Skip to main content
App management icon

This post is from the Apperian blog and has not been updated since the original publish date.

Last Updated Oct 30, 2015 — App Management expert

Mobility News Briefing - Oct 30

App Management

It's hard to keep up with every news story, interesting article, and blog post. Catch us every Friday for a roundup of the stories we think you want to know about each week. Subscribe to make sure you don't miss an update!

3 Spooky Enterprise Mobility Threats...

The story? Halloween is right around the corner, and Chloe Green of InformationAge gave creative names for threats that have cause IT nightmares -- "greedy ghouls", "trick or treat" and "Frankenstein's monster mashup."

Greedy ghouls? The threat of a device - laptop, smartphone or tablet - that contains corporate data being stolen. Green says enterprises tend to focus on cyber security and often forget about physical security.

Trick or Treat? Spam and phishing emails looking to access the enterprise in tricky ways. Green says that these days even spam filters can't block everyone of these nasty inbounds, so it's important that employees are prepped on how to deal with them.

Frankenstein's monster match up? IT organizations are still operating in "segmented, siloed environments" that don't work well together, and it makes it impossible to keep up with the speed of business. Green says it's time to break down these barriers and work towards common goals, so the enterprise as a whole can benefit.

Mobile revolution: predictions vs reality...

The story? The mobile revolution is behind us as smartphones and tablets are everywhere. Galen Gruman of InfoWorld took a look back at the notable predictions around the mobile revolution and compared them to how things actually played out.

How the mobile revolution really played out...

Despite predictions that the only mobile devices that would connect to work systems would be company-issued devices because of security, the BYOD trend is here to stay, and there's been no disasters because of it.

At first, analysts did not see smartphones as valuable to the enterprise, and their skepticism was largely justified because many people do not leverage their devices for much more than email. Galen says this is because "it's hard to find broad usage of mobile apps in business today." He does acknowledge that there are apps for specific business use cases that are being used by healthcare professionals, IT, police officers, building inspectors and utility companies.

Predictions way overstated the risk imposed on mobile device data, causing unnecessary fear. While security has been and always will be top of mind, mobile devices do not pose as significant threat as data breaches of thumb drives, CDs and DVDs, and laptops that happen much more frequently than breaches of smartphones and tablets.

Mobility isn't just a technology...

The story? Bob O'Donnell, Founder and Chief Analyst at Technalysis Research, says that mindset has a lot to do with it because "at its core, the move to mobility requires a change in the way companies think about data and how they access, use, and secure it."

The problem? IT organizations feel the pressure to embrace mobile technology across all aspects of their organizations and are running into issues because they are not thoroughly thinking about the implications. In order to truly realize the benefits of mobility, companies need to rethink their core business processes and procedures to understand where mobile fits in the mix.

More from the Blog

View more
Apr 30, 2020

Mobile Application Management: A Forward View

App Management
  IT Is Adapting in the Midst of the COVID-19 Pandemic The Coron ...
Read More
May 19, 2019

Sneak Peek: How Are IT Leaders Driving Mobile App Adoption?

App Management
Apperian conducted the The Mobile Enterprise Application Survey to fin ...
Read More
Jan 30, 2019

Part 1: App Security Should Be an Integral Part of Your DevSecOps Process — Not an Afterthought

Application Security
What are the key considerations and components of DevSecOps? The in ...
Read More
Nov 19, 2018

Breaking Down the New California IoT Law

Application Security
Recently California passed legislation regarding the security of all I ...
Read More
Contact Us