 1). This Research Note reviews the new approach to securing content.

Workforce is Mobile; Content Follows

The workplace has become inherently virtual and mobile. Individuals access their work at any time from any place, using many different devices of varying types and form factors. At the core of work interactions, whether related to collaboration or production processes, is connecting with business content.

Making content mobile is a priority for individuals and for enterprises. Access to corporate email and enterprise CRM or HCM applications through mobile clients is valuable, but having a key report on a tablet at your fingertips, or being able to carry all customer insurance policy information to a meeting on a smartphone are now essential.

Enterprises are responding to the mobile management challenge in various ways; the predominant one is mobile device management (MDM). A wide range of functions and security services let enterprises control access and secure corporate data in the mobile domain. Four key areas need to be secured: network access, devices, apps and data. An effective enterprise mobile strategy will focus extensively on the security elements and capabilities in each of these four areas, with a strong focus on content security (see Figure 1).

Note: This is part of Aragon’s archived research. Please visit our Coverage Areas page to view our most recent content.

Copyright © 2013 Aragon Research Inc. and or its affiliates. All rights reserved.

 

Exit mobile version